咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 10 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
  • 1 篇 理学
    • 1 篇 化学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 14 篇 hybrid encryptio...
  • 3 篇 security
  • 2 篇 timeliness
  • 2 篇 vehicle fota sys...
  • 2 篇 authentication
  • 2 篇 ecc
  • 1 篇 ciphertext
  • 1 篇 security and pri...
  • 1 篇 internet of thin...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 data confidentia...
  • 1 篇 mobile ad hoc ne...
  • 1 篇 collaborative de...
  • 1 篇 computing techno...
  • 1 篇 elliptic curve c...
  • 1 篇 bluetooth
  • 1 篇 advanced encrypt...
  • 1 篇 hash value
  • 1 篇 symmetric encryp...

机构

  • 1 篇 wuhan univ infor...
  • 1 篇 college of mobil...
  • 1 篇 nanjing univ pos...
  • 1 篇 southeast univ s...
  • 1 篇 univ teknol mala...
  • 1 篇 nanjing univ pos...
  • 1 篇 jiangsu high tec...
  • 1 篇 chongqing univ p...
  • 1 篇 southeast univ s...
  • 1 篇 univ pretoria de...
  • 1 篇 univ ottawa para...
  • 1 篇 wuchang polytech...
  • 1 篇 xian univ posts ...
  • 1 篇 school of automa...
  • 1 篇 anhui wenda univ...
  • 1 篇 natl inst techno...
  • 1 篇 thapar inst engn...
  • 1 篇 gla univ chaumuh...
  • 1 篇 univ teknol mala...
  • 1 篇 xian univ posts ...

作者

  • 1 篇 jie yin
  • 1 篇 ren yonglin
  • 1 篇 thu zhi-xiang
  • 1 篇 boukerche azzedi...
  • 1 篇 singhal saurabh
  • 1 篇 malekian reza
  • 1 篇 mogalipuvvu hari...
  • 1 篇 dongmei ma
  • 1 篇 alban stavin
  • 1 篇 ye ning
  • 1 篇 sharma ashish
  • 1 篇 kumar neeraj
  • 1 篇 agrawal ruchi
  • 1 篇 li bing
  • 1 篇 yin jie
  • 1 篇 liu xuankai
  • 1 篇 wei lihuan
  • 1 篇 florence s. meti...
  • 1 篇 anyu cheng
  • 1 篇 xiaoyuan dang

语言

  • 14 篇 英文
检索条件"主题词=Hybrid encryption algorithm"
14 条 记 录,以下是1-10 订阅
排序:
A hybrid encryption algorithm based approach for secure privacy protection of big data in hospitals
收藏 引用
EGYPTIAN INFORMATICS JOURNAL 2024年 28卷
作者: Li, Wei Huang, Qian Wuhan Univ Informat Ctr Renmin Hosp Wuhan 430060 Peoples R China Wuchang Polytech Coll Gen Educ Dept Wuhan 430060 Peoples R China
Aiming at the hidden danger of information security caused by the lack of medical big data information security firewall, this paper proposes a security privacy protection method for hospital big data based on hybrid ... 详细信息
来源: 评论
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2024年 第6期27卷 8015-8030页
作者: Agrawal, Ruchi Singhal, Saurabh Sharma, Ashish GLA Univ Chaumuhan 281406 Uttar Pradesh India
Blockchain technology ensures the integrity and transparency of data access control by keeping an unchangeable record of all transactions. Fog computing increases efficiency by dispersing cloud computing skills throug... 详细信息
来源: 评论
hybrid encryption algorithm Based on Wireless Sensor Networks  16
Hybrid Encryption Algorithm Based on Wireless Sensor Network...
收藏 引用
16th IEEE International Conference on Mechatronics and Automation (IEEE ICMA)
作者: Yue, Tongxu Wang, Chuang Thu, Zhi-xiang Xian Univ Posts & Telecommun Sch Comp Sci & Technol Xian 710121 Peoples R China Xian Univ Posts & Telecommun Inst Internet Things & IT Based Industrializat Xian 710061 Peoples R China
Based on the analysis of existing wireless sensor networks(WSNs) security vulnerability, combining the characteristics of high encryption efficiency of the symmetric encryption algorithm and high encryption intensity ... 详细信息
来源: 评论
Application and Research of hybrid encryption algorithm in Vehicle FOTA System  32
Application and Research of Hybrid Encryption Algorithm in V...
收藏 引用
32nd Chinese Control And Decision Conference (CCDC)
作者: Cheng, Anyu Yin, Jie Ma, Dongmei Dang, Xiaoyuan Chongqing Univ Posts & Telecommun Sch Automat Chongqing 40065 Peoples R China Chongqing Univ Posts & Telecom Coll Mobile Telecommun Chongqing 40152 Peoples R China
This paper mainly studies the application of hybrid encryption algorithm in the vehicle FOTA (Firmware Over The Air) system. The purpose is to prevent the vehicle FOTA system from maliciously invading, stealing or tam... 详细信息
来源: 评论
Application and Research of hybrid encryption algorithm in Vehicle FOTA System
Application and Research of Hybrid Encryption Algorithm in V...
收藏 引用
第32届中国控制与决策会议
作者: Anyu Cheng Jie Yin Dongmei Ma Xiaoyuan Dang School of Automation Chongqing University of Posts and Telecommunications College of Mobile Telecommunications Chongqing University of Posts and Telecom
This paper mainly studies the application of hybrid encryption algorithm in the vehicle FOTA(Firmware Over The Air) *** purpose is to prevent the vehicle FOTA system from maliciously invading,stealing or tampering wit... 详细信息
来源: 评论
A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019年 46卷 210-221页
作者: Altigani, Abdelrahman Hasan, Shafaatunnur Shamsuddin, Siti Mariyam Barry, Bazara Univ Teknol Malaysia UTM Big Data Ctr Ibnu Sina Inst Sci & Ind Res Skudai 81310 Johor Malaysia Univ Teknol Malaysia Fac Comp Skudai 81310 Johor Malaysia Univ Khartoum Fac Math Sci Khartoum 11111 Sudan
This research paper introduces a novel symmetric encryption algorithm that provides the confidentiality security service without leaking enough information about the exact encryption algorithm or other cryptographic p... 详细信息
来源: 评论
The hybrid encryption algorithm of Lightweight Data in Cloud Storage  2
The Hybrid Encryption Algorithm of Lightweight Data in Cloud...
收藏 引用
2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR)
作者: Liang, Chengliang Ye, Ning Malekian, Reza Wang, Ruchuan Nanjing Univ Posts & Telecommun Coll Comp Nanjing 210003 Peoples R China Jiangsu High Technol Res Key Lab Wireless Sensor Nanjing 210003 Peoples R China Nanjing Univ Posts & Telecommun Minist Educ Key Lab Broadband Wireless Commun & Sensor Networ Nanjing 210003 Peoples R China Univ Pretoria Dept Elect Elect & Comp Engn ZA-0002 Pretoria South Africa
In this paper, we proposed a hybrid encryption algorithm in order to solve the security problems on lightweight data on the cloud storage service. This paper first improves the RSA algorithm in the cloud environment b... 详细信息
来源: 评论
Design of a hybrid encryption Scheme Based on Software and Hardware Collaboratin
Design of a Hybrid Encryption Scheme Based on Software and H...
收藏 引用
9th International Conference on Signal and Image Processing (ICSIP)
作者: Liu, Xuankai Li, Bing Southeast Univ Sch Integrated Circuit Nanjing Peoples R China Southeast Univ Sch Cyber Sci & Engn Nanjing Peoples R China
With the rapid development of electronic information technology, data security issues are becoming increasingly serious. Traditional single cryptographic algorithms cannot meet the increasing demands of security and c... 详细信息
来源: 评论
A hybrid Cryptographic algorithm for Resource-Constrained IoT Devices  5
A Hybrid Cryptographic Algorithm for Resource-Constrained Io...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Florence, S. Metilda Alban, Stavin Mogalipuvvu, Harish Srm Institute of Science and Technology Department of Networking and Communications Kattankulathur India
In the modern digital age, data security stands as a very important priority. The increasing need for lightweight devices and their resource-constrained environments calls for certain cryptographic solutions that can ... 详细信息
来源: 评论
Providing a hybrid and Symmetric encryption Solution to Provide Security in Cloud Data Centers
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2023年 第9期14卷 1132-1141页
作者: Shen, Desong Anhui Wenda Univ Informat Engn Sch Business & Trade Hefei 230121 Peoples R China
One of the most crucial components of information technology infrastructure in the modern world is cloud data centers. Customers have access to these data centers' infrastructure and software, which enable them to... 详细信息
来源: 评论