咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 287 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 107 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 86 篇 电气工程
    • 52 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 24 篇 交通运输工程
    • 24 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 137 篇 理学
    • 90 篇 数学
    • 42 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
  • 61 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 391 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 data security
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
391 条 记 录,以下是301-310 订阅
A Hardware Implementation of Anti-noise Bayesian Deconvolution Algorithm Based on FPGA and Network Port Transmission  4
A Hardware Implementation of Anti-noise Bayesian Deconvoluti...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Communication, EIECC 2024
作者: Zhou, Yinqi Feng, Shiwei Wang, Yaning Zhang, Boyang Beijing University of Technology Chaoyang District Beijing China
In the field of computer science and engineering, hardware acceleration and encryption are key technologies for improving computing power and ensuring information security. FPGAs can be used to accelerate core algorit... 详细信息
来源: 评论
A Short Survey on Comparative Study of Modern Cryptography Approach  5th
A Short Survey on Comparative Study of Modern Cryptography...
收藏 引用
5th International Conference on Deep Learning, Artificial Intelligence and Robotics, ICDLAIR 2023
作者: Choudhary, Anurag Uttar Pradesh Gorakhpur India
Organizations all over the globe produce a lot of data every day because of the development of e-commerce apps, social networks, the World Wide Web, and other technologies. An intrusion occurs when hackers breach the ... 详细信息
来源: 评论
A Multi-Layered Quantum-Resistant algorithms Based Approach to Mitigate Emerging Threats in ISP Cybersecurity  3
A Multi-Layered Quantum-Resistant Algorithms Based Approach ...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Alagh, Arjun Wason, Ritika Arora, Parul Dept. of Computer Science and Applications Delhi India
The Internet Service Providers (ISP), and their structures are at high risk with the growing quantity and complexity of cyber threats. The growth of quantum computing further elevates the risks and challenges especial... 详细信息
来源: 评论
Finding Zero Correlation Linear Hulls Using Quantum Bernstein-vazirani Algorithm
Finding Zero Correlation Linear Hulls Using Quantum Bernstei...
收藏 引用
2024 International Conference on Computational Intelligence and Communication System, CCICS 2024
作者: Xie, Huiqin Zhao, Zhangmei Beijing Electronic Science and Technology Institute Beijing100070 China
Facing the threat of quantum computing to cryptography schemes, it is urgent to study the applications of quantum algorithms to cryptanalysis and evaluate the security of cryptographic schemes in a quantum computing e... 详细信息
来源: 评论
Secure Data Transmission Through Applied Cryptography algorithms  15
Secure Data Transmission Through Applied Cryptography Algori...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Kumar, Anup Seth, Jyoti Chethan, M. Department of Mechnical Engineering ARKA JAIN University Jharkhand Jamshedpur India Department of Computer Science & Engineering Vivekananda Global University Jaipur India Karnataka Bangalore India
Comfy records transmission is a crucial generation in the data safety area. It entails the use of cryptographic algorithms to secure statistics in order that it cannot be accessed without authorization. Cryptography a... 详细信息
来源: 评论
Effective Adaptable Framework for Security of IoT Devices  3
Effective Adaptable Framework for Security of IoT Devices
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Sharma, Cheshta Sharma, Tripti Shri Venkateshwara University Department of Computer Science and Engineering Gajraula India Inderprasth Engineering College Department of Computer Science and Engineering Ghaziabad India
The Internet of Things (IoT) becomes the most demanding technology over the past few years. IoT is the basic need of daily life. The security of these devices is very important because they contain large files of sens... 详细信息
来源: 评论
Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT
Enhancing IoT Security: A Comprehensive Review of Lightweigh...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Pradana, Aditya Permana, Fahmi Candra Mutijarsa, Kusprasapta Bandung, Yoanes Institut Teknologi Bandung School of Electrical Engineering and Informatics Bandung Indonesia
In this paper, we review lightweight security approaches for resource-constrained IoT devices. Previous research has explored various lightweight cryptographic algorithms, such as PRESENT, PRIDE, SNOW-V, and ChaCha20 ... 详细信息
来源: 评论
Optimizing AES-256 with Keccak Permutations: Achieving High Security and Performance with Reduced Rounds  15
Optimizing AES-256 with Keccak Permutations: Achieving High ...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Chio, Ma. Esther B. Sison, Ariel M. Medina, Ruji P. Technological Institute of the Philippines Quezon City Philippines University of Science and Technology of Southern Philippines Cagayan de Oro City Philippines Emilio Aguinaldo College Manila Philippines
This study introduces an innovative approach to enhancing AES-256 encryption by integrating the Keccak permutation into its key generation process, aiming to improve both security and performance while reducing the nu... 详细信息
来源: 评论
Secure Key Generation and Distribution at Physical Layer by Using Ultra-Long Fiber Laser  3
Secure Key Generation and Distribution at Physical Layer by ...
收藏 引用
3rd IEEE International Conference on Problems of Informatics, Electronics and Radio Engineering, PIERE 2024
作者: Nyushkov, Boris Korel, Igor Novosibirsk State Technical University Quantum Cryogenic Electronics laboratory Novosibirsk Russia
Secure fiber-optic communication systems are an important area of research and development in the IT industry. In this work, we report the development of a promising fiber laser system for physical-layer secure key ge... 详细信息
来源: 评论
Examining the Efficiency of Implemented Cryptographic algorithms for Blockchain Technologies  15
Examining the Efficiency of Implemented Cryptographic Algori...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Premalatha, K.P. Sahu, Kuldip Kumar Gour, Murli Manohar Department of Management School of Mangement - PG JAIN Karnataka Bangalore India Department of Mechnical Engineering ARKA JAIN University Jharkhand Jamshedpur India Department of Mathematics Vivekananda Global University Jaipur India
This paper explores the performance of implemented cryptography algorithms used for various blockchain technologies, which include Bitcoin, Ethereum, and Hyperledger. Diverse techniques for assessing cryptographic alg... 详细信息
来源: 评论