咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是221-230 订阅
排序:
IoT Agile Framework Enhancement  1
IoT Agile Framework Enhancement
收藏 引用
1st International Conference on Computer Applications and Information Security (ICCAIS)
作者: Gabr, Badiaa Azer, Marianne A. Nile Univ WINC Sheikh Zayed City Egypt Nile Univ Natl Telecommun Inst Sheikh Zayed City Egypt
Internet of Things (IoT) is considered as a trend nowadays. Devices connected to the internet interact with surrounding;this poses strong challenges in handling big data with a certain level of security. In this paper... 详细信息
来源: 评论
Self-adaptability in Secure Embedded Systems: an Energy-Performance Trade-off
Self-adaptability in Secure Embedded Systems: an Energy-Perf...
收藏 引用
World Congress on Engineering (WCE 2011)
作者: Botezatu, N. Manta, V. Stan, A. Gh Asachi Tech Univ Iasi Fac Automat Control & Comp Engn Iasi Romania
Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem o... 详细信息
来源: 评论
Multilevel Authentication for Vehicular Ad-Hoc Networks with Cryptography Hash Functions
Multilevel Authentication for Vehicular Ad-Hoc Networks with...
收藏 引用
International Conference on Radar, Communication and Computing (ICRCC)
作者: Malathi, M. Divya, P. S. Anusha, M. Rajalakshmi, K. Adhiparasakthi Engg Coll IT Melmaruvathur Tamil Nadu India
Vehicular Ad-Hoc networks (VANET'S) represent a rapidly emerging research field and are considered essential for cooperative driving among vehicles on the road. It is a kind of special wireless ad hoc networks whi... 详细信息
来源: 评论
The Evaluation of Security algorithms on Mobile Platform
The Evaluation of Security Algorithms on Mobile Platform
收藏 引用
IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
作者: Yao, Hong Lian, Lu Fan, Yuanyuan Liang, Qingzhong Yan, Xuesong China Univ Geosci Sch Comp Sci Wuhan 430074 Peoples R China
The rapid development of mobile platform leads to growing demand for network communications, which suffer from increasingly severe security threats as well. Considering the urgent security demand and the limitation of... 详细信息
来源: 评论
Processing Analysis of Confidential Modes of Operation  11th
Processing Analysis of Confidential Modes of Operation
收藏 引用
11th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage (SpaCCS)
作者: Nawaz, Yasir Wang, Lei Ammour, Kamel Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai 200240 Peoples R China
This paper analyzes the processing of cryptographic confidentiality block cipher operation modes on "Advance encryption Standard" recommended by the National Institute of Standards and Technology. The block ... 详细信息
来源: 评论
A New Approach of Object Recognition in Encrypted Images using Convolutional Neural Network  12
A New Approach of Object Recognition in Encrypted Images usi...
收藏 引用
12th International Conference on Machine Vision (ICMV)
作者: Tayari, Zina Hnana, Nasreddine Zaied, Mourad Natl Engn Sch Gabes Gabes Tunisia
One of the major challenges in mobile networks and digital technologies is maintaining the security of real time data. In this regard, the research community developed a lot of works to fulfill this goal by proposing ... 详细信息
来源: 评论
A Survey of different video steganography approaches against man-in-the middle attacks  5
A Survey of different video steganography approaches against...
收藏 引用
5th International Conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC)
作者: Annapurna, V Rao, S. Nagaraja Giriprasad, M. N. JNTUA Ananthapuram Andhra Pradesh India G Pullareddy Engn Coll Dept ECE Kurnool Andhra Pradesh India JNTUA Coll Engn Dept ECE Ananthapuram Andhra Pradesh India
Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party at... 详细信息
来源: 评论
Research and Application of Block Chain Technology in Electricity Market Transactions  4
Research and Application of Block Chain Technology in Electr...
收藏 引用
4th International Conference on Smart Power and Internet Energy Systems (SPIES)
作者: Zhang, Ye Wang, Rongmao Li, Qingchun Xia, Nannan Zhang, Na Hu, Jingwei Liaoning Elect Power Trading Ctr Co Ltd Shenyang Peoples R China State Grid Liaoning Elect Power Co Ltd Econ & Technol Res Inst Shenyang Peoples R China
With the entry of large-scale commercial power users into the market, the electricity trading retail market faces a surge in the number of users, agency relationships, and retail-side settlement. All these pose huge c... 详细信息
来源: 评论
Efficient Synchronous and Asynchronous Folded Architectures of SHA-3  15
Efficient Synchronous and Asynchronous Folded Architectures ...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Reddy, G.R. Sarath Chandra Mohamed Asan Basiri, M. Department of Electronics and Communication Engineering Indian Institute of Information Technology Design and Manufacturing Kurnool518007 India
Secure hash algorithm plays a major role to achieve the integrity in secure data communication. The SHA-3 is the recent crypto hash algorithm recognized by national institute of standards and technology. This paper pr... 详细信息
来源: 评论
Cipherkeyx Algorithm: Cryptographic Block Cipher Algorithm for Secure Machine Learning Authentication  2
Cipherkeyx Algorithm: Cryptographic Block Cipher Algorithm f...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational Science, ICERCS 2024
作者: Nishanthi, G. Thangarasu, N. Karpagam Academy of Higher Education Coimbatore India Karpagam Academy of Higher Education Department of Computer Science Coimbatore India
With increasing cyber threats, secure authentication of users in machine learning systems has never been more necessary. In this paper, we develop the CipherKeyX Algorithm: A novel cryptographic block cipher able to r... 详细信息
来源: 评论