咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是191-200 订阅
排序:
Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2024年 第2期137卷 671-684页
作者: Ramathilagam, A. Vijayalakshmi, K. PSR Engn Coll Dept Comp Sci & Engn Sivakasi 626140 India Ramco Inst Technol Dept Comp Sci & Engn Rajapalayam 626117 India
Wireless Sensor Networks (WSN) when simulated for implementations use Mobile Sinks (MS) which are vulnerable to unauthorized attacks. Existing works do not ensure attacker node identifications making prevention of att... 详细信息
来源: 评论
Xerox :: Parc :: Techreports :: Csl-78-4 Using encryption for Authentication in Large Networks of Computers
收藏 引用
2016年
Xerox :: Parc :: Techreports :: Csl-78-4 Using encryption for Authentication in Large Networks of Computers by published by
来源: 评论
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity
收藏 引用
IET INFORMATION SECURITY 2017年 第4期11卷 199-203页
作者: Zhang, WeiGuo Li, LuYang Pasalic, Enes Xidian Univ ISN Lab Xian 710071 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Univ Primorska Fac Math Nat Sci & Informat Technol Koper 6000 Slovenia Inst Andrej Marusic Koper 6000 Slovenia
Resilient substitution boxes (S-boxes) with high non-linearity are important cryptographic primitives in the design of certain encryption algorithms. There are several trade-offs between the most important cryptograph... 详细信息
来源: 评论
Flexible structures of lightweight block ciphers PRESENT, SIMON and LED
收藏 引用
IET CIRCUITS DEVICES & SYSTEMS 2020年 第3期14卷 369-380页
作者: Rashidi, Bahram Ayatollah Boroujerdi Univ Dept Elect Engn Boroujerd *** Iran
Security and privacy of the Internet of Things (IoT) systems are critical challenges in many data-sensitive applications. The IoT systems are constrained in terms of execution time, flexibility and computational resou... 详细信息
来源: 评论
Converting Fixed-Length Binary Strings into Constant Weight Words: Application on Post-Quantum Cryptography
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第03期22卷 3063-3074页
作者: López-García, Mariano Farouk-Marei, David G. Cantó-Navarro, Enrique Universitat Politècnica de Catalunya Department of Electronic Engineering Vilanova i la Geltrú08800 Spain Universitat Rovira i Virgili Department of Electrical and Automatic Electronic Engineering Tarragona43007 Spain
This paper presents a new algorithm for encoding binary strings of fixed-length into a word of constant Hamming weight and constant length. The primary difference compared to previous publications is that the proposed... 详细信息
来源: 评论
A Method for Optimal Value Measurement of Some Parameters of Fault Attacks on Cryptographic algorithms
收藏 引用
Journal of Applied and Industrial Mathematics 2024年 第2期18卷 371-377页
作者: Zuev, Yu. A. Klyucharev, P.G. Bauman Moscow State Technical University Moscow105005 Russia
Abstract: This paper is devoted to the construction of a time-optimal method for measuring themaximum permissible (critical) value of the supply voltage (as well as other parameters) of thedevice on which the cryptogr... 详细信息
来源: 评论
Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES
收藏 引用
INTERDISCIPLINARY SCIENCES-COMPUTATIONAL LIFE SCIENCES 2017年 第1期9卷 140-152页
作者: Adeshina, A. M. Hashim, R. Univ Tun Hussein Onn Malaysia Fac Comp Sci & Informat Technol Batu Pahat 86400 Johor Malaysia
Diagnostic radiology is a core and integral part of modern medicine, paving ways for the primary care physicians in the disease diagnoses, treatments and therapy managements. Obviously, all recent standard healthcare ... 详细信息
来源: 评论
A Blockchain Technology: Analysis of a Secure Payment Mode for Enterprise E-Commerce Import and Export Trade
收藏 引用
International Journal of Network Security 2024年 第5期26卷 861-866页
作者: Dong, Xianfeng Li, Jing Henan Mechanical & Electrical Vocational College Henan Zhengzhou451151 China
This paper briefly introduces the payment mode of e-commerce import and export trade based on blockchain. In this mode, the blockchain is utilized to store transaction information, while the Bresson, Catalano, and Poi... 详细信息
来源: 评论
Image encryption algorithm based on hyperchaotic system and dynamic DNA encoding
收藏 引用
PHYSICA SCRIPTA 2023年 第11期98卷 115215-115215页
作者: Liang, Wuyan Zhang, Limin Yang, Zhongbao Yu, Tingting Li, Jingjing Li, Xianli Northeast Petr Univ Coll Phys & Elect Engn 99 Xuefu St Daqing 163318 Peoples R China
Since the existing DNA encryption algorithms only have fixed DNA coding and decoding rules and a single algorithm that cannot meet more complex and more secure encryption requirements, an image encryption algorithm ba... 详细信息
来源: 评论
An efficient multimedia compression-encryption scheme using latin squares for securing internet of things networks
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 64卷
作者: El-Shafai, Walid Mesrega, Ahmed K. Ahmed, Hossam Eldin Abdelwahab, Nermin Abd El-Samie, Fathi E. Menoufia Univ Fac Elect Engn Dept Elect & Elect Commun Engn Menoufia Egypt Prince Sultan Univ Comp Sci Dept Secur Engn Lab Riyadh 11586 Saudi Arabia Menoufia Univ Fac Elect Engn Dept Comp Sci & Engn Menoufia Egypt Princess Nourah Bint Abdulrahman Univ Coll Comp & Informat Sci Dept Informat Technol Riyadh 84428 Saudi Arabia
The security of multimedia data and its applications has become a building block of any digital communication technology. The extensive use of multimedia content over wireless networks makes the applications exposed t... 详细信息
来源: 评论