咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是201-210 订阅
排序:
HERFA: A Homomorphic encryption-Based Root-Finding Algorithm
收藏 引用
IEEE Embedded Systems Letters 2024年
作者: Bencini, Christopher Mendola, Jason He, Wei Kim, Sunwoong Rochester Institute of Technology Department of Electrical and Microelectronic Engineering RochesterNY14623 United States
Edge-cloud computing architectures are exposed to significant security challenges. Although general encryption methods can mitigate some of these concerns, they require decryption to perform operations on data, exposi... 详细信息
来源: 评论
Design of Chaotic Systems with Multiple Scrolls via Anti-Control Method and its encryption Application
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2636-2644页
作者: Wang, Shiya He, Jianbin School of Mathematics and Statistics Minnan Normal University Zhangzhou363000 China School of Mathematics and Statistics Minnan Normal University Zhangzhou363000 China
As the widespread application of multimedia communication technology, information transmission security has become increasingly important. The multi-scroll chaotic system exhibits complex dynamic behavior, and it is u... 详细信息
来源: 评论
Comparative Study of Various Cryptographic algorithms Used for Text, Image, and Video
Comparative Study of Various Cryptographic Algorithms Used f...
收藏 引用
International Conference on Emerging Trends in Expert Applications and Security (ICETEAS)
作者: Advani, Nilesh Rathod, Chetan Gonsai, Atul M. Saurashtra Univ Dept Comp Sci Rajkot Gujarat India VNSGU Vivekanand Coll Adv Comp & Informat Sci Surat India
In today's era of computer, the most important aspect for data is its security. This is very much essential when the data is traveling through various mechanisms of wired and wireless communication. We authors, te... 详细信息
来源: 评论
On the Implementation and Security Analysis of Routable-GOOSE Messages Based on IEC 61850 Standard
On the Implementation and Security Analysis of Routable-GOOS...
收藏 引用
IEEE International Conference on Environment and Electrical Engineering (EEEIC) / IEEE Industrial and Commercial Power Systems Europe (I and CPS Europe) Conference
作者: Kharchouf, Ibtissam Alrashide, Abdulmeen Abdelrahman, Mahmoud S. Mohammed, Osama A. Florida Int Univ Dept Elect & Comp Engn Energy Syst Res Lab Miami FL 33174 USA
Advanced smart grid applications such as wide-area monitoring, protection, and control (WAMPAC), considerably depend on the synchrophasor measurements gathered from different locations of the power grid. These timesta... 详细信息
来源: 评论
Enhanced Security for Cloud Storage using Linear Block Cipher Algorithm  1
Enhanced Security for Cloud Storage using Linear Block Ciphe...
收藏 引用
International Conference on Cloud Computing (ICCC)
作者: Kuppuswamy, Prakash Rekha, S. Nithya Jazan Univ Dept Comp Engn & Networks Jazan Saudi Arabia Qassim Private Coll Dept Comp Sci & Engn Buraydah Saudi Arabia
Cloud Computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. Cloud computing is most interesting and enticing technology ... 详细信息
来源: 评论
A Secure SDN Framework Based on Ultra-Low Power Microcontrollers
A Secure SDN Framework Based on Ultra-Low Power Microcontrol...
收藏 引用
IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
作者: Yurchenko, Mikhail A. Karavaev, Dmitry A. Stepanov, Andrey B. Vladimirov, Sergey S. Vladyko, Andrei G. Bonch Bruevich St Petersburg State Univ Telecommu St Petersburg Russia
This article discusses the issue of implementing a secure network connection between SDN nodes on an ultra-low-power element base. Analyzed various cryptographic algorithms (ECDH, AES, RSA, Blowfish and additive strea... 详细信息
来源: 评论
Improving Database Security in Cloud Computing by Fragmentation of Data
Improving Database Security in Cloud Computing by Fragmentat...
收藏 引用
International Conference on Computer and Applications (ICCA)
作者: Alsirhani, Amjad Bodorik, Peter Sampalli, Srinivas Dalhousie Univ Fac Comp Sci Halifax NS Canada
Cloud computing is a technology that facilitates numerous configurable resources in which the data is stored and managed in a decentralized manner. However, since the data is out of the owner's control, concerns h... 详细信息
来源: 评论
Routing Protocol Security for Low-Power and Lossy Networks in the Internet of Things  9th
Routing Protocol Security for Low-Power and Lossy Networks i...
收藏 引用
9th International Conference on Big Data Analytics (BDA)
作者: Patel, Akshet Shanmugapriya, D. Srivastava, Gautam Lin, Jerry Chun-Wei Manipal Univ Jaipur Dept Mech Engn Jaipur Rajasthan India Vivekanandha Coll Engn Women Dept Comp Sci Elaiyampalayam India Brandon Univ Dept Math & Comp Sci Brandon MB Canada Western Norway Univ Appl Sci Dept Comp Sci Elect Engn & Math Sci Bergen Norway
The Internet of Things (IoT) is a two-decade-old technology that allows the interconnection of various cyber-physical objects located anywhere in the world over the internet. A cyber-physical object is an inanimate ob... 详细信息
来源: 评论
QFESTA: Efficient algorithms and Parameters for FESTA Using Quaternion Algebras  44th
QFESTA: Efficient Algorithms and Parameters for FESTA Using ...
收藏 引用
44th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
作者: Nakagawa, Kohei Onuki, Hiroshi NTT Social Informat Labs Minato City Japan Univ Tokyo Bunkyo City Japan
In 2023, Basso, Maino, and Pope proposed FESTA (Fast encryption from Supersingular Torsion Attacks), an isogeny-based public-key encryption (PKE) protocol that uses the SIDH attack for decryption. In the same paper, t... 详细信息
来源: 评论
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC algorithms FOR CLOUD SECURITY  2
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD S...
收藏 引用
International Conference on Inventive Communication and Computational Technologies (ICICCT)
作者: Vennela, G. Sai Varun, N. Venkata Neelima, N. Priya, L. Sai Yeswanth, J. VR Siddhartha Engn Coll Dept Informat Technol Vijayawada Andhra Pradesh India VR Siddhartha Engn Coll Dept IT Vijayawada Andhra Pradesh India
Cloud generally relates to storing, processing and managing of data over a network. The cloud provides mainly three services, storage as a service, platform as a service and software as a service using internet, based... 详细信息
来源: 评论