咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 7 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 计算机科学与技术...
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
  • 2 篇 理学
    • 2 篇 数学
    • 2 篇 系统科学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 15 篇 symmetric encryp...
  • 2 篇 electric vehicle...
  • 2 篇 aes algorithm
  • 2 篇 information secu...
  • 2 篇 cloud computing
  • 2 篇 can bus
  • 2 篇 hash algorithm
  • 1 篇 multi source dat...
  • 1 篇 telecommunicatio...
  • 1 篇 kinematic algori...
  • 1 篇 secure network s...
  • 1 篇 login log
  • 1 篇 elliptic curve c...
  • 1 篇 massive multiple...
  • 1 篇 power consumptio...
  • 1 篇 software proflli...
  • 1 篇 networking techn...
  • 1 篇 msp430 analog-to...
  • 1 篇 rsa algorithm
  • 1 篇 spider monkey op...

机构

  • 1 篇 state grid shand...
  • 1 篇 southeast univ s...
  • 1 篇 state grid shand...
  • 1 篇 state grid jiang...
  • 1 篇 college of compu...
  • 1 篇 changchun financ...
  • 1 篇 beijing municipa...
  • 1 篇 zhejiang univ sc...
  • 1 篇 zhejiang univ co...
  • 1 篇 northeast elect ...
  • 1 篇 college of elect...
  • 1 篇 guangdong ocean ...
  • 1 篇 tech univ cluj n...
  • 1 篇 state grid shand...
  • 1 篇 state grid jiang...
  • 1 篇 college of infor...
  • 1 篇 gh raisoni coll ...
  • 1 篇 beijing polytech...
  • 1 篇 jilin normal uni...
  • 1 篇 zhejiang univ co...

作者

  • 1 篇 xiangdong jin
  • 1 篇 liu ziquan
  • 1 篇 hu chengbo
  • 1 篇 tomea o.
  • 1 篇 liu weite
  • 1 篇 wang haiqing
  • 1 篇 zhou lijian
  • 1 篇 wang kunhao
  • 1 篇 sun hui
  • 1 篇 wei changchao
  • 1 篇 xuan chunqing
  • 1 篇 jin xiangdong
  • 1 篇 sun qiang
  • 1 篇 savarimuthu nick...
  • 1 篇 ma zhanguo
  • 1 篇 yifan ding
  • 1 篇 zhang guojiang
  • 1 篇 zhang zhaohui
  • 1 篇 ebinazer silamba...
  • 1 篇 qiujie lu

语言

  • 15 篇 英文
检索条件"主题词=Symmetric Encryption Algorithm"
15 条 记 录,以下是1-10 订阅
排序:
Multi Source Data Association Clustering Analysis Based on symmetric encryption algorithm
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2022年 第4期27卷 1359-1367页
作者: Wang, Haiqing Capital Normal Univ Sch Math Sci Beijing 100048 Peoples R China Beijing Polytech Sch Econ & Management Beijing 100176 Peoples R China
Due to the low clustering accuracy of the existing methods, a multi-source data association clustering method based on symmetric encryption algorithm is proposed. The multi-source data acquisition model is established... 详细信息
来源: 评论
Website information retrieval of web database based on symmetric encryption algorithm
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2021年 1-12页
作者: Xing, Chong Wang, Kunhao Changchun Finance Coll Dept Informat & Technol Changchun Peoples R China Jilin Normal Univ Coll Comp Sci Siping Peoples R China
With the diversification of information development, data security is becoming more and more important. Therefore, the research on website information retrieval of Web database based on symmetric encryption algorithm ... 详细信息
来源: 评论
Information hiding method for long distance transmission in multi-channel IOT based on symmetric encryption algorithm
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2021年 1-11页
作者: Jia, Jun Zhang, Guojiang Hu, Chengbo Zhang, Zhaohui Liu, Ziquan State Grid Jiangsu Elect Power Co Ltd Res Inst Nanjing Peoples R China Southeast Univ Sch Elect Engn Nanjing Peoples R China State Grid Jiangsu Elect Power Co Ltd Nanjing Peoples R China
In order to improve the security of remote transmission of multi-channel Internet of things, a new information hiding method based on symmetric encryption algorithm is proposed. This method is mainly based on the symm... 详细信息
来源: 评论
Design of Wireless Sensor Network Data Acquisition System via Health Sensor Based on symmetric encryption algorithm
收藏 引用
JOURNAL OF TESTING AND EVALUATION 2023年 第1期51卷 278-290页
作者: Xuan, Chunqing Zhengzhou Business Univ Coll Informat & Elect Engn Dept Comp Sci & Technol 136 Zijing Rd Zhengzhou 451200 Peoples R China
In order to improve the data collection effect of the wireless sensor network, a data collection system based on symmetric encryption algorithm is designed via health sensor. Upload the received data to the host via R... 详细信息
来源: 评论
Improvement of Cloud Computing Medical Data Protection Technology Based on symmetric encryption algorithm
收藏 引用
JOURNAL OF TESTING AND EVALUATION 2023年 第1期51卷 366-381页
作者: Zhao, Nannan Guangdong Ocean Univ Cunjin Coll Dept Accounting Zhanjiang 524094 Peoples R China
The traditional data-protection method has the advantages of a long average secrecy time and low encryption efficiency in healthcare. This paper proposes an improved method of cloud-computing data-protection technolog... 详细信息
来源: 评论
ESKEA: Enhanced symmetric Key encryption algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2021年 第4期117卷 3309-3325页
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, S. Mary Saira Natl Inst Technol Dept Comp Applicat Tiruchirappalli Tamil Nadu India
Data deduplication approach is utilized in cloud storage to decrease the bandwidth of communication and storage space by eliminating the data copies from the cloud service provider (CSP). However, one of the main prob... 详细信息
来源: 评论
A Lightweight White-box symmetric encryption algorithm against Node Capture for WSNs
A Lightweight White-box Symmetric Encryption Algorithm again...
收藏 引用
IEEE Wireless Communications and Networking Conference (WCNC)
作者: Shi, Yang He, Zongjian Tongji Univ Sch Software Engn Shanghai Peoples R China
Wireless Sensor Networks (WSNs) are often deployed in hostile environments and an adversary can potentially capture sensor nodes. This is a typical white-box attack context, i.e., the adversary may have total visibili... 详细信息
来源: 评论
Design of Secure Pilot Spectrum for 5G Oriented Massive MIMO System  5
Design of Secure Pilot Spectrum for 5G Oriented Massive MIMO...
收藏 引用
IEEE 5th International Conference on Electronics and Communication Engineering (ICECE)
作者: Chen, Jiangfei Sun, Qiang Wang, Rui Wei, Changchao Liu, Weite Pan, Xinghan State Grid Shandong Elect Power Co Jinan Peoples R China State Grid Shandong Elect Power Co Weihai Wendeng Power Supply Co Weihai Peoples R China State Grid Shandong Elect Power Co Liaocheng Power Supply Co Liaocheng Shandong Peoples R China State Grid Shandong Elect Power Co Information&Telecommunicat Co Jinan Peoples R China Northeast Elect Power Univ Sch Elect Engn Jilin Peoples R China
In a Massive MIMO system, the base station needs to estimate the channel according to the received pilot signal and obtain the channel state information to design the downlink precoding matrix. The spectrum pattern of... 详细信息
来源: 评论
An Optimization Method for Encrypting CAN Messages  39
An Optimization Method for Encrypting CAN Messages
收藏 引用
39th Chinese Control Conference (CCC)
作者: Yao, Xinyu Sun, Hui Jin, Xiangdong Ding, Yifan Zhejiang Univ Coll Elect Engn Hangzhou 310027 Peoples R China Zhejiang Univ Coll Informat Sci & Elect Engn Hangzhou 310027 Peoples R China
The electric vehicles nowadays arc managed by networked controllers. Because of the advantages of fast, reliable, simple wiring, and light weight, CAN bus has become one of the most widely used field buses in the worl... 详细信息
来源: 评论
An Optimization Method for Encrypting CAN Messages
An Optimization Method for Encrypting CAN Messages
收藏 引用
第三十九届中国控制会议
作者: Xinyu Yao Hui Sun Xiangdong Jin Yifan Ding College of Electrical Engineering Zhejiang University College of Information Science & Electronic Engineering Zhejiang University
The electric vehicles nowadays are managed by networked controllers. Because of the advantages of fast, reliable, simple wiring, and light weight, CAN bus has become one of the most widely used field buses in the worl... 详细信息
来源: 评论