咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 285 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 105 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 85 篇 电气工程
    • 51 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 136 篇 理学
    • 89 篇 数学
    • 42 篇 物理学
    • 15 篇 化学
    • 15 篇 统计学(可授理学、...
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 390 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 6 篇 aes
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 rsa
  • 5 篇 des
  • 5 篇 encryption
  • 4 篇 ecc
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 307 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
390 条 记 录,以下是201-210 订阅
排序:
Enhanced Security for Cloud Storage using Linear Block Cipher Algorithm  1
Enhanced Security for Cloud Storage using Linear Block Ciphe...
收藏 引用
International Conference on Cloud Computing (ICCC)
作者: Kuppuswamy, Prakash Rekha, S. Nithya Jazan Univ Dept Comp Engn & Networks Jazan Saudi Arabia Qassim Private Coll Dept Comp Sci & Engn Buraydah Saudi Arabia
Cloud Computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. Cloud computing is most interesting and enticing technology ... 详细信息
来源: 评论
Employing Quantum Mechanics for Quantum Cryptography
Employing Quantum Mechanics for Quantum Cryptography
收藏 引用
International Conference on Computational Science and Computational Intelligence (CSCI)
作者: Abhanu, Rasika Aruigu, Naveen Bale, Sowmya Beeram, Geethanjali Bhattu, Zurendra Sai Raj Mahmoud, Mohammed Clark Univ Sch Profess Studies Worcester MA 01610 USA Univ Jamestown Dept Comp Sci Jamestown ND USA
Quantum cryptography is a field of study that explores the use of quantum mechanics to create new cryptographic techniques that are more secure than traditional cryptography. With the advancement of quantum computing ... 详细信息
来源: 评论
Routing Protocol Security for Low-Power and Lossy Networks in the Internet of Things  9th
Routing Protocol Security for Low-Power and Lossy Networks i...
收藏 引用
9th International Conference on Big Data Analytics (BDA)
作者: Patel, Akshet Shanmugapriya, D. Srivastava, Gautam Lin, Jerry Chun-Wei Manipal Univ Jaipur Dept Mech Engn Jaipur Rajasthan India Vivekanandha Coll Engn Women Dept Comp Sci Elaiyampalayam India Brandon Univ Dept Math & Comp Sci Brandon MB Canada Western Norway Univ Appl Sci Dept Comp Sci Elect Engn & Math Sci Bergen Norway
The Internet of Things (IoT) is a two-decade-old technology that allows the interconnection of various cyber-physical objects located anywhere in the world over the internet. A cyber-physical object is an inanimate ob... 详细信息
来源: 评论
A Novel Effective Framework for Medical Images Secure Storage Using Advanced Cipher Text Algorithm in Cloud Computing
A Novel Effective Framework for Medical Images Secure Storag...
收藏 引用
IEEE International Conference on Imaging Systems and Techniques (IST)
作者: Praveen, S. Phani Sindhura, S. Madhuri, A. Karras, Dimitrios A. PVPSIT Dept Comp Sci & Engn Vijayawada AP India KoneruLakshmaiah Educ Fdn Dept Comp Sci & Engn Vaddeswaram AP India Natl & Kapodistrian Univ Athens NKUA Dept Gen Fac Sci Athens Greece
Cloud computing is one of the emerging technologies in present world. Many cloud computing services such as data storage, data usage and other types of services are available. Medical images storage is most widely use... 详细信息
来源: 评论
HERFA: A Homomorphic encryption-Based Root-Finding Algorithm
收藏 引用
IEEE Embedded Systems Letters 2024年
作者: Bencini, Christopher Mendola, Jason He, Wei Kim, Sunwoong Rochester Institute of Technology Department of Electrical and Microelectronic Engineering RochesterNY14623 United States
Edge-cloud computing architectures are exposed to significant security challenges. Although general encryption methods can mitigate some of these concerns, they require decryption to perform operations on data, exposi... 详细信息
来源: 评论
Some Graph Based encryption Techniques
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2727-2734页
作者: Narayan, H Dhanvanth Bhat, Surekha Ravishankar Bhat, Ravishankar Bhat, Smitha Ganesh Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India Department of Mathematics Milagres College Kallianpur Karnataka Udupi574111 India Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India
In today’s fast-evolving technological environment, ensuring confidentiality is of utmost importance. Cryptography stands as a critical discipline in safeguarding information from unauthorized access. It employs vari... 详细信息
来源: 评论
Research and Application of Block Chain Technology in Electricity Market Transactions  4
Research and Application of Block Chain Technology in Electr...
收藏 引用
4th International Conference on Smart Power and Internet Energy Systems (SPIES)
作者: Zhang, Ye Wang, Rongmao Li, Qingchun Xia, Nannan Zhang, Na Hu, Jingwei Liaoning Elect Power Trading Ctr Co Ltd Shenyang Peoples R China State Grid Liaoning Elect Power Co Ltd Econ & Technol Res Inst Shenyang Peoples R China
With the entry of large-scale commercial power users into the market, the electricity trading retail market faces a surge in the number of users, agency relationships, and retail-side settlement. All these pose huge c... 详细信息
来源: 评论
IoT Agile Framework Enhancement  1
IoT Agile Framework Enhancement
收藏 引用
1st International Conference on Computer Applications and Information Security (ICCAIS)
作者: Gabr, Badiaa Azer, Marianne A. Nile Univ WINC Sheikh Zayed City Egypt Nile Univ Natl Telecommun Inst Sheikh Zayed City Egypt
Internet of Things (IoT) is considered as a trend nowadays. Devices connected to the internet interact with surrounding;this poses strong challenges in handling big data with a certain level of security. In this paper... 详细信息
来源: 评论
Reviewing Crypto-Agility and Quantum Resistance in the Light of Agile Practices
Reviewing Crypto-Agility and Quantum Resistance in the Light...
收藏 引用
24th International Conference on Agile Software Development (XP)
作者: Marchesi, Lodovica Marchesi, Michele Tonelli, Roberto Univ Cagliari Dept Math & Comp Sci Cagliari Italy
The term crypto-agility means the ability to quickly and securely change cryptographic algorithms and related data, in the case of their compromise. In this context, the advent of quantum computing constitutes a new p... 详细信息
来源: 评论
The Evaluation of Security algorithms on Mobile Platform
The Evaluation of Security Algorithms on Mobile Platform
收藏 引用
IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
作者: Yao, Hong Lian, Lu Fan, Yuanyuan Liang, Qingzhong Yan, Xuesong China Univ Geosci Sch Comp Sci Wuhan 430074 Peoples R China
The rapid development of mobile platform leads to growing demand for network communications, which suffer from increasingly severe security threats as well. Considering the urgent security demand and the limitation of... 详细信息
来源: 评论