咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 7 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 计算机科学与技术...
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
  • 2 篇 理学
    • 2 篇 数学
    • 2 篇 系统科学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 15 篇 symmetric encryp...
  • 2 篇 electric vehicle...
  • 2 篇 aes algorithm
  • 2 篇 information secu...
  • 2 篇 cloud computing
  • 2 篇 can bus
  • 2 篇 hash algorithm
  • 1 篇 multi source dat...
  • 1 篇 telecommunicatio...
  • 1 篇 kinematic algori...
  • 1 篇 secure network s...
  • 1 篇 login log
  • 1 篇 elliptic curve c...
  • 1 篇 massive multiple...
  • 1 篇 power consumptio...
  • 1 篇 software proflli...
  • 1 篇 networking techn...
  • 1 篇 msp430 analog-to...
  • 1 篇 rsa algorithm
  • 1 篇 spider monkey op...

机构

  • 1 篇 state grid shand...
  • 1 篇 southeast univ s...
  • 1 篇 state grid shand...
  • 1 篇 state grid jiang...
  • 1 篇 college of compu...
  • 1 篇 changchun financ...
  • 1 篇 beijing municipa...
  • 1 篇 zhejiang univ sc...
  • 1 篇 zhejiang univ co...
  • 1 篇 northeast elect ...
  • 1 篇 college of elect...
  • 1 篇 guangdong ocean ...
  • 1 篇 tech univ cluj n...
  • 1 篇 state grid shand...
  • 1 篇 state grid jiang...
  • 1 篇 college of infor...
  • 1 篇 gh raisoni coll ...
  • 1 篇 beijing polytech...
  • 1 篇 jilin normal uni...
  • 1 篇 zhejiang univ co...

作者

  • 1 篇 xiangdong jin
  • 1 篇 liu ziquan
  • 1 篇 hu chengbo
  • 1 篇 tomea o.
  • 1 篇 liu weite
  • 1 篇 wang haiqing
  • 1 篇 zhou lijian
  • 1 篇 wang kunhao
  • 1 篇 sun hui
  • 1 篇 wei changchao
  • 1 篇 xuan chunqing
  • 1 篇 jin xiangdong
  • 1 篇 sun qiang
  • 1 篇 savarimuthu nick...
  • 1 篇 ma zhanguo
  • 1 篇 yifan ding
  • 1 篇 zhang guojiang
  • 1 篇 zhang zhaohui
  • 1 篇 ebinazer silamba...
  • 1 篇 qiujie lu

语言

  • 15 篇 英文
检索条件"主题词=Symmetric Encryption Algorithm"
15 条 记 录,以下是11-20 订阅
排序:
An efficient approach based on identity for distributed data possession in multicloud using SelCSP framework
An efficient approach based on identity for distributed data...
收藏 引用
International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
作者: Ahemad, Shaikh Rahil Dole, Lalit GH Raisoni Coll Engn Dept Comp Sci & Engn Nagpur Maharashtra India
The vital idea in the distributed storage is checking uprightness of the remote data. It can provide the client with a check of the outsourced client documents without downloading the entire data. There are a few circ... 详细信息
来源: 评论
Power evaluation methods for data encryption algorithms
收藏 引用
IET SOFTWARE 2014年 第1期8卷 12-18页
作者: Nie, Tingyuan Zhou, Lijian Lu, Zhe-Ming Qingdao Technol Univ Commun & Elect Engn Inst Qingdao Peoples R China Zhejiang Univ Sch Aeronaut & Astronaut Hangzhou 310027 Zhejiang Peoples R China
With the increasingly extensive application of networking technology, security of network becomes significant than ever before. encryption algorithm plays a key role in construction of a secure network system. However... 详细信息
来源: 评论
The design of an encrypted file system based on improved DES algorithm
The design of an encrypted file system based on improved DES...
收藏 引用
2013 International Conference on Communication Technology (ICCT 2013)
作者: Yaqiong Liu Dingrong Yuan Yuwei Cuan Qiujie Lu College of Computer Science and Information Technology Guangxi Normal University
With the rapid development of information technology, information security has become an important topic in the present society. Data encryption Standard(DES) algorithm has been widely used in various fields since it ... 详细信息
来源: 评论
The Research of the Cloud Security Architecture
收藏 引用
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011)
作者: Hu Xiangyi Ma Zhanguo Liu Yu Beijing Municipal Inst Sci & Technol Informat Network Cryptog Authenticat Beijing Key Lab Beijing Peoples R China
A new solution of cloud security is proposed in this paper. It is used the security architecture of cloud computing based on symmetric encryption algorithm, combination key technology and encryption chip hardware. Com... 详细信息
来源: 评论
DNA Cryptographic algorithms
收藏 引用
International Conference on Advancements of Medicine and Health Care Through Technology
作者: Tomea, O. Borda, M. E. Tech Univ Cluj Napoca Dept Commun Cluj Napoca Romania
DNA has a great cryptographic strength, its binding properties between nucleotides bases (A-T, C-G) offer the possibility to create self-assembly structures which are an efficient means of executing parallel molecular... 详细信息
来源: 评论