咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 7 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 4 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 数学

主题

  • 11 篇 symmetric algori...
  • 3 篇 asymmetric algor...
  • 3 篇 security
  • 3 篇 encryption
  • 3 篇 cryptography
  • 2 篇 aes
  • 2 篇 cloud computing
  • 1 篇 parallel integra...
  • 1 篇 lattice-based cr...
  • 1 篇 lte-m
  • 1 篇 energy left
  • 1 篇 dešifrování.
  • 1 篇 internet-of-thin...
  • 1 篇 quantum computin...
  • 1 篇 3gpp
  • 1 篇 public key crypt...
  • 1 篇 operating system...
  • 1 篇 hashovací funkce
  • 1 篇 hamiltonian dyna...
  • 1 篇 passwords

机构

  • 1 篇 chinese acad sci...
  • 1 篇 scse galgotias u...
  • 1 篇 ryerson univ dep...
  • 1 篇 manav rachna uni...
  • 1 篇 brown univ div a...
  • 1 篇 inria rocquencou...
  • 1 篇 ecole natl ponts...
  • 1 篇 istanbul univ ce...
  • 1 篇 brno university ...
  • 1 篇 anhui wenda univ...
  • 1 篇 school of comput...
  • 1 篇 srm inst sci & t...
  • 1 篇 imsec dept comp ...
  • 1 篇 ecole natl super...
  • 1 篇 upmc univ paris ...
  • 1 篇 government colle...
  • 1 篇 univ putra malay...
  • 1 篇 department of co...
  • 1 篇 kings coll londo...
  • 1 篇 univ putra malay...

作者

  • 1 篇 al-haddad s. a. ...
  • 1 篇 georgiou konstan...
  • 1 篇 aggarwal kirti
  • 1 篇 maday yvon
  • 1 篇 baghela vishwade...
  • 1 篇 urien p
  • 1 篇 aydin muhammed a...
  • 1 篇 dai xiaoying
  • 1 篇 sudhakaran prade...
  • 1 篇 malathy c.
  • 1 篇 badra m
  • 1 篇 le bris claude
  • 1 篇 shalu
  • 1 篇 shen desong
  • 1 篇 abdullah azizol
  • 1 篇 saini neha
  • 1 篇 yakubov yuval
  • 1 篇 yagci mehmet yav...
  • 1 篇 legoll frederic
  • 1 篇 guven ebu yusuf

语言

  • 9 篇 英文
  • 1 篇 土耳其文
  • 1 篇 其他
检索条件"主题词=Symmetric algorithms"
11 条 记 录,以下是1-10 订阅
排序:
symmetric PARAREAL algorithms FOR HAMILTONIAN SYSTEMS
收藏 引用
ESAIM-MATHEMATICAL MODELLING AND NUMERICAL ANALYSIS-MODELISATION MATHEMATIQUE ET ANALYSE NUMERIQUE 2013年 第3期47卷 717-742页
作者: Dai, Xiaoying Le Bris, Claude Legoll, Frederic Maday, Yvon Chinese Acad Sci Acad Math & Syst Sci Inst Computat Math & Sci Engn Comp LSEC Beijing 100190 Peoples R China Ecole Natl Ponts & Chaussees F-77455 Marne La Vallee 2 France INRIA Rocquencourt MICMAC Team Project F-78153 Le Chesnay France UPMC Univ Paris 06 Lab JL Lions UMR 7598 F-75252 Paris 05 France Brown Univ Div Appl Math Providence RI 02912 USA
The parareal in time algorithm allows for efficient parallel numerical simulations of time-dependent problems. It is based on a decomposition of the time interval into subintervals, and on a predictor-corrector strate... 详细信息
来源: 评论
Energy-Aware Framework for Assessing Cryptographic algorithms in Wireless Sensor Networks
收藏 引用
SN Computer Science 2025年 第4期6卷 1-17页
作者: Pooja Shalu Saini, Neha Baghela, Vishwadeepak Singh Khan, Mohd Anas School of Computer Science Engineering and Technology Bennett University Uttar Pradesh Greater Noida India Manav Rachna University Faridabad Haryana Faridabad India Government College Chhachhrauli Haryana Yamuna Nagar India SCSE Galgotias University Uttar Pradesh Greater Noida India Department of Computer Engineering Jamia Millia Islamia Delhi India
Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significan... 详细信息
来源: 评论
Cybersecurity Challenges Associated With the Internet of Things in a Post-Quantum World
收藏 引用
IEEE ACCESS 2020年 8卷 157356-157381页
作者: Althobaiti, Ohood Saud Dohler, Mischa Kings Coll London Dept Engn London WC2R 2LS England
The Internet of Things (IoT) is an emerging networking paradigm connecting billions of devices securely to the Internet. Another emerging paradigm is quantum computing which - while opening new compute opportunities -... 详细信息
来源: 评论
symmetric rendezvous with advice: How to rendezvous in a disk
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2019年 134卷 13-24页
作者: Georgiou, Konstantinos Griffiths, Jay Yakubov, Yuval Ryerson Univ Dept Math 350 Victoria St Toronto ON M5B 2K3 Canada
In the classic symmetric Rendezvous problem on a Line (SR-LINE), two robots at known distance 2 but unknown direction execute the same randomized algorithm trying to minimize the expected rendezvous time. A long stand... 详细信息
来源: 评论
Introducing SmartCards to remote authenticate passwords using public key encryption
Introducing SmartCards to remote authenticate passwords usin...
收藏 引用
IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication
作者: Badra, M Urien, P Ecole Natl Super Telecommun Bretagne F-75013 Paris France
Password authentication is one of the most local and remote authentication methods. This can be done by sharing a password between the peers. At the operating system server, the passwords file must be protected agains... 详细信息
来源: 评论
A Review of Cloud Security Based on Cryptographic Mechanisms  4
A Review of Cloud Security Based on Cryptographic Mechanisms
收藏 引用
International Symposium on Biometrics and Security Technologies (ISBAST)
作者: Abd, Sura Khalil Al-Haddad, S. A. R. Hashim, Fazirulhisyam Abdullah, Azizol Univ Putra Malaysia Comp & Commun Engn Serdang Malaysia Univ Putra Malaysia Comp Sci & Informat Technol Serdang Malaysia
Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access t... 详细信息
来源: 评论
Comparison of RC6, Modified RC6 & Enhancement of RC6  2
Comparison of RC6, Modified RC6 & Enhancement of RC6
收藏 引用
International Conference on Advances in Computer Engineering and Applications (ICACEA)
作者: Aggarwal, Kirti IMSEC Dept Comp Sci & Engn Ghaziabad India
In this paper we are going to compare the symmetric Block cipher RC6 with the two more versions of RC6. Modified RC6 and Enhanced RC6 provide some improvements of RC6, which is latest version of AES. The basic differe... 详细信息
来源: 评论
CRYPTOGRAPHIC ALGORITHM TEST AND PERFORMANCE ANALYSIS IN LOW POWER CAPABILITIES
CRYPTOGRAPHIC ALGORITHM TEST AND PERFORMANCE ANALYSIS IN LOW...
收藏 引用
International Conference on Artificial Intelligence and Data Processing (IDAP)
作者: Tacettin, Bengu Guven, Ebu Yusuf Yagci, Mehmet Yavuz Aydin, Muhammed Ali Istanbul Univ Cerrahpasa Bilgisayar Muhendisligi Istanbul Turkey
Sensor devices, RFID tags, wireless sensor networks, Internet of Things and embedded systems, which have increasing usage areas in human life, connect objects internally and maintain continuous communication with each... 详细信息
来源: 评论
Výkonnostní testy kryptografických algoritmů
Výkonnostní testy kryptografických algoritmů
收藏 引用
作者: Pospíšil, Karel Brno University of Technology
Bakalářské práce se zabývá rozborem jednotlivých kryptografických algoritmů, které se využívají při zabezpečování komunikace. První část je věnov&... 详细信息
来源: 评论
Energy efficient distributed lightweight authentication and encryption technique for IoT security
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 2022年 第2期35卷 e4198-e4198页
作者: Sudhakaran, Pradeep Malathy, C. SRM Inst Sci & Technol Dept Comp Sci & Engn Kattankulathur 603203 India
Internet of Things (IoT) is an intelligent technology and service that mutually communicates information between human and devices or between Internet-based devices. In IoT security, the authentication should be distr... 详细信息
来源: 评论