咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 17 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 27 篇 security algorit...
  • 5 篇 cryptography
  • 4 篇 encryption
  • 2 篇 internet of thin...
  • 2 篇 cms system
  • 2 篇 enterprise-class...
  • 2 篇 access control
  • 2 篇 md5
  • 2 篇 iot
  • 2 篇 rsa
  • 2 篇 asymmetric
  • 2 篇 web site securit...
  • 2 篇 mrc (maximum rat...
  • 2 篇 application laye...
  • 2 篇 security
  • 2 篇 aes
  • 2 篇 symmetric
  • 2 篇 3des
  • 2 篇 rc6
  • 1 篇 cyber security

机构

  • 2 篇 qatar univ dept ...
  • 2 篇 rajshahi univ en...
  • 2 篇 univ technol syd...
  • 1 篇 univ politecn sa...
  • 1 篇 chinese acad sci...
  • 1 篇 delhi technol un...
  • 1 篇 n china elect po...
  • 1 篇 chinese acad sci...
  • 1 篇 brac univ dept c...
  • 1 篇 shaanxi yanchang...
  • 1 篇 escuela politecn...
  • 1 篇 univ chinese aca...
  • 1 篇 prist univ thanj...
  • 1 篇 ims ghaziabad
  • 1 篇 laval univ dept ...
  • 1 篇 university of pe...
  • 1 篇 mumbai univ thad...
  • 1 篇 henan tech coll ...
  • 1 篇 department of co...
  • 1 篇 infocity tech ma...

作者

  • 2 篇 chen joy iong-zo...
  • 2 篇 akter afifa
  • 2 篇 muyeen s. m.
  • 2 篇 sarker subrata k...
  • 2 篇 zafir ehsanul is...
  • 1 篇 akashdeep bhardw...
  • 1 篇 cui ping
  • 1 篇 ming-quan zhang
  • 1 篇 rajput shyam sin...
  • 1 篇 gupta avadesh ku...
  • 1 篇 sengupta anirban
  • 1 篇 li li
  • 1 篇 zhang zhujun
  • 1 篇 li tian
  • 1 篇 fan wei
  • 1 篇 liu cong
  • 1 篇 hashem m. m. a.
  • 1 篇 malgaonkar saura...
  • 1 篇 wei qinfang
  • 1 篇 hou rui

语言

  • 25 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Security algorithm"
27 条 记 录,以下是1-10 订阅
排序:
Application of security algorithm in Audit Data Asset Valuation Based on Distributed Machine Learning
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2023年 1-15页
作者: Liu, Cong Liaoning Univ Int Business & Econ Sch Accounting Dalian 116052 Liaoning Peoples R China Univ Finance & Econ Grad Sch Univ Finance & Econ Ulaanbaatar 13381 Mongolia
In recent years, with the development of Internet technology, the total amount of enterprise data is increasing year by year, which is regarded as the resource core and wealth in enterprises. For the potential value o... 详细信息
来源: 评论
Research on cyberspace multi-objective security algorithm and decision mechanism of Energy Internet
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2021年 120卷 119-124页
作者: Hou, Rui Ren, Guowen Gao, Wei Liu, Lijun North China Elect Power Univ Sch Econ & Management Beijing 102206 Peoples R China Chinese Soc Urban Studies New Energy Res Inst Beijing 100835 Peoples R China Shaanxi Yanchang Petr Power Sales Co Ltd Xian 710000 Peoples R China
The existing energy network security defense system uses firewall, intrusion detection, host monitoring, identity authentication, anti-virus software and vulnerability repair to build a fortress type rigid defense sys... 详细信息
来源: 评论
Research on security algorithm of Virtual Machine Live Migration for KVM Virtualization System  18th
Research on Security Algorithm of Virtual Machine Live Migra...
收藏 引用
18th International Conference on Information and Communications security (ICICS)
作者: Fan, Wei Zhang, Zhujun Wang, Tingting Hu, Bo Qing, Sihan Sun, Degang Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Chinese Acad Sci Inst Software Beijing Peoples R China Peking Univ Sch Software & Microelectron Beijing Peoples R China
Live migration of virtual machine is the process of moving VMs from one physical server to another server keeping services running in VMs, and facilitates load balancing, energy saving, hardware dependent, remote migr... 详细信息
来源: 评论
Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques
收藏 引用
INTERNET OF THINGS 2024年 28卷
作者: Zafir, Ehsanul Islam Akter, Afifa Islam, M. N. Hasib, Shahid A. Islam, Touhid Sarker, Subrata K. Muyeen, S. M. Rajshahi Univ Engn & Technol Dept Mechatron Engn Rajshahi 6204 Bangladesh King Fahd Univ Petr & Minerals Dept Control & Instrumentat Engn Dhahran 31261 Saudi Arabia Univ Technol Sydney Sch Elect & Data Engn Sydney Australia Qatar Univ Dept Elect Engn Doha Qatar
The Internet of Robotic Things (IoRT) integrates robots and autonomous devices, transforming industries such as manufacturing, healthcare, and transportation. However, security vulnerabilities in IoRT systems pose sig... 详细信息
来源: 评论
A Lightweight Cryptographic Framework Based on Hybrid Cellular Automata for IoT Applications
收藏 引用
IEEE ACCESS 2024年 12卷 192672-192688页
作者: Hasan, Abrar Hashem, M. M. A. Khulna Univ Engn & Technol KUET Dept Comp Sci & Engn Khulna 9203 Bangladesh
Resource-constrained devices equipped with multiple sensors to exchange data over the network are called the Internet of Things (IoT). The major limitations of IoT devices are limited resources, low computational powe... 详细信息
来源: 评论
Analysis of Adequate security algorithms Oriented to Cybersecurity Management for a Distributed Architecture
Analysis of Adequate Security Algorithms Oriented to Cyberse...
收藏 引用
4th World Conference on Smart Trends in Systems, security and Sustainability (WorldS4)
作者: Toapanta Toapanta, Segundo Moises Orozco Bonilla, Christian Andres Mafla Gallegos, Luis Enrique Univ Politecn Salesiana UPS Dept Comp Sci Guayaquil Ecuador Escuela Politecn Nacl EPN Fac Syst Engn Quito Ecuador
It was analyzed an environment between the references of certain security models and algorithms based on improving cybersecurity in distributed architectures. The problem is the lack of application of appropriate secu... 详细信息
来源: 评论
security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing
Global Transitions Proceedings
收藏 引用
Global Transitions Proceedings 2021年 第1期2卷 100-110页
作者: Fursan Thabit Sharaf Alhomdy Sudhir Jagtap School of Computational Sciences S.R.T.M. University of organization Nanded India Faculty of Computer and Information Technology (FCIT) Sana'a University Yemen
Nowadays, cloud computing is rapid growth in the IT industry, which provides a new way to manage the different information systems. The rapid development of technology makes it essential to use this technology and to ... 详细信息
来源: 评论
A Quantitative Study of Energy Consumption for Embedded security
A Quantitative Study of Energy Consumption for Embedded Secu...
收藏 引用
IEEE Wireless Communications and Networking Conference (WCNC)
作者: Guo, Chen Yang, Yang Zhou, Yanglin Zhang, Kuan Ci, Song ShanghaiTech Univ Sch Informat Sci & Technol Shanghai Peoples R China Chinese Acad Sci Shanghai Inst Microsyst & Informat Technol Shanghai Peoples R China Univ Chinese Acad Sci Beijing Peoples R China Tsinghua Univ Dept Elect Engn Beijing Peoples R China Univ Nebraska Lincoln Dept Elect & Comp Engn Omaha NE USA
Due to the vulnerability of the Internet of Things (IoT), it is indispensable to provide adequate security services. These services are generally implemented through security protocols or algorithms and running on ene... 详细信息
来源: 评论
A review on microgrid optimization with meta-heuristic techniques: Scopes, trends and recommendation
收藏 引用
ENERGY STRATEGY REVIEWS 2024年 51卷
作者: Akter, Afifa Zafir, Ehsanul Islam Dana, Nazia Hasan Oysoyal, Rahul J. Sarker, Subrata K. Li, Li Muyeen, S. M. Das, Sajal K. Kamwa, Innocent Rajshahi Univ Engn & Technol Dept Mechatron Engn Rajshahi 6204 Bangladesh Univ Technol Sydney Sch Elect & Data Engn Sydney Australia Qatar Univ Dept Elect Engn Doha Qatar Laval Univ Dept Elect & Comp Engn Quebec City PQ G1V 0A6 Canada
Microgrids (MGs) use renewable sources to meet the growing demand for energy with increasing consumer needs and technological advancement. They operate independently as small-scale energy networks using distributed en... 详细信息
来源: 评论
Embedding the MRC and SC Schemes into Trust Management algorithm Applied to IoT security Protection
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2018年 第1期99卷 461-477页
作者: Chen, Joy Iong-Zong Da Yeh Univ Dept Elect Engn 168 Univ Rd Changhua 51505 Taiwan
Nowadays the Internet of Things (IoT) still does not have global policies and standards to deal with the interaction and the development of applications. There are huge of security issues relevant to the application l... 详细信息
来源: 评论