咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 388 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
388 条 记 录,以下是341-350 订阅
Integrating Quantum Key Distribution (QKD) with Post-Quantum Cryptography (PQC): Combining BB84 Protocol with Lattice-Based Cryptographic Techniques  4
Integrating Quantum Key Distribution (QKD) with Post-Quantum...
收藏 引用
4th IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Ranganathan, Swetha Karthikeyan, Shanmitha Chavan, Chandrashekhar Pomu Shanthala, P.T. Pes University Department of Cse Bangalore India
As quantum computing technology advances, our traditional methods of securing information are becoming vulnerable to new types of attacks. To counter these threats, Quantum Key Distribution (QKD) methods like the BB84... 详细信息
来源: 评论
A Detailed Study on Security and Privacy Analysis and Mechanisms in Cloud Computing
A Detailed Study on Security and Privacy Analysis and Mechan...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering, RMKMATE 2023
作者: Sukeerthi, Kooragayala Kesavan, R. Kalaiselvan, S.A. Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Avadi Chennai India
When it comes to delivering IT services to businesses or consumers, the cloud provides a scalable, reliable, and cost-effective option. However, there is an increased risk associated with cloud computing due to the fa... 详细信息
来源: 评论
Enhanced Elliptic Curve Cryptography (EECC)  11th
Enhanced Elliptic Curve Cryptography (EECC)
收藏 引用
11th International Conference on Applications and Techniques in Cyber Intelligence, ATCI 2023
作者: Zhang, Zhengqi Zhao, Yan Shanwei Institute of Technology Shanwei516600 China Hainan Provincial Public Security Department Haikou570228 China
In the digital age, securing data and ensuring communication confidentiality are paramount, highlighting the crucial role of public key cryptography. Traditional algorithms like RSA, while secure, have limitations due... 详细信息
来源: 评论
Research on Security Algorithm of Cross-Cloud Data Sharing Supported by Blockchain  2
Research on Security Algorithm of Cross-Cloud Data Sharing S...
收藏 引用
2nd IEEE International Conference on Electrical, Automation and Computer Engineering, ICEACE 2024
作者: Yu, Xin Shandong Institute of Commerce and Technology Modern Finance Industry School Jinan China
In order to improve the security and privacy of data sharing, this project intends to study a data sharing security algorithm based on blockchain in a cross-cloud computing environment. The security algorithm that int... 详细信息
来源: 评论
Detecting Anomalies on Cryptocurrency Markets Using Graph algorithms
Detecting Anomalies on Cryptocurrency Markets Using Graph Al...
收藏 引用
12th International Conference on Data Science, Technology and Applications, DATA 2023
作者: Skorupka, Agata Collegium of Economic Analysis Warsaw School of Economics Warsaw Poland
The low level regulation of cryptocurrency market as well as crucial role of trust and digital market specificity makes it a good environment for anonymous transactions without identity verification, therefore fraudul... 详细信息
来源: 评论
Time delay measurements of key generation process on smart cards
Time delay measurements of key generation process on smart c...
收藏 引用
作者: Seawell, Christy A. Naval Postgraduate School
学位级别:硕士
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to ensure security increases. This is a potential problem for the Department of Defense, which requires smar... 详细信息
来源: 评论
Implementace šifrovacích algoritmů v jazyku VHDL
Implementace šifrovacích algoritmů v jazyku VHDL
收藏 引用
作者: Kožený, Petr Brno University of Technology
Tato práce se zabývá návrhem a implementací šifrovacích algoritmů AES a DES pro vestavěné systémy. Architektury jsou implementovány v jazyce VHDL a navrženy pro umíst... 详细信息
来源: 评论
A tree structure-based improved blockchain framework for a secure online bidding system
收藏 引用
COMPUTERS & SECURITY 2021年 102卷 102147-102147页
作者: Sarfaraz, Aaliya Chakrabortty, Ripon K. Essam, Daryl L. Univ New South Wales Sch Engn & Informat Technol Canberra ACT 2600 Australia
The BlockChain (BC) is considered as one of the most exciting developments in information and communication technology in the past decade and is widely known as a crypto intensive phenomenon. Achieving an efficient so... 详细信息
来源: 评论
An efficient construction of S-box based on the fractional-order Rabinovich-Fabrikant chaotic system
收藏 引用
INTEGRATION-THE VLSI JOURNAL 2024年 94卷
作者: Ullah, Saeed Liu, Xinge Waheed, Adil Zhang, Shuailei Cent South Univ Sch Math & Stat Changsha 410083 Hunan Peoples R China Natl Univ Modern Languages Fac Engn & Comp Sci Islamabad 44000 Pakistan Univ Educ Dept Informat Sci Div Sci & Technol Lahore 54770 Pakistan
For many block encryption algorithms, confusion properties are only related to the substitution box (S-box). The S-box is a crucial component of cryptography. The security of the whole system is affected by the Sbox. ... 详细信息
来源: 评论
Možnosti postkvantové kryptografie
Možnosti postkvantové kryptografie
收藏 引用
作者: Burda, Patrik Brno University of Technology
S rychlostí jakou se vyvíjejí technologie je potenciální hrozbou vývoj kvantových počítačů, které mají ohrozit veškerou dnešní bezpečnou komunikaci a je potřeba h... 详细信息
来源: 评论