咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 6 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 4 篇 软件工程
    • 3 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 11 篇 asymmetric algor...
  • 5 篇 symmetric algori...
  • 4 篇 cryptography
  • 2 篇 rsa
  • 2 篇 aes
  • 2 篇 encryption
  • 1 篇 cryptographic al...
  • 1 篇 certification au...
  • 1 篇 hardware securit...
  • 1 篇 reliability
  • 1 篇 energy left
  • 1 篇 access control
  • 1 篇 data integrity
  • 1 篇 suffrage
  • 1 篇 cipher text
  • 1 篇 electronic signa...
  • 1 篇 evaluation crite...
  • 1 篇 access key
  • 1 篇 key
  • 1 篇 transparency

机构

  • 1 篇 computer science...
  • 1 篇 future technolog...
  • 1 篇 scse galgotias u...
  • 1 篇 manav rachna uni...
  • 1 篇 faculty of mathe...
  • 1 篇 institute of inf...
  • 1 篇 john von neumann...
  • 1 篇 tianjin univ col...
  • 1 篇 faculty of engin...
  • 1 篇 educ minist chin...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 seeu fac contemp...
  • 1 篇 university of au...
  • 1 篇 computer science...
  • 1 篇 school of comput...
  • 1 篇 shenzhen univ in...
  • 1 篇 hong kong univ s...
  • 1 篇 1/4b ton duc tha...
  • 1 篇 natl res ctr com...

作者

  • 1 篇 loc nguyen
  • 1 篇 zengping cheng
  • 1 篇 you-xia dong
  • 1 篇 baghela vishwade...
  • 1 篇 kumar m. guru vi...
  • 1 篇 hyseni dhurate
  • 1 篇 génesis alexandr...
  • 1 篇 cico betim
  • 1 篇 ragupathy u. s.
  • 1 篇 hubei chen yansh...
  • 1 篇 xiao-ling huang
  • 1 篇 saman riaz
  • 1 篇 krause l
  • 1 篇 guo-dong ye
  • 1 篇 shalu
  • 1 篇 muhammad nadeem
  • 1 篇 amir mosavi
  • 1 篇 syeda wajiha zah...
  • 1 篇 saini neha
  • 1 篇 shahab sband

语言

  • 9 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=asymmetric algorithm"
11 条 记 录,以下是1-10 订阅
A Proposal of Loose asymmetric Cryptography algorithm
A Proposal of Loose Asymmetric Cryptography Algorithm
收藏 引用
2017 2nd International Conference on Software, Multimedia and Communication Engineering(SMCE 2017)
作者: Loc NGUYEN 1/4B Ton Duc Thang
Although traditional asymmetric algorithm along with its implementations are successful in keeping important documents confidential,it uses only one private *** research proposes the loose asymmetric(LA) algorithm to ... 详细信息
来源: 评论
Energy-Aware Framework for Assessing Cryptographic algorithms in Wireless Sensor Networks
收藏 引用
SN Computer Science 2025年 第4期6卷 1-17页
作者: Pooja Shalu Saini, Neha Baghela, Vishwadeepak Singh Khan, Mohd Anas School of Computer Science Engineering and Technology Bennett University Uttar Pradesh Greater Noida India Manav Rachna University Faridabad Haryana Faridabad India Government College Chhachhrauli Haryana Yamuna Nagar India SCSE Galgotias University Uttar Pradesh Greater Noida India Department of Computer Engineering Jamia Millia Islamia Delhi India
Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significan... 详细信息
来源: 评论
asymmetric pixel confusion algorithm for images based on RSA and Arnold transform
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2020年 第12期21卷 1783-1794页
作者: Xiao-ling HUANG You-xia DONG Kai-xin JIAO Guo-dong YE Faculty of Mathematics and Computer Science Guangdong Ocean UniversityZhanjiang 524088China
We propose a new asymmetric pixel confusion algorithm for images based on the Rivest-Shamir-Adleman(RSA)public-key cryptosystem and Arnold ***,the RSA asymmetric algorithm is used to generate two groups of Arnold tran... 详细信息
来源: 评论
Information security system based on virtual-optics imaging methodology and public key infrastructure
收藏 引用
OPTIK 2004年 第9期115卷 420-426页
作者: Peng, X Zhang, P Cai, LL Shenzhen Univ Inst Optoelect Shenzhen 518060 Peoples R China Educ Minist China Key Lab Optoelect Devices & Syst Shenzhen 518060 Peoples R China Tianjin Univ Coll Precis Instrumentat & Optoelect Engn Tianjin Peoples R China Hong Kong Univ Sci & Technol Dept Mech Engn Kowloon Hong Kong Peoples R China
In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously ... 详细信息
来源: 评论
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES AND STANDARDIZATION
收藏 引用
COMPUTER STANDARDS & INTERFACES 1995年 第1期17卷 63-67页
作者: KRAUSE, L NATL RES CTR COMP SCI GMDD-52737 ST AUGUSTINGERMANY
A brief history of international standardization of IT security techniques is given beginning with the first working group within ICO/TC97 in 1980. Nowadays security is dealt with by an increasing number of standardiz... 详细信息
来源: 评论
Two Layer Symmetric Cryptography algorithm for Protecting Data from Attacks
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John Von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a... 详细信息
来源: 评论
A Survey on Current Key Issues and Status in Cryptography
A Survey on Current Key Issues and Status in Cryptography
收藏 引用
IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
作者: Kumar, M. Guru Vimal Ragupathy, U. S. Kongu Engn Coll Dept EIE Perundurai Erode India
Internet applications are increased and growing at very fast. Owing towards the technological development, secured way of data transmission over the internet is becoming a questioning task. Intruders hack the data and... 详细信息
来源: 评论
The Strategy of Cryptography for the Proposed Model of Security in Cloud Computing
The Strategy of Cryptography for the Proposed Model of Secur...
收藏 引用
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (IEEE ICPCSI)
作者: Hyseni, Dhurate Selimi, Besnik Luma, Artan Cico, Betim SEEU Fac Contemporary Sci & Technol Tetovo Macedonia Epoka Univ Dept Comp Engn Tirana Albania
In many research results today, the encryption of data at rest is considered to be one of the main issues related to security in cloud computing and especially cloud storage. Based on result from survey and the need f... 详细信息
来源: 评论
Optimization of an Electronic Signature Scheme in a Voting System in a Distributed Architecture
Optimization of an Electronic Signature Scheme in a Voting S...
收藏 引用
2018 3rd International Conference on Computer Science and Information Engineering(ICCSIE 2018)
作者: Segundo Moisés Toapanta Toapanta Génesis Alexandra Contreras Pacheco Danny Wilfrido Barona Valencia Luis Enrique Mafla Gallegos Computer Science Department Universidad Politécnica Salesiana Ecuador Faculty of Engineering Systems Escuela Politécnica Nacional
It was considered that the security of information is an important factor in an electoral process in a country;for the frequent problems that have been detected in the scanning of votes to expedite the *** objective i... 详细信息
来源: 评论
An Overview and Analysis of Hybrid Encryption:The Combination of Symmetric Encryption and asymmetric Encryption
An Overview and Analysis of Hybrid Encryption:The Combinatio...
收藏 引用
作者: Qixin Zhang Computer Science and Engineering NYU Tandon School of Engineering
In the current scenario,various forms of information are spread everywhere,especially through the Internet.A lot of valuable information is contained in the dissemination,so security issues have always attracted *** t... 详细信息
来源: 评论