咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 285 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 105 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 85 篇 电气工程
    • 51 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 136 篇 理学
    • 89 篇 数学
    • 42 篇 物理学
    • 15 篇 化学
    • 15 篇 统计学(可授理学、...
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 390 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 6 篇 aes
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 rsa
  • 5 篇 des
  • 5 篇 encryption
  • 4 篇 ecc
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 307 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
390 条 记 录,以下是271-280 订阅
排序:
Histogram Publication with Shuffled Differential Privacy  24
Histogram Publication with Shuffled Differential Privacy
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Gao, Yiming Yang, Xiaopeng Wu, Tong Zhou, Yuqian College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
In this paper, we propose a histogram publication algorithm HP-SDP (histogram publication with shuffled differential privacy) for the existing histogram publication methods, which is difficult to effectively balance t... 详细信息
来源: 评论
Performance Analysis of Shor's Algorithm for Integer Factorization Using Quantum and Classical Approaches  10
Performance Analysis of Shor's Algorithm for Integer Factori...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Thamaraimanalan, T. Singh, Bhupendra Mohankumar, M. Korada, Santosh Kumar Sri Eshwar College of Engineering Department of Ece Coimbatore India Cair Drdo Bangalore560093 India
Factoring large numbers poses a significant chal-lenge in contemporary cryptography and security practices. Shor's algorithm presents a remarkable advancement over clas- sical methods by providing exponential acce... 详细信息
来源: 评论
Effective Adaptable Framework for Security of IoT Devices  3
Effective Adaptable Framework for Security of IoT Devices
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Sharma, Cheshta Sharma, Tripti Shri Venkateshwara University Department of Computer Science and Engineering Gajraula India Inderprasth Engineering College Department of Computer Science and Engineering Ghaziabad India
The Internet of Things (IoT) becomes the most demanding technology over the past few years. IoT is the basic need of daily life. The security of these devices is very important because they contain large files of sens... 详细信息
来源: 评论
Delving into Potential Asymmetric Cryptographic algorithms for the Post-Quantum Era  25
Delving into Potential Asymmetric Cryptographic Algorithms f...
收藏 引用
25th IEEE International Conference of Young Professionals in Electron Devices and Materials, EDM 2024
作者: Juraev, Gayrat U. Mavlonov, Alisher B. Dept. Information Security National University of Uzbekistan Tashkent Uzbekistan Dept. Computer Science Urgench State University Urgench Uzbekistan
In this paper we will look at how quantum computers solve problems used in modern cryptographic systems, and what post-quantum cryptographic systems exist. We focus on the scheme, that developed in the direction of mu... 详细信息
来源: 评论
The system of secured user’s credentials transfer
The system of secured user’s credentials transfer
收藏 引用
2024 Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II 2024
作者: Korchenko, Oleksandr Ivanchenko, Yevheniia Ivanchenko, Ihor Pedchenko, Yevhenii Petrovska, Mari State University of Information and Communication Technologies 7 Solomianska str Kyiv03110 Ukraine National Aviation University 1 Liubomyra Huzara ave. Kyiv03058 Ukraine
This paper describes a developed system of secured user credentials transfer from a user’s web browser to a web application server. This paper will describe in detail the operation of an advanced 10-level encryption ... 详细信息
来源: 评论
Secure Key Generation and Distribution at Physical Layer by Using Ultra-Long Fiber Laser  3
Secure Key Generation and Distribution at Physical Layer by ...
收藏 引用
3rd IEEE International Conference on Problems of Informatics, Electronics and Radio Engineering, PIERE 2024
作者: Nyushkov, Boris Korel, Igor Novosibirsk State Technical University Quantum Cryogenic Electronics laboratory Novosibirsk Russia
Secure fiber-optic communication systems are an important area of research and development in the IT industry. In this work, we report the development of a promising fiber laser system for physical-layer secure key ge... 详细信息
来源: 评论
Optimizing AES-256 with Keccak Permutations: Achieving High Security and Performance with Reduced Rounds  15
Optimizing AES-256 with Keccak Permutations: Achieving High ...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Chio, Ma. Esther B. Sison, Ariel M. Medina, Ruji P. Technological Institute of the Philippines Quezon City Philippines University of Science and Technology of Southern Philippines Cagayan de Oro City Philippines Emilio Aguinaldo College Manila Philippines
This study introduces an innovative approach to enhancing AES-256 encryption by integrating the Keccak permutation into its key generation process, aiming to improve both security and performance while reducing the nu... 详细信息
来源: 评论
Improving Blockchain Privacy Security Based on Improved RSA Algorithm  5
Improving Blockchain Privacy Security Based on Improved RSA ...
收藏 引用
5th International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2024
作者: Zeng, Zhejun Lin, Ning Xiao, Qunli Xiao, HengHui Huang, Xubin Ning, Liyan Huang, Yusi Wu, Hongwu Mai, Zhuoqi Hu, Faming Guangdong Planning and Designing Institute of Telecommunication Co. Ltd. Guangdong China Guangdong Communications Services Company Limited Guangdong China
This paper proposes a blockchain privacy encryption scheme based on CRT-RSA algorithm. This encryption scheme decomposes the large integer modular operation of RSA algorithm into two smaller modular operations, which ... 详细信息
来源: 评论
Examining the Efficiency of Implemented Cryptographic algorithms for Blockchain Technologies  15
Examining the Efficiency of Implemented Cryptographic Algori...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Premalatha, K.P. Sahu, Kuldip Kumar Gour, Murli Manohar Department of Management School of Mangement - PG JAIN Karnataka Bangalore India Department of Mechnical Engineering ARKA JAIN University Jharkhand Jamshedpur India Department of Mathematics Vivekananda Global University Jaipur India
This paper explores the performance of implemented cryptography algorithms used for various blockchain technologies, which include Bitcoin, Ethereum, and Hyperledger. Diverse techniques for assessing cryptographic alg... 详细信息
来源: 评论
Research on the Parallel SM4-OFB Acceleration Based on Multiple Rounds of Iteration  3
Research on the Parallel SM4-OFB Acceleration Based on Multi...
收藏 引用
3rd International Conference on Artificial Intelligence and Computer Information Technology, AICIT 2024
作者: Han, Ya Wang, Mingsheng Li, Yongqiang Ren, Lifeng Institute of Information Engineering CAS Key Laboratory of Cyberspace Security Defense Beijing China Chongqing Research Institute of Big Data Peking University Chongqing China
In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte... 详细信息
来源: 评论