咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 287 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 107 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 86 篇 电气工程
    • 52 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 24 篇 交通运输工程
    • 24 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 137 篇 理学
    • 90 篇 数学
    • 42 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
  • 61 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 391 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 data security
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
391 条 记 录,以下是231-240 订阅
Quantum Randomness and Key Hashing in SSH Authentication Across Asymmetric Cryptographic algorithms  2
Quantum Randomness and Key Hashing in SSH Authentication Acr...
收藏 引用
2nd IEEE Global Conference on Communications and Information Technologies, GCCIT 2024
作者: Mohamed Yaqub, A. Sudikshan, S. Navin Balaji, E. Adarsh, A. Gayathri, M. Srm Institute of Science and Technology Department of Computing Technologies Tamilnadu Chennai603203 India Srm Institute of Science and Technology Department of Networking and Communications Tamilnadu Chennai603203 India
In the ever-evolving field of cybersecurity, randomness plays a critical role in cryptographic systems. Traditional pseudo-random number generators, while widely used, can be vulnerable to attacks due to their determi... 详细信息
来源: 评论
Analysis of Post-Quantum Cryptographic algorithms: A Systematic Literature Review  17th
Analysis of Post-Quantum Cryptographic Algorithms: A System...
收藏 引用
17th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2024 and the 15th International Conference on EUropean Transnational Education, ICEUTE 2024
作者: de la Puente Secades, Francisco Javier Esteban-Costales, Gonzalo Campazas-Vega, Adrián Álvarez-Aparicio, Claudia Matellán-Olivera, Vicente Guerrero-Higueras, Ángel Manuel Supercomputación Castilla y León Edificio CRAI-TIC. Campus de Vegazana s/n León24071 Spain Robotics Group University of León Edificio MIC. Campus de Vegazana s/n León24071 Spain
Due to the significant advancement in quantum computational capability, there has been a race to develop algorithms capable of withstanding attacks stemming from this emerging technology. In response to this need, the... 详细信息
来源: 评论
Symmetric Cipher for Grayscale Images Based on Quantum Differential Geometry  21
Symmetric Cipher for Grayscale Images Based on Quantum Diffe...
收藏 引用
21st International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2024
作者: Gonzalez-Ramos, Emmanuel Olvera-Martinez, Luis Cedillo-Hernandez, Manuel Diaz-Rodriguez, Carlos Faustino-Morales, Leonardo Instituto Politecnico Nacional SEPI ESIME Culhuacan Ciudad de Mexico Mexico Universidad Nacional Autonoma de Mexico Facultad de Ciencias Ciudad de Mexico Mexico
The increase in information technologies has generated the need to implement new methodologies to secure the exchange of information. This paper proposes a cryptographic algorithm based on the use of quantum different... 详细信息
来源: 评论
The Cryptographic Algorithm Identification: Using Deep Learning to Empower Smart Grids  3
The Cryptographic Algorithm Identification: Using Deep Learn...
收藏 引用
3rd International Conference on Networking Systems of AI, INSAI 2023
作者: Chen, Mingliang Zhu, Yayun Mei, Lei Zhang, Xiaojuan Yuan, Sheng Hu, Baiji State Grid Jiangxi Electric Power Co. Ltd. Nanchang China China Electric Power Research Institute Co. Ltd. Beijing China University of Electronic Science and Technology of China Chengdu China
The smart grid has now been fully implemented with a robust defense system that is built on the primary security principles of "security zoning, network specialization, horizontal isolation, and vertical authenti... 详细信息
来源: 评论
Time Complexity Analysis of Attacking RSA Using Probabilistic Factorization Algorithm in Python  8
Time Complexity Analysis of Attacking RSA Using Probabilisti...
收藏 引用
8th International Conference on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2024
作者: Dewi, Soraya Triutami Yolandito, Richy Vernando Faisal School of Computer Science Bina Nusantara University Mathematics Department Jakarta11480 Indonesia
This paper analyzes the time complexity of attacks on the RSA cryptosystem by focusing on the factoring of the modulus n. The RSA algorithm is widely used for secure data transmission, and its security relies on the c... 详细信息
来源: 评论
Hybrid Cipher:AES-RC4 Fusion  4
Hybrid Cipher:AES-RC4 Fusion
收藏 引用
4th International Conference on Power, Energy, Control and Transmission Systems, ICPECTS 2024
作者: Baskaran, M. Santhosh, P. Sree Tapas Ranjan, D.S. Thirumurugan, S. Abishakan, M. Sri Sairam Engineering College Department of Electronics and Communication Engineering Chennai India
This paper presents the novel hybrid encryption algorithm based on the combination of strength of Advanced encryption Standard and Rivest Cipher 4. The substitution- permutation network of AES provides a strong basis ... 详细信息
来源: 评论
Are Your Keys Protected? Time Will Tell  5
Are Your Keys Protected? Time Will Tell
收藏 引用
5th Conference on Information-Theoretic Cryptography, ITC 2024
作者: Dov, Yoav Ben David, Liron Naor, Moni Tzalik, Elad Weizmann Institute of Science Rehovot Israel
Side channel attacks, and in particular timing attacks, are a fundamental obstacle to obtaining secure implementation of algorithms and cryptographic protocols, and have been widely researched for decades. While crypt... 详细信息
来源: 评论
A Mobile Adaptive Elliptic Curve Cryptography Technique for Internet of Things Device
A Mobile Adaptive Elliptic Curve Cryptography Technique for ...
收藏 引用
2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Adeniyi, Abidemi Emmanuel Gbenga Jimoh, Rasheed Bowen University College of Computing and Communication Studies Department of Computer Science Iwo Nigeria University of Ilorin Faculty of Communication and Information Sciences Department of Computer Science Ilorin Nigeria
Cryptography is a bedrock of IoT security, and elliptic curve cryptography (ECC) has been recognized as a potential option due to its effectiveness and robust security qualities. The heterogeneous nature of IoT deploy... 详细信息
来源: 评论
Histogram Publication with Shuffled Differential Privacy  24
Histogram Publication with Shuffled Differential Privacy
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Gao, Yiming Yang, Xiaopeng Wu, Tong Zhou, Yuqian College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
In this paper, we propose a histogram publication algorithm HP-SDP (histogram publication with shuffled differential privacy) for the existing histogram publication methods, which is difficult to effectively balance t... 详细信息
来源: 评论
Research on Cryptography Based on Quantum-Resistant algorithms
Research on Cryptography Based on Quantum-Resistant Algorith...
收藏 引用
2024 International Conference on Electronics and Devices, Computational Science, ICEDCS 2024
作者: Yu, Zhouke Hunan University Changsha410082 China
In this paper, we discuss the challenges of quantum computing to traditional cryptography and the latest development of post-quantum cryptography as a coping strategy. As quantum computing advances, cryptographic algo... 详细信息
来源: 评论