咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 287 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 107 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 86 篇 电气工程
    • 52 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 24 篇 交通运输工程
    • 24 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 137 篇 理学
    • 90 篇 数学
    • 42 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
  • 61 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 391 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 data security
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
391 条 记 录,以下是291-300 订阅
排序:
A Novel Cryptographic Algorithm for Securing Data in Cloud Computing  3rd
A Novel Cryptographic Algorithm for Securing Data in Cloud C...
收藏 引用
3rd International Conference on Artificial-Business Analytics, Quantum and Machine Learning: Trends, Perspectives, and Prospects, Com-IT-Con 2023
作者: Dagur, Arvind Singh, Mani Shakya, Abhay Pratap School of Computing Sciences and Engineering Galgotia’s University Greater Noida India
As increase in the technology like Internet of things and Cloud computing the demand of data security is also increasing. Because the people’s data is not safe on the cloud and the internet. So here the encryption al... 详细信息
来源: 评论
Three-Input Ciphertext Multiplication for Homomorphic encryption
arXiv
收藏 引用
arXiv 2024年
作者: Akherati, Sajjad Tang, Yok Jye Zhang, Xinmiao The Ohio State University OH43210 United States
Homomorphic encryption (HE) allows computations to be directly carried out on ciphertexts and is essential to privacy-preserving computing, such as neural network inference, medical diagnosis, and financial data analy... 详细信息
来源: 评论
Enhancing Data Security of iOS Client by encryption Algorithm
Enhancing Data Security of iOS Client by Encryption Algorith...
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Yuli Shen Hong Wang School of Information Engineering Wuhan University of Technology
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or laptop
来源: 评论
Mutations of Cryptographic algorithms  22
Mutations of Cryptographic Algorithms
收藏 引用
22nd International Conference on Emerging eLearning Technologies and Applications, ICETA 2024
作者: Pekarčík, Peter Chovancová, Eva Technical University of Košice Faculty of Electrical Engineering and Informatics Department of Computers and Informatics Košice Slovakia
Data security aims to achieve confidentiality, integrity, and availability of data. To reach confidentiality, different encryption algorithms are needed. The most used today are RSA, AES, and Diffie-Helman. Although t... 详细信息
来源: 评论
Algebraic Attack on LCB and Improved LCB  1
Algebraic Attack on LCB and Improved LCB
收藏 引用
1st International Conference on Cyber Security and Computing, CyberComp 2024
作者: Sucipta, I Ketut Yudi Susanti, Bety Hayat Siswantyo, Sepha Politeknik Siber dan Sandi negara Cryptography Engineering Bogor Indonesia
Various lightweight block cipher algorithms have been proposed to address the security requirements of Internet of Things (loT) devices, one of which is the Light Cipher Block (LCB). Initially proposed by Roy and coll... 详细信息
来源: 评论
The system of secured user’s credentials transfer
The system of secured user’s credentials transfer
收藏 引用
2024 Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II 2024
作者: Korchenko, Oleksandr Ivanchenko, Yevheniia Ivanchenko, Ihor Pedchenko, Yevhenii Petrovska, Mari State University of Information and Communication Technologies 7 Solomianska str Kyiv03110 Ukraine National Aviation University 1 Liubomyra Huzara ave. Kyiv03058 Ukraine
This paper describes a developed system of secured user credentials transfer from a user’s web browser to a web application server. This paper will describe in detail the operation of an advanced 10-level encryption ... 详细信息
来源: 评论
Performance Analysis of Shor's Algorithm for Integer Factorization Using Quantum and Classical Approaches  10
Performance Analysis of Shor's Algorithm for Integer Factori...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Thamaraimanalan, T. Singh, Bhupendra Mohankumar, M. Korada, Santosh Kumar Sri Eshwar College of Engineering Department of Ece Coimbatore India Cair Drdo Bangalore560093 India
Factoring large numbers poses a significant chal-lenge in contemporary cryptography and security practices. Shor's algorithm presents a remarkable advancement over clas- sical methods by providing exponential acce... 详细信息
来源: 评论
The Built on Feistel Network Architecture Block Ciphers Modification  14
The Built on Feistel Network Architecture Block Ciphers Modi...
收藏 引用
14th International Conference on Advanced Computer Information Technologies, ACIT 2024
作者: Naumenko, Serhii Rozlomii, Inna Yarmilko, Andrii Bohdan Khmelnytsky National University of Cherkasy Department of Information Technologies Cherkasy Ukraine Bohdan Khmelnytsky National University of Cherkasy Department of Automated Systems Software Cherkasy Ukraine
The article considers the method of implementing Shannon's idea of building a cryptographically stable system by repeatedly applying relatively simple cryptographic transformations. At the same time was being solv... 详细信息
来源: 评论
Encrypted system identification as-a-service via reliable encrypted matrix inversion  63
Encrypted system identification as-a-service via reliable en...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Adamek, Janis Binfet, Philipp Schluter, Nils Darup, Moritz Schulze Tu Dortmund University Control and Cyber-physical Systems Group Department of Mechanical Engineering Germany
Encrypted computation opens up promising avenues across a plethora of application domains, including machine learning, health-care, finance, and control. Arithmetic homomorphic encryption, in particular, is a natural ... 详细信息
来源: 评论
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems  22
Fast Distributed Polynomial Multiplication Algorithm for Lat...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhao, Hongjian Tao, Yunting Kong, Fanyu Zhang, Guoyan Zhang, Hanlin Yu, Jia Shandong University School of Software Jinan China Binzhou Polytechnic College of Information Engineering Binzhou China Shandong University Shandong Sansec Information Technology Co. Ltd School of Software Jinan China Shandong University School of Cyber Science and Technology Qingdao China Qingdao University College of Computer Science and Technology Qingdao China
Lattice-based Post-Quantum Cryptography (PQC) can effectively resist the quantum threat to blockchain's underlying cryptographic algorithms. Blockchain node decryption is one of the most commonly used cryptographi... 详细信息
来源: 评论