咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 17 篇 计算机科学与技术...
    • 8 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 3 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 系统科学

主题

  • 24 篇 security algorit...
  • 4 篇 encryption
  • 3 篇 privacy
  • 2 篇 database securit...
  • 2 篇 intrusion preven...
  • 2 篇 wireless communi...
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 rsa
  • 2 篇 information secu...
  • 2 篇 aes
  • 2 篇 database
  • 2 篇 cloud computing
  • 1 篇 encryption and k...
  • 1 篇 internet of thin...
  • 1 篇 threat protectio...
  • 1 篇 security strateg...
  • 1 篇 threat isolation
  • 1 篇 theorem proving
  • 1 篇 ensure the infor...

机构

  • 1 篇 facultad de cien...
  • 1 篇 univ teknol mala...
  • 1 篇 natl polytech sc...
  • 1 篇 univ teknol petr...
  • 1 篇 prince sultan un...
  • 1 篇 vasile goldis we...
  • 1 篇 no kentucky univ...
  • 1 篇 jordan univ sci ...
  • 1 篇 ryazan state rad...
  • 1 篇 menoufia univ fa...
  • 1 篇 scse deptt of cs...
  • 1 篇 nbn sinhgad sch ...
  • 1 篇 cbit dept cse hy...
  • 1 篇 nadimpalli satya...
  • 1 篇 miracle educ soc...
  • 1 篇 univ guadalajara...
  • 1 篇 univ surrey dept...
  • 1 篇 univ bourgogne f...
  • 1 篇 sunway univ fac ...
  • 1 篇 rayalaseema univ...

作者

  • 1 篇 pragya tewari
  • 1 篇 rajalakshmi d.
  • 1 篇 ruchkin v. n.
  • 1 篇 chiacchia matteo
  • 1 篇 máximo giovani t...
  • 1 篇 yejarla prathyus...
  • 1 篇 ebrahim mansoor
  • 1 篇 masrom maslin
  • 1 篇 cordova ronald s...
  • 1 篇 al-azawi rula
  • 1 篇 ibrahim m. sohai...
  • 1 篇 gao yue
  • 1 篇 daniel humberto ...
  • 1 篇 gawali dhanashri...
  • 1 篇 paci andrea
  • 1 篇 ramanamurthy m. ...
  • 1 篇 toapanta toapant...
  • 1 篇 carlos ignacio r...
  • 1 篇 eric s. emrick
  • 1 篇 félix gustavo me...

语言

  • 24 篇 英文
检索条件"主题词=Security algorithms"
24 条 记 录,以下是1-10 订阅
排序:
A Review on the Verification Approaches and Tools used to Verify the Correctness of security algorithms and Protocols
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第6期10卷 146-152页
作者: Al-humaikani, Mohammed Abdulqawi Saleh Bin Ab, Lukman Rahim Univ Teknol Petronas Bandar Seri Iskandar Dept Comp & Informat Sci Seri Iskandar Malaysia
security algorithms and protocols are typical essential upgrades that must be involved within systems and their structures to provide the best performance. The protocols and systems should go through verification and ... 详细信息
来源: 评论
Analysis of security algorithms for a Distributed Database
Analysis of Security Algorithms for a Distributed Database
收藏 引用
2018 3rd International Conference on Computer Science and Information Engineering(ICCSIE 2018)
作者: Segundo Moisés Toapanta Toapanta Félix Gustavo Mendoza Qumí Daniel Humberto Plúa Moran Máximo Giovani Tandazo Espinoza Luis Enrique Mafla Gallegos María del Rocío Maciel Arellano Department of Computer Science Universidad Politécnica Salesiana Faculty of Systems Engineering Escuela Politécnica Nacional CUCEA-UDG Universidad de Guadalajara
This paper analyzed the security of a database considering the environment of distributed *** are several security mechanisms that are applied to the different types of data that are saved;this research identifies sev... 详细信息
来源: 评论
Comparative Analysis on the Performance of Selected security algorithms in Cloud Computing
Comparative Analysis on the Performance of Selected Security...
收藏 引用
International Conference on Electrical and Computing Technologies and Applications (ICECTA)
作者: Cordova, Ronald S. Maata, Rolou Lyn R. Halibas, Alrence S. Al-Azawi, Rula Gulf Coll Seeb Oman
Computer systems security plays a critical role in ensuring the confidentiality, integrity and data protection of electronic resources in a workplace. However, most web information system developers employ algorithms ... 详细信息
来源: 评论
security algorithms for Wireless Medical Data
Security Algorithms for Wireless Medical Data
收藏 引用
Online International Conference on Green Engineering and Technologies (IC-GET)
作者: Kondawar, Snehal S. Gawali, Dhanashri H. NBN Sinhgad Sch Engn Elect & Telecommun Pune Maharashtra India
In wireless medical devices, the patient's medical data are collected and wirelessly sent to the doctor. Nowadays, there is an increase in the online attackers on the wirelessly sent patient's data to exploit ... 详细信息
来源: 评论
5GMap: Enabling external audits of access security and attach procedures in real-world cellular deployments
收藏 引用
COMPUTER COMMUNICATIONS 2025年 234卷
作者: Paci, Andrea Chiacchia, Matteo Bianchi, Giuseppe CNIT Natl Network Assurance & Monitoring LAB Rome Italy
In cellular networks, security vulnerabilities often arise from misconfigurations and improper implementations of protection mechanisms. Typically, ensuring proper security configurations is the responsibility of netw... 详细信息
来源: 评论
Intelligent security Strategy Based on the Selection of the Computer and Neural Network Architecture
收藏 引用
AUTOMATIC CONTROL AND COMPUTER SCIENCES 2022年 第8期56卷 970-980页
作者: Ruchkin, V. N. Kostrov, B. V. Fulin, V. A. Ryazan State Univ Ryazan Russia Ryazan State Radio Engn Univ Ryazan Russia
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort ... 详细信息
来源: 评论
An optical-based encryption and authentication algorithm for color and grayscale medical images
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第15期82卷 23735-23770页
作者: El-Shafai, Walid Almomani, Iman Ara, Anees Alkhayer, Aala Prince Sultan Univ Comp Sci Dept Secur Engn Lab Riyadh 11586 Saudi Arabia Menoufia Univ Fac Elect Engn Dept Elect & Elect Commun Engn Menoufia 32952 Egypt Univ Jordan King Abdullah 2 Sch Informat Technol Comp Sci Dept Amman 11942 Jordan
The continuous digitization of healthcare services makes them more targeted by security attackers that attempt to steal the patients' confidential records and hijack their healthcare rights. Consequently, many exi... 详细信息
来源: 评论
PROLISEAN: A New security Protocol for Programmable Matter
收藏 引用
ACM TRANSACTIONS ON INTERNET TECHNOLOGY 2021年 第1期21卷 1–29页
作者: Hourany, Edy Habib, Bachir Fountaine, Camille Makhoul, Abdallah Piranda, Benoit Bourgeois, Julien Holy Spirit Univ Kaslik POB 446 Kaslik Jounieh Lebanon Ecole Speciale Mil St Cyr Coetquidan POB 56380 Guer France Univ Bourgogne Franche Comte CNRS FEMTO ST Inst 1 Cours Leprince Ringuet Montbeliard France
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of in... 详细信息
来源: 评论
Efficient security Algorithm for Power-Constrained IoT Devices
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2021年 第7期8卷 5498-5509页
作者: Mamvong, Joseph N. Goteng, Gokop L. Zhou, Bo Gao, Yue Queen Mary Univ London Dept Elect Engn & Comp Sci London E1 4NS England Liverpool John Moores Univ Sch Comp Sci & Math Liverpool L3 3AF Merseyside England Univ Surrey Dept Elect & Elect Engn Guildford GU2 7XH Surrey England
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities do not exactly fit into the provision of existing security techniques due to their constrained nature. Classical security alg... 详细信息
来源: 评论
Usability in a Mixed Cryptography and Hardware security System  23
Usability in a Mixed Cryptography and Hardware Security Syst...
收藏 引用
Proceedings of the XI Latin American Conference on Human Computer Interaction
作者: Barbara Emma Sanchez Rinza Carlos Ignacio Robledo Sanchez Mario Rossainz Lopez Facultad de ciencias de la computación Buap Mexico Facultad de ciencias físico matemáticas Buap Mexico
Cryptography attempts to provide a private and secure transmission channel for communication between sender and receiver, through a secret key, so that, if an intruder manages to intercept this transmission, they cann... 详细信息
来源: 评论