咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 388 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
388 条 记 录,以下是251-260 订阅
排序:
Image Cryptography using AES-256 Algorithm
Image Cryptography using AES-256 Algorithm
收藏 引用
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity, ICDSCNC 2024
作者: Chandel, Taniska Gangodkar, Ninad Gautam, Abhiraj Lohumi, Yogesh Ghazi, Mohd Rehan Goyal, Ashtha University Department of Computer Science and Engineering Dehradun India Graphic Era Hill University School of Computing Dehradun India
Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing use of social networking, ... 详细信息
来源: 评论
Research on encryption Protection of Patients’ Electronic Medical Privacy Data from the Legal Perspective
收藏 引用
International Journal of Network Security 2024年 第5期26卷 761-766页
作者: Wang, Feng Yang, Fei Tibet Police College The Tibet Autonomous Region No. 68 Duodi Road Chengguan District Lasa City850000 China
The medical privacy of patients is protected by law. This paper briefly introduces the legal basis of medical privacy protection and the attribute-based encryption algorithm used for encrypting medical privacy data. A... 详细信息
来源: 评论
Public-key encryption from a trapdoor one-way embedding of SL2()
arXiv
收藏 引用
arXiv 2024年
作者: Hines, Robert
We obfuscate words of a given length in a free monoid on two generators with a simple factorization algorithm (namely SL2()) to create a public-key encryption scheme. We provide a reference implementation in Python an... 详细信息
来源: 评论
Secure Biometric Lock System for Files and Applications: A Review  16
Secure Biometric Lock System for Files and Applications: A R...
收藏 引用
16th IEEE International Colloquium on Signal Processing and its Applications (CSPA)
作者: Ishak, Zurida Rajendran, Narmitha Al-Sanjary, Omar Ismael Razali, Noor Afiza Mat Management & Sci Univ Informat Sci & Comp ISC Shah Alam Selangor Malaysia
A biometric system is a developing innovation which is utilized in different fields like forensics and security system. Finger recognition is the innovation that confirms the personality of an individual which relies ... 详细信息
来源: 评论
Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
Deployment of Application on Cloud and Enhanced Data Securit...
收藏 引用
International Conference on Advanced Communication Control and Computing Technologies*
作者: Puri, Neha A. Karare, Ajay R. Dharmik, Rajesh. C. YCCE Dept IT Nagpur Maharashtra India JDCOEM Dept CSE Nagpur Maharashtra India
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computin... 详细信息
来源: 评论
Memristor-Based Chaotic Circuit Design on Image En/Decryption  31
Memristor-Based Chaotic Circuit Design on Image En/Decryptio...
收藏 引用
31st Youth Academic Annual Conference of Chinese-Association-of-Automation (YAC)
作者: Hu, Qingqing Yu, Yongbin Men, Lefei Lei, Fei Zhang, Huan Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Sichuan Peoples R China
Two kinds of image encryption algorithms based on a three-dimensional chaotic system is presented in this paper. Firstly, a new three-dimensional chaotic circuit based on memristor is designed, and the characteristics... 详细信息
来源: 评论
Application of Genetics algorithms in Cryptography  28
Application of Genetics Algorithms in Cryptography
收藏 引用
28th IEEE International Conference on Intelligent Engineering Systems (INES)
作者: Pekarcik, Peter Chovancova, Eva Chovanec, Martin Stancel, Martin Tech Univ Kosiciach Fak Elektrotechn Informat Katedra Pocitacov Informat Letna 9 Kosice 04200 Slovakia
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathem... 详细信息
来源: 评论
On the Gini-impurity Preservation For Privacy Random Forests  37
On the Gini-impurity Preservation For Privacy Random Forests
收藏 引用
37th Conference on Neural Information Processing Systems (NeurIPS)
作者: Xie, Xin-Ran Yuan, Man-Jie Bai, Xue-Tong Gao, Wei Zhou, Zhi-Hua Nanjing Univ Natl Key Lab Novel Software Technol Nanjing Peoples R China Nanjing Univ Sch Artificial Intelligence Nanjing Peoples R China
Random forests have been one of the successful ensemble algorithms in machine learning. Various techniques have been utilized to preserve the privacy of random forests, such as anonymization, differential privacy, hom... 详细信息
来源: 评论
Hybrid Algorithm for Secure Routing in MANET Using Cryptographic Applications
Hybrid Algorithm for Secure Routing in MANET Using Cryptogra...
收藏 引用
2024 IEEE International Conference on Electronic Systems and Intelligent Computing, ICESIC 2024
作者: Muruganandam, S. Gnanavel, S. Narayana, K.E. Jaeyalakshmi, M. Antony Kumar, K. Panimalar Engineering College Department of Computer Science and Business Systems Chennai India SRM Institute of Science and Technology Kattankulathur Campus Faculty of Engineering and Technology Department of Computing Technologies Chengalpattu India Rajalakshmi Engineering College Department of Information Technology Chennai India Rajalakshmi Engineering College Department of Computer Science and Engineering Chennai India Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology Department of Computer Science and Engineering Chennai India
In Mobile sensor Networks, Each and every wireless node dynamically changes its location due to its mobility nature. The routing information is maintained by the master node to deliver a data packet from source to des... 详细信息
来源: 评论
Evaluation of Cryptography Algorithm Based on Digital Identity Authentication  11th
Evaluation of Cryptography Algorithm Based on Digital Identi...
收藏 引用
11th International Conference on Applications and Techniques in Cyber Intelligence, ATCI 2023
作者: Zhang, Liang Sheng, Jianqiao Zhang, Yicao Wu, Qiuyang State Grid Anhui Electric Power Co. Ltd. Information and Communication Branch Anhui Hefei China
Cryptography algorithm is an important means to achieve identity authentication, and it is also a key technology to achieve identity authentication. In recent years, cryptography algorithms have been widely used in th... 详细信息
来源: 评论