咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 32 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 57 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 22 篇 信息与通信工程
    • 11 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 3 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 6 篇 理学
    • 5 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 84 篇 cryptographic al...
  • 12 篇 cryptography
  • 11 篇 security
  • 7 篇 encryption
  • 5 篇 fpga
  • 4 篇 throughput
  • 4 篇 aes
  • 4 篇 smart grid
  • 3 篇 power grid
  • 3 篇 wide-area monito...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 decryption
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 digital signatur...
  • 2 篇 application spec...
  • 2 篇 data security
  • 2 篇 access control
  • 2 篇 cipher

机构

  • 3 篇 univ chinese aca...
  • 2 篇 loyola univ mary...
  • 2 篇 science and tech...
  • 2 篇 kookmin univ dep...
  • 2 篇 brno university ...
  • 2 篇 chinese acad sci...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ chile dept ...
  • 1 篇 univ cooperat co...
  • 1 篇 dept. of compute...
  • 1 篇 elect & telecomm...
  • 1 篇 al maarif univ c...
  • 1 篇 delhi technical ...
  • 1 篇 hiroshima univ r...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 sci & technol co...
  • 1 篇 tsinghua univ ts...
  • 1 篇 dept.of computer...
  • 1 篇 electrical engin...

作者

  • 2 篇 li zerun
  • 2 篇 zhang lei
  • 2 篇 baloian nelson
  • 2 篇 chakraborty moum...
  • 2 篇 yun seunghwan
  • 2 篇 budko mikhail
  • 2 篇 wu liji
  • 2 篇 kuhn d. richard
  • 2 篇 yi okyeon
  • 2 篇 saha debasri
  • 2 篇 qiu meikang
  • 2 篇 zhang xiangmin
  • 2 篇 liu rui
  • 2 篇 chakrabarti amla...
  • 2 篇 kacker raghu
  • 2 篇 guirik alexei
  • 2 篇 lijun zhang
  • 2 篇 zhang xiaoyu
  • 2 篇 luther wolfram
  • 2 篇 jia fan

语言

  • 78 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"主题词=cryptographic algorithm"
84 条 记 录,以下是41-50 订阅
排序:
Historical notes on Russian cryptography
收藏 引用
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2024年 第2期20卷 277-293页
作者: Epishkina, Anna Zapechnikov, Sergey Belozubova, Anna Natl Res Nucl Univ MEPhI Moscow Engn Phys Inst Moscow Russia RUDN Univ Peoples Friendship Univ Russia Moscow Russia
The article is devoted to the main milestones in the development of encryption techniques and mathematical methods of cryptography in Russia from the period of ancient Russia up to the nowadays. We break down the hist... 详细信息
来源: 评论
An IPSec Accelerator Design for a 10Gbps In-Line Security Network Processor
收藏 引用
JOURNAL OF COMPUTERS 2013年 第2期8卷 319-325页
作者: Niu, Yun Wu, Liji Zhang, Xiangmin Tsinghua Univ Inst Microelect Beijing Peoples R China
The IP security protocol (IPSec) is an important and widely used security protocol in the IP layer. But the implementation of the IPSec is a computing intensive work which greatly limits the performance of the high sp... 详细信息
来源: 评论
The multics encipher_algorithm
收藏 引用
CRYPTOLOGIA 2007年 第4期31卷 292-304页
作者: Sibert, W. Olin Baldwin, Robert W. Oxford Syst Inc Lexington MA 02420 USA MIT Cambridge MA 02139 USA
A fast software block encryption algorithm with a 72-bit key was written by (then) Major Roger R. Schell (United States Air Force) in April 1973 and released as part of the source code for the Multics operating system... 详细信息
来源: 评论
Design and Implementation of Real Time Secure SMS Transmission  4
Design and Implementation of Real Time Secure SMS Transmissi...
收藏 引用
INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION
作者: Rautkar, Shital D. Prasad, Prakash S. Priyadarshini Coll Engn Dept Comp Technol Nagpur Maharashtra India Priyadarshini Coll Engn Dept Comp Tech Nagpur Maharashtra India
The SMS can be used in various types of diurnal application including medical aspiration, banking aspiration and any other mobile aspiration. Serving an SMS is one of the economical, fastest and simple methods. When w... 详细信息
来源: 评论
Role of Modified Gabor Filter algorithm in Multimodal Biometric Images  6
Role of Modified Gabor Filter Algorithm in Multimodal Biomet...
收藏 引用
6th International Conference on Computing for Sustainable Global Development (INDIACom)
作者: More, Sharmila S. Narain, Bhawna Jadhav, B. T. MATS Univ MATS Sch IT Raipur CG India RIRD Satara Maharashtra India
Nowadays, in every technology sector, security issues are one of major concerns. For resolving these issue cryptographic features extraction algorithm is frequently used. The main feature in computer security is the c... 详细信息
来源: 评论
The Research on Outlook Password Recovery
The Research on Outlook Password Recovery
收藏 引用
International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC)
作者: Zhang, Lijun Yu, Fei Sci & Technol Commun Secur Lab Chengdu Sichuan Provinc Peoples R China
Outlook is the email client in the Microsoft office package, which has become one of the most widely applied email processing systems in the personal and commercial office environment. This paper studies the password ... 详细信息
来源: 评论
JasUA: A JavaScript Stack enabling Web Browsers to support OPC Unified Architecture's Binary Mapping natively
JasUA: A JavaScript Stack enabling Web Browsers to support O...
收藏 引用
15th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)
作者: Hennig, Stefan Braune, Annerose Damm, Matthias Tech Univ Dresden Inst Automat D-01062 Dresden Germany
Web browsers are promising candidates for the OPC's SOAP-HTTP WS-SC UA XML StackProfile to execute visualization solutions. First tests could demonstrate the applicability of native web browsers without any plugin... 详细信息
来源: 评论
Area Optimized and High Throughput AES algorithm based on Permutation Data Scramble Approach
Area Optimized and High Throughput AES Algorithm based on Pe...
收藏 引用
International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
作者: Dilna, V Babu, C. Amrita Vishwa Vidyapeetham Univ Dept Elect & Commun Engn Amrita Sch Engn Bengaluru Campus Coimbatore Tamil Nadu India
In today's scenario most of the things in human life is E-banking where everything is faster and smoother. With the various exchange of electronics signals between any two servers or systems, the money transaction... 详细信息
来源: 评论
The Forensic Analysis of Encrypted Truecrypt Volumes  2
The Forensic Analysis of Encrypted Truecrypt Volumes
收藏 引用
2nd IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Zhang, Lijun Zhou, Yu Fan, Jia Sci & Technol Commun Secur Lab Chengdu 610041 Peoples R China
In this paper, we investigate the inner encryption principles of Truecrypt volumes including cryptographic algorithms, encryption mode, key derivation way and password verifying process. Besides, we explain the forens... 详细信息
来源: 评论
Side-channel issues for designing secure hardware implementations
Side-channel issues for designing secure hardware implementa...
收藏 引用
11th IEEE International On-Line Testing Symposium
作者: Batina, L Mentens, N Verbauwhede, I Katholieke Univ Leuven ESAT SCD COSIC B-3001 Louvain Belgium
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through side-channels. Sensitive information, such as secret keys, can be obtained by observing the power consumptio... 详细信息
来源: 评论