咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 388 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
388 条 记 录,以下是291-300 订阅
排序:
Enhancing Data Security of iOS Client by encryption Algorithm
Enhancing Data Security of iOS Client by Encryption Algorith...
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Yuli Shen Hong Wang School of Information Engineering Wuhan University of Technology
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or laptop
来源: 评论
Mutations of Cryptographic algorithms  22
Mutations of Cryptographic Algorithms
收藏 引用
22nd International Conference on Emerging eLearning Technologies and Applications, ICETA 2024
作者: Pekarčík, Peter Chovancová, Eva Technical University of Košice Faculty of Electrical Engineering and Informatics Department of Computers and Informatics Košice Slovakia
Data security aims to achieve confidentiality, integrity, and availability of data. To reach confidentiality, different encryption algorithms are needed. The most used today are RSA, AES, and Diffie-Helman. Although t... 详细信息
来源: 评论
Algebraic Attack on LCB and Improved LCB  1
Algebraic Attack on LCB and Improved LCB
收藏 引用
1st International Conference on Cyber Security and Computing, CyberComp 2024
作者: Sucipta, I Ketut Yudi Susanti, Bety Hayat Siswantyo, Sepha Politeknik Siber dan Sandi negara Cryptography Engineering Bogor Indonesia
Various lightweight block cipher algorithms have been proposed to address the security requirements of Internet of Things (loT) devices, one of which is the Light Cipher Block (LCB). Initially proposed by Roy and coll... 详细信息
来源: 评论
The system of secured user’s credentials transfer
The system of secured user’s credentials transfer
收藏 引用
2024 Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II 2024
作者: Korchenko, Oleksandr Ivanchenko, Yevheniia Ivanchenko, Ihor Pedchenko, Yevhenii Petrovska, Mari State University of Information and Communication Technologies 7 Solomianska str Kyiv03110 Ukraine National Aviation University 1 Liubomyra Huzara ave. Kyiv03058 Ukraine
This paper describes a developed system of secured user credentials transfer from a user’s web browser to a web application server. This paper will describe in detail the operation of an advanced 10-level encryption ... 详细信息
来源: 评论
Performance Analysis of Shor's Algorithm for Integer Factorization Using Quantum and Classical Approaches  10
Performance Analysis of Shor's Algorithm for Integer Factori...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Thamaraimanalan, T. Singh, Bhupendra Mohankumar, M. Korada, Santosh Kumar Sri Eshwar College of Engineering Department of Ece Coimbatore India Cair Drdo Bangalore560093 India
Factoring large numbers poses a significant chal-lenge in contemporary cryptography and security practices. Shor's algorithm presents a remarkable advancement over clas- sical methods by providing exponential acce... 详细信息
来源: 评论
The Built on Feistel Network Architecture Block Ciphers Modification  14
The Built on Feistel Network Architecture Block Ciphers Modi...
收藏 引用
14th International Conference on Advanced Computer Information Technologies, ACIT 2024
作者: Naumenko, Serhii Rozlomii, Inna Yarmilko, Andrii Bohdan Khmelnytsky National University of Cherkasy Department of Information Technologies Cherkasy Ukraine Bohdan Khmelnytsky National University of Cherkasy Department of Automated Systems Software Cherkasy Ukraine
The article considers the method of implementing Shannon's idea of building a cryptographically stable system by repeatedly applying relatively simple cryptographic transformations. At the same time was being solv... 详细信息
来源: 评论
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems  22
Fast Distributed Polynomial Multiplication Algorithm for Lat...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhao, Hongjian Tao, Yunting Kong, Fanyu Zhang, Guoyan Zhang, Hanlin Yu, Jia Shandong University School of Software Jinan China Binzhou Polytechnic College of Information Engineering Binzhou China Shandong University Shandong Sansec Information Technology Co. Ltd School of Software Jinan China Shandong University School of Cyber Science and Technology Qingdao China Qingdao University College of Computer Science and Technology Qingdao China
Lattice-based Post-Quantum Cryptography (PQC) can effectively resist the quantum threat to blockchain's underlying cryptographic algorithms. Blockchain node decryption is one of the most commonly used cryptographi... 详细信息
来源: 评论
A Hardware Implementation of Anti-noise Bayesian Deconvolution Algorithm Based on FPGA and Network Port Transmission  4
A Hardware Implementation of Anti-noise Bayesian Deconvoluti...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Communication, EIECC 2024
作者: Zhou, Yinqi Feng, Shiwei Wang, Yaning Zhang, Boyang Beijing University of Technology Chaoyang District Beijing China
In the field of computer science and engineering, hardware acceleration and encryption are key technologies for improving computing power and ensuring information security. FPGAs can be used to accelerate core algorit... 详细信息
来源: 评论
A Short Survey on Comparative Study of Modern Cryptography Approach  5th
A Short Survey on Comparative Study of Modern Cryptography...
收藏 引用
5th International Conference on Deep Learning, Artificial Intelligence and Robotics, ICDLAIR 2023
作者: Choudhary, Anurag Uttar Pradesh Gorakhpur India
Organizations all over the globe produce a lot of data every day because of the development of e-commerce apps, social networks, the World Wide Web, and other technologies. An intrusion occurs when hackers breach the ... 详细信息
来源: 评论
A Multi-Layered Quantum-Resistant algorithms Based Approach to Mitigate Emerging Threats in ISP Cybersecurity  3
A Multi-Layered Quantum-Resistant Algorithms Based Approach ...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Alagh, Arjun Wason, Ritika Arora, Parul Dept. of Computer Science and Applications Delhi India
The Internet Service Providers (ISP), and their structures are at high risk with the growing quantity and complexity of cyber threats. The growth of quantum computing further elevates the risks and challenges especial... 详细信息
来源: 评论