咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 287 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 107 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 86 篇 电气工程
    • 52 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 24 篇 交通运输工程
    • 24 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 137 篇 理学
    • 90 篇 数学
    • 42 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
  • 61 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 391 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 data security
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
391 条 记 录,以下是251-260 订阅
排序:
An Efficient Implementation of the Montgomery Algorithm Using the Akushsky Core Function  1
收藏 引用
International Workshop on Advanced in Information Security Management and Applications, AISMA 2023
作者: Lutsenko, Vladislav Bezuglova, Ekaterina North Caucasus Center for Mathematical Research North-Caucasus Federal University Stavropol Russia
This paper examines the practical implementation of the Montgomery algorithm in asymmetric cryptosystems using the Residue Number System. Residue Number System enables concurrent computations of additions and multipli... 详细信息
来源: 评论
Optimization and Security Analysis of Adversarial Neural Cryptography Applications  6
Optimization and Security Analysis of Adversarial Neural Cry...
收藏 引用
6th IEEE International Conference on Civil Aviation Safety and Information Technology, ICCASIT 2024
作者: Zhang, Zhiwen Nankai University College of Cyber Science Tianjin China
Compared with traditional cryptographic algorithms, neural network encryption algorithm is more aggressive, which is one of the hot issues in the field of intelligent cryptanalysis. In this paper, a simple improvement... 详细信息
来源: 评论
Research on the Rapid Realization of SM4 in CBC Mode  8th
Research on the Rapid Realization of SM4 in CBC Mode
收藏 引用
8th International Conference on Computing, Control and Industrial Engineering, CCIE 2024
作者: Lin, Xiuqing Jiang, Wenqian Li, Jinjin Chen, Jueyu Huang, Keying Measurement Center of Guangxi Power Grid Co. Ltd. Nanning China
The GSMA RSP standard defines a number of security mechanisms including secure communication assurance, data encryption and identity authentication. Profile encryption technology is the core algorithm of the RSP stand... 详细信息
来源: 评论
Image Cryptography using AES-256 Algorithm
Image Cryptography using AES-256 Algorithm
收藏 引用
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity, ICDSCNC 2024
作者: Chandel, Taniska Gangodkar, Ninad Gautam, Abhiraj Lohumi, Yogesh Ghazi, Mohd Rehan Goyal, Ashtha University Department of Computer Science and Engineering Dehradun India Graphic Era Hill University School of Computing Dehradun India
Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing use of social networking, ... 详细信息
来源: 评论
Research on encryption Protection of Patients’ Electronic Medical Privacy Data from the Legal Perspective
收藏 引用
International Journal of Network Security 2024年 第5期26卷 761-766页
作者: Wang, Feng Yang, Fei Tibet Police College The Tibet Autonomous Region No. 68 Duodi Road Chengguan District Lasa City850000 China
The medical privacy of patients is protected by law. This paper briefly introduces the legal basis of medical privacy protection and the attribute-based encryption algorithm used for encrypting medical privacy data. A... 详细信息
来源: 评论
Public-key encryption from a trapdoor one-way embedding of SL2()
arXiv
收藏 引用
arXiv 2024年
作者: Hines, Robert
We obfuscate words of a given length in a free monoid on two generators with a simple factorization algorithm (namely SL2()) to create a public-key encryption scheme. We provide a reference implementation in Python an... 详细信息
来源: 评论
Secure Biometric Lock System for Files and Applications: A Review  16
Secure Biometric Lock System for Files and Applications: A R...
收藏 引用
16th IEEE International Colloquium on Signal Processing and its Applications (CSPA)
作者: Ishak, Zurida Rajendran, Narmitha Al-Sanjary, Omar Ismael Razali, Noor Afiza Mat Management & Sci Univ Informat Sci & Comp ISC Shah Alam Selangor Malaysia
A biometric system is a developing innovation which is utilized in different fields like forensics and security system. Finger recognition is the innovation that confirms the personality of an individual which relies ... 详细信息
来源: 评论
Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
Deployment of Application on Cloud and Enhanced Data Securit...
收藏 引用
International Conference on Advanced Communication Control and Computing Technologies*
作者: Puri, Neha A. Karare, Ajay R. Dharmik, Rajesh. C. YCCE Dept IT Nagpur Maharashtra India JDCOEM Dept CSE Nagpur Maharashtra India
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computin... 详细信息
来源: 评论
Memristor-Based Chaotic Circuit Design on Image En/Decryption  31
Memristor-Based Chaotic Circuit Design on Image En/Decryptio...
收藏 引用
31st Youth Academic Annual Conference of Chinese-Association-of-Automation (YAC)
作者: Hu, Qingqing Yu, Yongbin Men, Lefei Lei, Fei Zhang, Huan Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Sichuan Peoples R China
Two kinds of image encryption algorithms based on a three-dimensional chaotic system is presented in this paper. Firstly, a new three-dimensional chaotic circuit based on memristor is designed, and the characteristics... 详细信息
来源: 评论
Application of Genetics algorithms in Cryptography  28
Application of Genetics Algorithms in Cryptography
收藏 引用
28th IEEE International Conference on Intelligent Engineering Systems (INES)
作者: Pekarcik, Peter Chovancova, Eva Chovanec, Martin Stancel, Martin Tech Univ Kosiciach Fak Elektrotechn Informat Katedra Pocitacov Informat Letna 9 Kosice 04200 Slovakia
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathem... 详细信息
来源: 评论