咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 17 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 27 篇 security algorit...
  • 5 篇 cryptography
  • 4 篇 encryption
  • 2 篇 internet of thin...
  • 2 篇 cms system
  • 2 篇 enterprise-class...
  • 2 篇 access control
  • 2 篇 md5
  • 2 篇 iot
  • 2 篇 rsa
  • 2 篇 asymmetric
  • 2 篇 web site securit...
  • 2 篇 mrc (maximum rat...
  • 2 篇 application laye...
  • 2 篇 security
  • 2 篇 aes
  • 2 篇 symmetric
  • 2 篇 3des
  • 2 篇 rc6
  • 1 篇 cyber security

机构

  • 2 篇 qatar univ dept ...
  • 2 篇 rajshahi univ en...
  • 2 篇 univ technol syd...
  • 1 篇 univ politecn sa...
  • 1 篇 chinese acad sci...
  • 1 篇 delhi technol un...
  • 1 篇 n china elect po...
  • 1 篇 chinese acad sci...
  • 1 篇 brac univ dept c...
  • 1 篇 shaanxi yanchang...
  • 1 篇 escuela politecn...
  • 1 篇 univ chinese aca...
  • 1 篇 prist univ thanj...
  • 1 篇 ims ghaziabad
  • 1 篇 laval univ dept ...
  • 1 篇 university of pe...
  • 1 篇 mumbai univ thad...
  • 1 篇 henan tech coll ...
  • 1 篇 department of co...
  • 1 篇 infocity tech ma...

作者

  • 2 篇 chen joy iong-zo...
  • 2 篇 akter afifa
  • 2 篇 muyeen s. m.
  • 2 篇 sarker subrata k...
  • 2 篇 zafir ehsanul is...
  • 1 篇 akashdeep bhardw...
  • 1 篇 cui ping
  • 1 篇 ming-quan zhang
  • 1 篇 rajput shyam sin...
  • 1 篇 gupta avadesh ku...
  • 1 篇 sengupta anirban
  • 1 篇 li li
  • 1 篇 zhang zhujun
  • 1 篇 li tian
  • 1 篇 fan wei
  • 1 篇 liu cong
  • 1 篇 hashem m. m. a.
  • 1 篇 malgaonkar saura...
  • 1 篇 wei qinfang
  • 1 篇 hou rui

语言

  • 25 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Security algorithm"
27 条 记 录,以下是11-20 订阅
排序:
LEA-SIoT: Hardware Architecture of Lightweight Encryption algorithm for Secure IoT on FPGA Platform
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2020年 第1期11卷 720-725页
作者: Bharathi, R. Parvatham, N. PRIST Univ Thanjavur Tamil Nadu India
The Internet of Things (IoT) is one of the emerging technology in today's world to connect billions of electronic devices and providing the data security to these electronic devices while transmission from the att... 详细信息
来源: 评论
Measuring security: A Step Towards Enhancing security of System
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS IN THE SERVICE SECTOR 2018年 第1期10卷 28-53页
作者: Jaiswal, Shruti Gupta, Daya Delhi Technol Univ Dept Comp Sci & Engn Delhi India
The researchers have been focusing on embedding security from the early phases of software development lifecycle. They have researched and innovated a field of security Engineering where security concerns are embedded... 详细信息
来源: 评论
Performance Analysis of security algorithms for IoT devices  5
Performance Analysis of Security Algorithms for IoT devices
收藏 引用
5th IEEE-Region-10 Humanitarian Technology Conference (R10-HTC)
作者: Khan, Nuzhat Sakib, Nazmus Jerin, Ismot Quader, Shaela Chakrabarty, Amitabha BRAC Univ Dept Comp Sci & Engn Dhaka Bangladesh
Internet of things (IoT) has gained tremendous attention in today's world, IoT ecosystem is growing and showing us a glimpse of how the future will look in the coming days. However, the IoT sector is not impeccabl... 详细信息
来源: 评论
security algorithms for Cloud Computing
Security Algorithms for Cloud Computing
收藏 引用
International Conference on Computational Modelling and security (CMS)
作者: Bhardwaj, Akashdeep Subrahmanyam, G. V. B. Avasthi, Vinay Sastry, Hanumat Univ Petr & Energy Studies Bidholi Dehradun 248001 Uttar Pradesh India Infocity Tech Mahindra Hyderabad 500081 Andhra Pradesh India
With growing awareness and concerns regards to Cloud Computing and Information security, there is growing awareness and usage of security algorithms into data systems and processes. This paper presents a brief overvie... 详细信息
来源: 评论
Research on Information security algorithm of Wireless Communication System
收藏 引用
2nd International Conference on Intelligent Structure and Vibration Control (ISVC 2012)
作者: Chen, Cong Wuzhou Univ Dept Comp Sci Wuzhou 543000 Peoples R China
The ubiquitous network and it provides the high quality wireless service, all depends on the wireless communication system network security level. Safety algorithm for wireless communication system constructed in diff... 详细信息
来源: 评论
security algorithms for Cloud Computing
收藏 引用
Procedia Computer Science 2016年 85卷 535-542页
作者: Akashdeep Bhardwaj G.V.B. Subrahmanyam Vinay Avasthi Hanumat Sastry University of Petroleum and Energy Studies Bidholi Dehradun 248001 India Tech Mahindra Infocity Hyderabad 500081 India
With growing awareness and concerns regards to Cloud Computing and Information security, there is growing awareness and usage of security algorithms into data systems and processes. This paper presents a brief overvie... 详细信息
来源: 评论
Embedding of MRC in TM to Increase the security for IoT Technologies  8
Embedding of MRC in TM to Increase the Security for IoT Tech...
收藏 引用
8th IEEE International Conference on Awareness Science and Technology (iCAST)
作者: Chen, Joy Iong-Zong Chuang, Den Ji Da Yeh Univ Dept Elect Engn Chunghwa Taiwan
Recently, the IoT (internet of things) still does not have global policies and standards to govern the interaction and the development of applications. There are huge of security issues relevant to the application lay... 详细信息
来源: 评论
Symmetric Cryptography algorithm - SAT Initial Design and Development
Symmetric Cryptography Algorithm - SAT Initial Design and De...
收藏 引用
3rd International Conference on Computing, Communication, Control and Automation (ICCUBEA)
作者: Malgaonkar, Saurabh Vichare, Abhishek Hirave, Tejas Mumbai Univ Thadomal Shahani Engn Coll Comp Engn Dept Bombay Maharashtra India NMIMS Univ Mukesh Patel Sch Technol Management & Engn Comp Engn Dept Bombay Maharashtra India Mumbai Univ Shah & Anchor Kutchhi Coll Engn Comp Engn Dept Bombay Maharashtra India
This paper describes a new symmetric cryptography algorithm that is designed and developed by the authors. The research work on the 'SAT' cryptography algorithm is in its initial stages, this paper highlights ... 详细信息
来源: 评论
Secure Routing Against DDoS Attack in Wireless Sensor Network  3
Secure Routing Against DDoS Attack in Wireless Sensor Networ...
收藏 引用
3rd IEEE International Conference on Computational Intelligence and Communication Technology (CICT)
作者: Nagar, Surendra Rajput, Shyam Singh Gupta, Avadesh Kumar Trivedi, Munesh Chandra ABV IIITM Dept Informat & Commun Technol Gwalior India IMS Ghaziabad India ABES Engn Coll Dept Comp Sci & Engn Ghaziabad India
Wireless sensor network is a low cost network to solve many of the real world problems. These sensor nodes used to deploy in the hostile or unattended areas to sense and monitor the atmospheric situations such as moti... 详细信息
来源: 评论
A Quality of Service Routing algorithm in Wireless Sensor Networks
收藏 引用
INTERNATIONAL JOURNAL OF ONLINE ENGINEERING 2017年 第7期13卷 47-56页
作者: Yang, Xiaoqing Henan Tech Coll Construct Zhengzhou Henan Peoples R China
An Quality of Service(QOS) secure routing algorithm based on ant colony optimization is put forward to solve a variety of security problems in wireless sensor networks. The algorithm combines the ant colony optimizati... 详细信息
来源: 评论