咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是321-330 订阅
排序:
Unidirectional Key Update in Updatable encryption, Revisited
arXiv
收藏 引用
arXiv 2024年
作者: Jurkiewicz, Mariusz Prabucka, Kamila Military University of Technology Warsaw Poland
In this paper we construct a new efficient updatable encryption (UE) scheme based on FrodoPKE learning with errors key encapsulation [1]. We analyse the security of the proposed scheme in the backward-leak uni-directi... 详细信息
来源: 评论
Design of Cryptography Algorithm for Data Security of a IoT System
Design of Cryptography Algorithm for Data Security of a IoT ...
收藏 引用
2024 IEEE International Conference on Advanced Telecommunication and Networking Technologies, ATNT 2024
作者: Ni, Lim Chia Ali, Samura Rashid, Rozeha A. University Teknologi Malaysia Faculty of Electrical Engineering Johor Johor Bahru Malaysia
This research explores the data security of the Internet of Things (IoT), with a specific focus on designing cryptographic algorithms suitable for the resource-constrained ESP32 microcontroller. Referencing existing A... 详细信息
来源: 评论
A Complementary Algorithm for Image Cryptosystems to Enhance Entropy  9
A Complementary Algorithm for Image Cryptosystems to Enhance...
收藏 引用
9th International Conference on Mobile and Secure Services, MOBISECSERV 2024
作者: Cardona-Lopez, Manuel Alejandro Chimal-Eguia, Juan Carlos Silva-Garcia, Victor Manuel Flores-Carapia, Rolando Centro de Investigación en Computación Instituto Politécnico Nacional Mexico City Mexico Centro de Innovación y Desarrollo Tecnológico en Cómputo Instituto Politécnico Nacional Mexico City Mexico
Each new image cryptosystem aims to achieve improved security results, with entropy being one of the primary measures for quantifying its security. For 8-bit images, the ideal entropy value is 8.0. However, various en... 详细信息
来源: 评论
Design and implementation of a security system algorithm based on the combination of improved AES and SHA-512  5
Design and implementation of a security system algorithm bas...
收藏 引用
5th International Conference on Computer Communication and Network Security, CCNS 2024
作者: Si, Jinghua Wang, Liang Liaocheng Technician College Shandong China Shandong Institute of Information Technology Industry Development Shandong China
With the rapid development of information technology, network security has become an increasingly important focus. As a key means to protect data security, encryption technology is crucial to enhance its security. How... 详细信息
来源: 评论
Enhancing Protection Mechanisms in Data and Application Security Across Diverse Platforms
Enhancing Protection Mechanisms in Data and Application Secu...
收藏 引用
2024 OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Nijhawan, Ginni Dasari, Kavitha Chandrashekar, Rakesh Vadivukrassi, M. Kalra, Ravi Abdullah, Sajid Abd Al Khidhir Lovely Professional University Phagwara India Institute of Aeronautical Engineering Hyderabad Dundigal India New Horizon College of Engineering Department of Mechanical Engineering Bangalore India St. Martin's Engineering College AP Dept. of Cse Telangana Secunderabad India Lloyd Institute of Engineering & Technology Knowledge Park II Uttar Pradesh Greater Noida201306 India National University of Science and Technology College of Technical Engineering Dhi Qar64001 Iraq
Secure data protection is more vital than ever as internet dangers proliferate. Five key approaches comprise this study's comprehensive security design. They are the Advanced encryption Algorithm (AEA), DIDS, BBA,... 详细信息
来源: 评论
Hypercomplex Numbers in Cryptosystems
Hypercomplex Numbers in Cryptosystems
收藏 引用
International Conference on Current Problems of Applied Mathematics and Computer Systems, CPAMCS 2023
作者: Dukhnich, Evgeny Chefranov, Alexander Admiral Ushakov Maritime State University Novorossiysk Russia Eastern Mediterranean University North Cyprus Famagusta Cyprus
A systematic analysis of the use of the hypercomplex numbers in the construction of the cryptographic algorithms is given. The cases of constructing various types of ciphers, both symmetric and asymmetric, with the us... 详细信息
来源: 评论
An Overview of the Discrete Logarithm Problem in Cryptography  3rd
An Overview of the Discrete Logarithm Problem in Cryptogr...
收藏 引用
3rd International Conference on Advanced Computing and Applications, ICACA 2024
作者: Sarkar, Abhiroop Guha Roy, Deepsubhra Datta, Piyali Institute of Engineering and Management University of Engineering and Management Kolkata India Institute of Engineering and Management University of Engineering and Management Kolkata India Institute of Engineering and Management University of Engineering and Management Kolkata India
The discrete logarithm problem is a computationally hard problem that is widely employed in public-key cryptography, based on the assumption that there exists no general method to efficiently solve discrete logs. In t... 详细信息
来源: 评论
Using Chernoff bound to statistical tests independence checking  11
Using Chernoff bound to statistical tests independence check...
收藏 引用
11th International Scientific Conference "Information Technology and Implementation", IT and I 2024
作者: Kovalchuk, Lyudmila Rodinko, Mariia Oliynykov, Roman Klymenko, Tatiana G.E. Pukhov Institute for Modelling in Energy Engineering General Naumov Str. 15 Kyiv03164 Ukraine V. N. Karazin Kharkiv National University Svobody Sq. 4 Kharkiv61022 Ukraine
In our work, we proposed, a strictly justified, method for testing independence verification and created a corresponding algorithm. We applied this algorithm to different test suits and obtained rather expected result... 详细信息
来源: 评论
Improved AES scheme based on chaotic mapping  4
Improved AES scheme based on chaotic mapping
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Communication, EIECC 2024
作者: Dai, Qianmei Liu, Xiaodong Wuhan Post and Telecommunications Research Institute Wuhan China Wuhan Hongxu Information Technology Co. Wuhan China
As encryption algorithms are widely used, the shortcomings of Advanced encryption Standard (AES) round keys with strong correlation between them have also been found. In this paper, an improved AES scheme based on Log... 详细信息
来源: 评论
Secure Data Sharing Scheme for Multi-Node Devices  4
Secure Data Sharing Scheme for Multi-Node Devices
收藏 引用
4th International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, SPIoT 2023
作者: Ye, Jun Wan, Yitang Wang, Zehua Zhang, Zhengqi Xu, Zheng Zhao, Jinghua School of Cyberspace Security Hainan University Haikou570228 China Key Laboratory of Internet Information Retrieval of Hainan Province Haikou570228 China Shanwei Institute of Technology Shanwei516600 China School of Computer and Information Engineering Institute for Artificial Intelligence Shanghai Innovation Center of Reverse Logistics and Supply Chain Shanghai Polytechnic University Shanghai201209 China Business School University of Shanghai for Science and Technology Shanghai200093 China
For the problem that the communication between maritime devices may be listened to by the adversary, resulting in the data shared between maritime devices may also be tampered with and forged by the adversary, thus je... 详细信息
来源: 评论