咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是261-270 订阅
排序:
Application of Genetics algorithms in Cryptography  28
Application of Genetics Algorithms in Cryptography
收藏 引用
28th IEEE International Conference on Intelligent Engineering Systems (INES)
作者: Pekarcik, Peter Chovancova, Eva Chovanec, Martin Stancel, Martin Tech Univ Kosiciach Fak Elektrotechn Informat Katedra Pocitacov Informat Letna 9 Kosice 04200 Slovakia
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathem... 详细信息
来源: 评论
On the Gini-impurity Preservation For Privacy Random Forests  37
On the Gini-impurity Preservation For Privacy Random Forests
收藏 引用
37th Conference on Neural Information Processing Systems (NeurIPS)
作者: Xie, Xin-Ran Yuan, Man-Jie Bai, Xue-Tong Gao, Wei Zhou, Zhi-Hua Nanjing Univ Natl Key Lab Novel Software Technol Nanjing Peoples R China Nanjing Univ Sch Artificial Intelligence Nanjing Peoples R China
Random forests have been one of the successful ensemble algorithms in machine learning. Various techniques have been utilized to preserve the privacy of random forests, such as anonymization, differential privacy, hom... 详细信息
来源: 评论
Hybrid Algorithm for Secure Routing in MANET Using Cryptographic Applications
Hybrid Algorithm for Secure Routing in MANET Using Cryptogra...
收藏 引用
2024 IEEE International Conference on Electronic Systems and Intelligent Computing, ICESIC 2024
作者: Muruganandam, S. Gnanavel, S. Narayana, K.E. Jaeyalakshmi, M. Antony Kumar, K. Panimalar Engineering College Department of Computer Science and Business Systems Chennai India SRM Institute of Science and Technology Kattankulathur Campus Faculty of Engineering and Technology Department of Computing Technologies Chengalpattu India Rajalakshmi Engineering College Department of Information Technology Chennai India Rajalakshmi Engineering College Department of Computer Science and Engineering Chennai India Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology Department of Computer Science and Engineering Chennai India
In Mobile sensor Networks, Each and every wireless node dynamically changes its location due to its mobility nature. The routing information is maintained by the master node to deliver a data packet from source to des... 详细信息
来源: 评论
Exact Soft Analytical Side-Channel Attacks using Tractable Circuits  41
Exact Soft Analytical Side-Channel Attacks using Tractable C...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wedenig, Thomas Nagpal, Rishub Cassiers, Gaëtan Mangard, Stefan Peharz, Robert Institute of Theoretical Computer Science Graz University of Technology Graz Austria Institute of Applied Information Processing and Communications Graz University of Technology Graz Austria UCLouvain Ottignies-Louvain-la-Neuve Belgium
Detecting weaknesses in cryptographic algorithms is of utmost importance for designing secure information systems. The state-of-the-art soft analytical side-channel attack (SASCA) uses physical leakage information to ... 详细信息
来源: 评论
Evaluation of Cryptography Algorithm Based on Digital Identity Authentication  11th
Evaluation of Cryptography Algorithm Based on Digital Identi...
收藏 引用
11th International Conference on Applications and Techniques in Cyber Intelligence, ATCI 2023
作者: Zhang, Liang Sheng, Jianqiao Zhang, Yicao Wu, Qiuyang State Grid Anhui Electric Power Co. Ltd. Information and Communication Branch Anhui Hefei China
Cryptography algorithm is an important means to achieve identity authentication, and it is also a key technology to achieve identity authentication. In recent years, cryptography algorithms have been widely used in th... 详细信息
来源: 评论
A Proof of unsecure in the polynomial time for the XOR of two random variables  14
A Proof of unsecure in the polynomial time for the XOR of tw...
收藏 引用
14th International Conference on Information Technology in Medicine and Education, ITME 2024
作者: Wu, Huiwen Liu, Chenglian Software Engineering Institute of Guangzhou Department of Networking Technology Guangzhou510900 China
Xoring (Exclusive-OR) two variables is a very simple way to build pseudorandom functions from pseudorandom permutations. The aim of this paper proves it may insecure for this type of form A⊕B when the two variables r... 详细信息
来源: 评论
A Study of Quantum-Secret Communication Technology and Its Application in Industrial IoT
A Study of Quantum-Secret Communication Technology and Its A...
收藏 引用
2024 International Conference on Innovative Design and Intelligent Manufacturing, IDIM 2024
作者: Peng, Dili Dong, Wu Chen, Xiaojin Peng, Linyu Chen, Keyu Long, Jiao Yan, Binyang Power Dispatching Control Center of Guizhou Power Grid Guiyang550002 China Guizhou Power Grid Co. Ltd. Guiyang Power Supply Bureau 550002 China
In order to achieve the balance between informatization and security in the process of using the Internet of Things, quantum secure communication technology and its application in the industrial Internet of Things wer... 详细信息
来源: 评论
A Time-based Secured Framework for Key-Exchange Between Trusted Parties: Quantum-Key Distribution Protocol
A Time-based Secured Framework for Key-Exchange Between Trus...
收藏 引用
2024 IEEE Silchar Subsection Annual Conference, SILCON 2024
作者: Bindu Madavi, K.P. Krishna Sowjanya, K. Patwari, Neha Shobharani, D.A. Christ University Dept. of Cse Bengaluru India Cmr Institute of Technology Dept. of Cse Bengaluru India Thakur College of Engineering & Technology Dept. of Cse Mumbai India Gitam University Dept. of Cse Bengaluru India
Cybersecurity attacks are rising day by day due to the explosive growth of the internet. Many encryption techniques and authentication mechanisms also came into existence to avoid or minimize cybersecurity attacks. Ho... 详细信息
来源: 评论
Safeguarding Privacy for Cloud Computing's Encrypted Data Using Association Rule Mining Algorithm and FP Growth Algorithm  3
Safeguarding Privacy for Cloud Computing's Encrypted Data Us...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Mohanapriya, D. Anu, P. Kalyani, N. Rekha, S. Praba, R. Sasikala, S. Psg College of Arts & Science Department of Computer Science Tamilnadu Coimbatore India School of Computing Sastra Deemed to be University Tamilnadu Thanjavur India Dr. N. G. P. Arts and Science College Department of Information Technology Tamilnadu Coimbatore India Tamilnadu Coimbatore India
In an effort to support data privacy, safeguarding privacy guidelines for association mining techniques have recently been presented. Nevertheless, the algorithms are unable to conceal data frequency and have an extra... 详细信息
来源: 评论
Analysis and strategy development for improving the performance of the Paillier cryptosystem algorithm in medical data processing  4
Analysis and strategy development for improving the performa...
收藏 引用
4th International Workshop on Information Technologies: Theoretical and Applied Problems, ITTAP 2024
作者: Semchyshyn, Volodymyr Mykhalyk, Dmytro Ternopil Ivan Puluj National Technical University 1 Ruska str 56 Ternopil46001 Ukraine
The Paillier cryptosystem, known for its additive homomorphic properties, plays a crucial role in preserving the confidentiality of computations with encrypted medical data. However, its computational complexity poses... 详细信息
来源: 评论