咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是351-360 订阅
排序:
An efficient construction of S-box based on the fractional-order Rabinovich-Fabrikant chaotic system
收藏 引用
INTEGRATION-THE VLSI JOURNAL 2024年 94卷
作者: Ullah, Saeed Liu, Xinge Waheed, Adil Zhang, Shuailei Cent South Univ Sch Math & Stat Changsha 410083 Hunan Peoples R China Natl Univ Modern Languages Fac Engn & Comp Sci Islamabad 44000 Pakistan Univ Educ Dept Informat Sci Div Sci & Technol Lahore 54770 Pakistan
For many block encryption algorithms, confusion properties are only related to the substitution box (S-box). The S-box is a crucial component of cryptography. The security of the whole system is affected by the Sbox. ... 详细信息
来源: 评论
Možnosti postkvantové kryptografie
Možnosti postkvantové kryptografie
收藏 引用
作者: Burda, Patrik Brno University of Technology
S rychlostí jakou se vyvíjejí technologie je potenciální hrozbou vývoj kvantových počítačů, které mají ohrozit veškerou dnešní bezpečnou komunikaci a je potřeba h... 详细信息
来源: 评论
Softwarová podpora výuky kryptosystémů založených na problému faktorizace velkých čísel
Softwarová podpora výuky kryptosystémů založených na p...
收藏 引用
作者: Vychodil, Petr Brno University of Technology
Tato diplomová práce se zabývá softwarovou podporou výuky asymetrických šifrovacích algoritmů, založených na problematice faktorizace velkých čísel. Byl vytvořen vzoro... 详细信息
来源: 评论
Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
收藏 引用
SENSORS 2023年 第4期23卷 2106-2106页
作者: Kairaldeen, Ammar Riadh Abdullah, Nor Fadzilah Abu-Samah, Asma Nordin, Rosdiadee Univ Kebangsaan Malaysia Fac Engn & Built Environm Dept Elect Elect & Syst Engn Bangi 43600 Selangor Malaysia
Blockchain introduces challenges related to the reliability of user identity and identity management systems;this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing ... 详细信息
来源: 评论
Construction of Asymmetric Cryptosystems Using Finite Non-commutative Algebraic Groups
Construction of Asymmetric Cryptosystems Using Finite Non-co...
收藏 引用
International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)
作者: Zakasovskaya, E. Glushchenko, A. Tarasov, V Far Eastern Fed Univ Vladivostok Russia
This article considers the work done to find a suitable group implementation for the creation of new cryptosystems which work is based on the use of finite non-commutative algebraic groups. In particular, some subgrou... 详细信息
来源: 评论
POWER-AWARE FRAMEWORK FOR ENCRYPTED COMMUNICATIONS
POWER-AWARE FRAMEWORK FOR ENCRYPTED COMMUNICATIONS
收藏 引用
20th International Danube-Adria-Association-for-Automation-and-Manufacturing Symposium
作者: Botezatu, Nicolae Stan, Andrei Panduru, Lucian
In battery powered embedded systems it is essential to minimize power consumption. If the systems have communication security necessities, the task of maximizing battery life becomes critical, because of the additiona... 详细信息
来源: 评论
Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第16期18卷 158-173页
作者: Mwakajwanga, Gwamaka Mwambe, Othmar Dar es salaam Tanzania United Republic of Dar es salaam Tanzania United Republic of
Nowadays, man-in-the-middle (MITM) attacks have become a large problem due to the advancement of computational power and interactive mobile technologies. Message security is a crucial concern that ought to be managed ... 详细信息
来源: 评论
Information Security by employing RSA Algorithm and Graph Labeling
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2563-2568页
作者: Vani Shree, S. Dhanalakshmi, S. Department of Mathematics SRM Institute of Science and Technology - Ramapuram Chennai600089 India Department of Mathematics Faculty of Engineering and Technology SRM Institute of Science and Technology - Ramapuram Chennai600089 India
The RSA technique provides security for every user connected across the network. The mathematical factorization problem, which demonstrates how challenging it is to find two prime numbers whose product equals a partic... 详细信息
来源: 评论
A study on the role of hash function in encrypting sensitive information in network security protection
收藏 引用
Applied Mathematics and Nonlinear Sciences 2024年 第1期9卷
作者: Wu, Ju Wang, Dehong Peng, Xiaoxia School of Continuing Education Jiangxi Modern Vocational and Technical College Jiangxi Nanchang330029 China
The fields of information encryption and privacy protection widely use hash functions, but the traditional hash functions still struggle to handle the increasingly complex encryption tasks of sensitive data. The study... 详细信息
来源: 评论
Construction of Big Data Information Security Protection System in Industrial Internet Environment
收藏 引用
Applied Mathematics and Nonlinear Sciences 2024年 第1期9卷
作者: Na, Rongcui Co. Ltd. Chongqing401122 China
With the continuous development and integration of information technology and industrialization-related technologies, industrial Internet control system security attacks occur frequently, and it is more and more impor... 详细信息
来源: 评论