咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是211-220 订阅
排序:
Reviewing Crypto-Agility and Quantum Resistance in the Light of Agile Practices
Reviewing Crypto-Agility and Quantum Resistance in the Light...
收藏 引用
24th International Conference on Agile Software Development (XP)
作者: Marchesi, Lodovica Marchesi, Michele Tonelli, Roberto Univ Cagliari Dept Math & Comp Sci Cagliari Italy
The term crypto-agility means the ability to quickly and securely change cryptographic algorithms and related data, in the case of their compromise. In this context, the advent of quantum computing constitutes a new p... 详细信息
来源: 评论
Large Integer Decomposition encryption Algorithm for Computer Network Data Communication Combined with Double BP Neural Network Combination Model
收藏 引用
Procedia Computer Science 2023年 228卷 609-618页
作者: Dengjun Li Shujie Xiong Gang Yuan Jiangxi Provincial Party School Jiangxi Institute of Administration Nanchang Jiangxi 330000 China Jiangxi Electric Vocational Technical College Nanchang Jiangxi 330000 China
Usually a complete computer network system has the following components: source of signals, signal host, cryptographic regime, attack, and interceptor. It is more vulnerable to attacks during the operation of the syst... 详细信息
来源: 评论
Some Graph Based encryption Techniques
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2727-2734页
作者: Narayan, H Dhanvanth Bhat, Surekha Ravishankar Bhat, Ravishankar Bhat, Smitha Ganesh Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India Department of Mathematics Milagres College Kallianpur Karnataka Udupi574111 India Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India
In today’s fast-evolving technological environment, ensuring confidentiality is of utmost importance. Cryptography stands as a critical discipline in safeguarding information from unauthorized access. It employs vari... 详细信息
来源: 评论
AES-AUDIO: An encryption Scheme for Audio Supporting Differentiated Decryption
收藏 引用
IEEE Transactions on Multimedia 2024年 27卷 2268-2280页
作者: Zhao, Ruoyu Zhang, Yushu Ji, Junhao Yi, Shuang Wen, Wenying Lan, Rushi Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China Southwest University of Political Science and Law Criminal Investigation School Chongqing401120 China Jiangxi University of Finance and Economics School of Computer and Artificial Intelligence Nanchang330013 China Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin541004 China
In this paper, we propose an audio encryption scheme that supports differentiated decryption, called AES-AUDIO, in which an audio only needs to be encrypted once and can be decrypted into different resolutions as need... 详细信息
来源: 评论
A Novel Effective Framework for Medical Images Secure Storage Using Advanced Cipher Text Algorithm in Cloud Computing
A Novel Effective Framework for Medical Images Secure Storag...
收藏 引用
IEEE International Conference on Imaging Systems and Techniques (IST)
作者: Praveen, S. Phani Sindhura, S. Madhuri, A. Karras, Dimitrios A. PVPSIT Dept Comp Sci & Engn Vijayawada AP India KoneruLakshmaiah Educ Fdn Dept Comp Sci & Engn Vaddeswaram AP India Natl & Kapodistrian Univ Athens NKUA Dept Gen Fac Sci Athens Greece
Cloud computing is one of the emerging technologies in present world. Many cloud computing services such as data storage, data usage and other types of services are available. Medical images storage is most widely use... 详细信息
来源: 评论
Employing Quantum Mechanics for Quantum Cryptography
Employing Quantum Mechanics for Quantum Cryptography
收藏 引用
International Conference on Computational Science and Computational Intelligence (CSCI)
作者: Abhanu, Rasika Aruigu, Naveen Bale, Sowmya Beeram, Geethanjali Bhattu, Zurendra Sai Raj Mahmoud, Mohammed Clark Univ Sch Profess Studies Worcester MA 01610 USA Univ Jamestown Dept Comp Sci Jamestown ND USA
Quantum cryptography is a field of study that explores the use of quantum mechanics to create new cryptographic techniques that are more secure than traditional cryptography. With the advancement of quantum computing ... 详细信息
来源: 评论
Security Data Management Process and its Impact on Smart Cities' Wireless Sensor Networks
Security Data Management Process and its Impact on Smart Cit...
收藏 引用
Conference on South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media (SEEDA-CECNSM)
作者: Antonopoulos, K. Petropoulos, Ch. Antonopoulos, Ch. P. Voros, N. S. TEI Western Greece Comp & Informat Engn Dept Antirio Greece
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scen... 详细信息
来源: 评论
Enhancing Protection Techniques of E-Banking Security Services Using Open Source Cryptographic algorithms
Enhancing Protection Techniques of E-Banking Security Servic...
收藏 引用
14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
作者: Khelifi, Adel Aburrous, Maher Abu Talib, Manar Shastry, P. V. S. ALHOSN Univ Software Engn Dept Abu Dhabi U Arab Emirates Zayed Univ Coll Technol Innovat Abu Dhabi U Arab Emirates Coll Engn Elect & Telecomm Dept Pune 411052 Maharashtra India
security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long ti... 详细信息
来源: 评论
Security Necessity and its Impact on Smart Cities' Wireless Sensor Networks
Security Necessity and its Impact on Smart Cities' Wireless ...
收藏 引用
Conference on South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media (SEEDA-CECNSM)
作者: Antonopoulos, K. Petropoulos, Ch. Antonopoulos, Ch. P. Voros, N. S. TEI Western Greece Comp & Informat Engn Dept Antirio Greece
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scen... 详细信息
来源: 评论
IoT Agile Framework Enhancement  1
IoT Agile Framework Enhancement
收藏 引用
1st International Conference on Computer Applications and Information Security (ICCAIS)
作者: Gabr, Badiaa Azer, Marianne A. Nile Univ WINC Sheikh Zayed City Egypt Nile Univ Natl Telecommun Inst Sheikh Zayed City Egypt
Internet of Things (IoT) is considered as a trend nowadays. Devices connected to the internet interact with surrounding;this poses strong challenges in handling big data with a certain level of security. In this paper... 详细信息
来源: 评论