咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 388 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
388 条 记 录,以下是281-290 订阅
Low-Cost Secure Information Transmission Using Cryptography Multi layer Algorithm  2
Low-Cost Secure Information Transmission Using Cryptography ...
收藏 引用
2nd IEEE Global Conference on Communications and Information Technologies, GCCIT 2024
作者: Rajendra Prasad, P. Navaneeth, N. Ramaiah Institute of Technology Department of Electronics and Communication Engineering Bangalore India
In this proposed work, a new strategy for improving data security is presented. This approach makes use of multilayer Linear Feedback Shift Register (LFSR) cryptographic algorithms. The purpose of this approach is to ... 详细信息
来源: 评论
Applying Identity-Based Security algorithms to Cloud Computing Networks  15
Applying Identity-Based Security Algorithms to Cloud Computi...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Lora, Chandra Prakash Sandeep, V. Sinha, Rajeev Kumar Vivekananda Global University Department of Chemistry Jaipur India School of Engineering and Technology Department of Mechanical Engineering Karnataka Bangalore India ARKA JAIN University Department of Management Jharkhand Jamshedpur India
Identification-based protection algorithms are cryptographic algorithms that provide authentication and facts integrity by verifying the identities of customers or resources inside a gadget. Such algorithms may be app... 详细信息
来源: 评论
Hybrid series-parallel polynomial multiplier based on karatsuba algorithm  9
Hybrid series-parallel polynomial multiplier based on karats...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, ISAEECE 2024
作者: Yang, Liu Tian, Jing Song, Suwen Wang, Zhongfeng Nanjing University Nanjing China Sun Yat-sen University Guangzhou China
Polynomial multiplication leads to a significant computational and spatial burden in cryptographic algorithms, posing challenges to optimization endeavors. In this work, we propose a hybrid series-parallel polynomial ... 详细信息
来源: 评论
A Dual-Layer Approach: Combining Lightweight and Dynamic RSA for Enhanced Data Security  5
A Dual-Layer Approach: Combining Lightweight and Dynamic RSA...
收藏 引用
5th IEEE International Conference on Communication, Computing and Industry 6.0, C2I6 2024
作者: Balaji, R. Sriraam, C. Lionel Donato, L. Ragav, Krithin Kanthimathi, S. Vellore Institute of Technology School of Computer Science and Engineering TamilNadu Chennai India
An important aspect for both individuals and business data is security. Security has been studied extensively by many researchers. Security gaps or threats are ever increasing, and data protection is a primary issue. ... 详细信息
来源: 评论
Analysis of Two Papers Based on RSA Algorithm: Plagiarism Investigation of HRSA Algorithm  14
Analysis of Two Papers Based on RSA Algorithm: Plagiarism In...
收藏 引用
14th International Conference on Information Technology in Medicine and Education, ITME 2024
作者: Liu, Zhiying Cao, Chunhua Xu, Ruopengyu Liu, Chenglian Bi, Passino K. M. Software Engineering Institute of Guangzhou Department of Network Technology Guangdong China Foshan University Guangdong China
The RSA algorithm, as one of the cornerstones in the field of cyber security, has always received widespread attention and research. Many scholars have published relevant research papers. This article focuses on the h... 详细信息
来源: 评论
IoT Security Based On Lightewight Cryptographic (LWC) algorithms: A survey  25
IoT Security Based On Lightewight Cryptographic (LWC) Algori...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al-Mousa, Mohammad Rasmi Suleiman Al-Zou'bi, Samah Askar, Sami Alqawasmi, Khaled Al-Sherideh, Ala'a Saeb Samara, Ghassan Almatarneh, Rami Khouj, Mohammed Odeh, Mahmoud Zarqa University Department of Cybersecurity Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
The Internet of Things is millions of devices that communicate with each other and transmit sensitive information between them. The information is collected through the sensors on these devices, and is transmitted bet... 详细信息
来源: 评论
Error Rate Increment of Quantum Computer using Quantity Computational Algorithm Comparing with Deutsch Jozsa Algorithm
Error Rate Increment of Quantum Computer using Quantity Comp...
收藏 引用
2024 OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Kumar, K. Ajay Vimal, V.R. Karthick, V. Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai602105 India
the primary purpose is to investigate the possibility of utilizing quantum algorithms in order to improve the error rate of quantum computing devices. The Components and Procedures: We gathered twenty samples and divi... 详细信息
来源: 评论
Delving into Potential Asymmetric Cryptographic algorithms for the Post-Quantum Era  25
Delving into Potential Asymmetric Cryptographic Algorithms f...
收藏 引用
25th IEEE International Conference of Young Professionals in Electron Devices and Materials, EDM 2024
作者: Juraev, Gayrat U. Mavlonov, Alisher B. Dept. Information Security National University of Uzbekistan Tashkent Uzbekistan Dept. Computer Science Urgench State University Urgench Uzbekistan
In this paper we will look at how quantum computers solve problems used in modern cryptographic systems, and what post-quantum cryptographic systems exist. We focus on the scheme, that developed in the direction of mu... 详细信息
来源: 评论
A Novel Cryptographic Algorithm for Securing Data in Cloud Computing  3rd
A Novel Cryptographic Algorithm for Securing Data in Cloud C...
收藏 引用
3rd International Conference on Artificial-Business Analytics, Quantum and Machine Learning: Trends, Perspectives, and Prospects, Com-IT-Con 2023
作者: Dagur, Arvind Singh, Mani Shakya, Abhay Pratap School of Computing Sciences and Engineering Galgotia’s University Greater Noida India
As increase in the technology like Internet of things and Cloud computing the demand of data security is also increasing. Because the people’s data is not safe on the cloud and the internet. So here the encryption al... 详细信息
来源: 评论
Three-Input Ciphertext Multiplication for Homomorphic encryption
arXiv
收藏 引用
arXiv 2024年
作者: Akherati, Sajjad Tang, Yok Jye Zhang, Xinmiao The Ohio State University OH43210 United States
Homomorphic encryption (HE) allows computations to be directly carried out on ciphertexts and is essential to privacy-preserving computing, such as neural network inference, medical diagnosis, and financial data analy... 详细信息
来源: 评论