咨询与建议

限定检索结果

文献类型

  • 3 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 5 篇 stream cipher al...
  • 2 篇 block cipher alg...
  • 1 篇 orthogonal learn...
  • 1 篇 orthogonal latin...
  • 1 篇 reconfigurable
  • 1 篇 big data
  • 1 篇 perfect secrecy
  • 1 篇 virtual private ...
  • 1 篇 iot
  • 1 篇 mapreduce
  • 1 篇 basic cryptosyst...
  • 1 篇 module feedback ...
  • 1 篇 improved k medio...
  • 1 篇 data hiding key
  • 1 篇 raspberry pi
  • 1 篇 design
  • 1 篇 stationary wavel...
  • 1 篇 one-time pad
  • 1 篇 encryption
  • 1 篇 decryption

机构

  • 1 篇 natl crypto inst...
  • 1 篇 natl crypto inst...
  • 1 篇 city univ hong k...
  • 1 篇 aksheyaa coll en...
  • 1 篇 shanghai second ...
  • 1 篇 st peters univ m...
  • 1 篇 south travancore...
  • 1 篇 shenzhen univ co...
  • 1 篇 manonmaniam sund...

作者

  • 1 篇 ismoyo dimas dwi...
  • 1 篇 parthasarathi k....
  • 1 篇 sujatha s. s.
  • 1 篇 suresh g.
  • 1 篇 wardhani rini wi...
  • 1 篇 saraswathy k. s.
  • 1 篇 tian chuanjun
  • 1 篇 chen guanrong
  • 1 篇 h.y.li

语言

  • 5 篇 英文
检索条件"主题词=Stream cipher algorithm"
5 条 记 录,以下是1-10 订阅
排序:
Block cipher and stream cipher algorithm Performance Comparison in a Personal VPN Gateway
Block Cipher and Stream Cipher Algorithm Performance Compari...
收藏 引用
1st International Seminar on Application for Technology of Information and Communication (ISemantic)
作者: Ismoyo, Dimas Dwiki Wardhani, Rini Wisnu Natl Crypto Inst Engn Fac Bogor Indonesia Natl Crypto Inst Bogor Indonesia
A virtual private network (VPN) extends a private network across a public network, such as the Internet. The purpose of this research study is to implemented ATHS3 stream cipher and VEA block cipher algorithm as the a... 详细信息
来源: 评论
Internet of Things Big Data Security in Cloud via stream cipher and Clustering Model
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2022年 第4期123卷 3483-3496页
作者: Saraswathy, K. S. Sujatha, S. S. Manonmaniam Sundaranar Univ ST Hindu Coll Res Ctr Dept Comp Sci Tirunelveli Vinayagar Nagar India South Travancore Hindu Coll Dept Comp Sci Nagercoil India
Big Data in IoT and Cloud Computing are two important developments over the years, enabling companies to provide efficient and effective IT services. To ensure the security of the information being processed, the info... 详细信息
来源: 评论
Data Hiding Approach Based on Stationary Wavelet Transform  2
Data Hiding Approach Based on Stationary Wavelet Transform
收藏 引用
2nd International Conference on Current Trends In Engineering and Technology (ICCTET)
作者: Suresh, G. Parthasarathi, K. A. St Peters Univ Madras Tamil Nadu India Aksheyaa Coll Engn Madras Tamil Nadu India
Data hiding is a tremendous and fast growing multidisciplinary field, which conceals the existence of secret data. Security and the privacy of the data over internet and communication technique is a prime concern amon... 详细信息
来源: 评论
An infinite perfect-secrecy system with non-uniformly distributed keys
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 68卷
作者: Tian, Chuanjun Chen, Guanrong Shenzhen Univ Coll Elect & Informat Engn Shenzhen 518060 Peoples R China City Univ Hong Kong Dept Elect Engn Hong Kong Peoples R China
Based on some recent results derived from the Shannon theory of secrecy systems, this paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy, and establishes a sufficient condition f... 详细信息
来源: 评论
Reconfigurable Design and Implementation of Modular Feedback Shift Register
Reconfigurable Design and Implementation of Modular Feedback...
收藏 引用
2015 International Conference on Advances in Management Engineering and Information Technology(AMEIT 2015)
作者: H.Y.Li Shanghai Second Polytechnic University
The main function components used in stream cipher algorithm Mickey is linear or nonlinear module shift register. Through analyzing its structural characteristics, a kind of reconfigurable module feedback shift regist... 详细信息
来源: 评论