咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 32 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 57 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 22 篇 信息与通信工程
    • 11 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 3 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 6 篇 理学
    • 5 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 84 篇 cryptographic al...
  • 12 篇 cryptography
  • 11 篇 security
  • 7 篇 encryption
  • 5 篇 fpga
  • 4 篇 throughput
  • 4 篇 aes
  • 4 篇 smart grid
  • 3 篇 power grid
  • 3 篇 wide-area monito...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 decryption
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 digital signatur...
  • 2 篇 application spec...
  • 2 篇 data security
  • 2 篇 access control
  • 2 篇 cipher

机构

  • 3 篇 univ chinese aca...
  • 2 篇 loyola univ mary...
  • 2 篇 science and tech...
  • 2 篇 kookmin univ dep...
  • 2 篇 brno university ...
  • 2 篇 chinese acad sci...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ chile dept ...
  • 1 篇 univ cooperat co...
  • 1 篇 dept. of compute...
  • 1 篇 elect & telecomm...
  • 1 篇 al maarif univ c...
  • 1 篇 delhi technical ...
  • 1 篇 hiroshima univ r...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 sci & technol co...
  • 1 篇 tsinghua univ ts...
  • 1 篇 dept.of computer...
  • 1 篇 electrical engin...

作者

  • 2 篇 li zerun
  • 2 篇 zhang lei
  • 2 篇 baloian nelson
  • 2 篇 chakraborty moum...
  • 2 篇 yun seunghwan
  • 2 篇 budko mikhail
  • 2 篇 wu liji
  • 2 篇 kuhn d. richard
  • 2 篇 yi okyeon
  • 2 篇 saha debasri
  • 2 篇 qiu meikang
  • 2 篇 zhang xiangmin
  • 2 篇 liu rui
  • 2 篇 chakrabarti amla...
  • 2 篇 kacker raghu
  • 2 篇 guirik alexei
  • 2 篇 lijun zhang
  • 2 篇 zhang xiaoyu
  • 2 篇 luther wolfram
  • 2 篇 jia fan

语言

  • 78 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"主题词=cryptographic algorithm"
84 条 记 录,以下是51-60 订阅
排序:
The Forensic Analysis of Encrypted Truecrypt Volumes  2
The Forensic Analysis of Encrypted Truecrypt Volumes
收藏 引用
2nd IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Zhang, Lijun Zhou, Yu Fan, Jia Sci & Technol Commun Secur Lab Chengdu 610041 Peoples R China
In this paper, we investigate the inner encryption principles of Truecrypt volumes including cryptographic algorithms, encryption mode, key derivation way and password verifying process. Besides, we explain the forens... 详细信息
来源: 评论
TLS and Energy Consumption On a Mobile Device: A Measurement Study
TLS and Energy Consumption On a Mobile Device: A Measurement...
收藏 引用
16th IEEE Symposium on Computers and Communications (lSCC)
作者: Miranda, Pedro Siekkinen, Matti Waris, Heikki Aalto Univ Sch Sci & Technol Espoo Finland
We report results from a measurement study on the role of the most popular end-to-end security protocol Transport Layer Security (TLS) in the energy consumption of a mobile device. We measured energy consumed by TLS t... 详细信息
来源: 评论
Randomness Testing on Strict Key Avalanche Data Category on Confusion Properties of 3D-AES Block Cipher Cryptography algorithm  8th
Randomness Testing on Strict Key Avalanche Data Category on ...
收藏 引用
8th Future of Information and Communication Conference (FICC)
作者: Yusof, Nor Azeala Mohd Ariffin, Suriyani Cyber Secur Malaysia Seri Kembangan 43300 Selangor Malaysia Univ Teknol MARA Fac Comp & Math Sci Shah Alam Selangor Malaysia
In data encryption of block cipher cryptographic algorithm, the security of the algorithm is measured based on Shannon's confusion and diffusion properties from randomness tests. The 3D-AES block cipher was develo... 详细信息
来源: 评论
A secure framework for enhancing user authentication in cloud environment using Biometrics
A secure framework for enhancing user authentication in clou...
收藏 引用
IEEE International Conference on Signal Processing and Communication (ICSPC)
作者: Kathrine, G. Jaspher Willsie Karunya Univ Madras Tamil Nadu India
Cloud is a ubiquitous computing technology dependent on geographically distributed computing entities like storage servers, dedicated systems and softwares. A cloud environment has dedicated systems, servers to provid... 详细信息
来源: 评论
Analysis of Power Distribution Network for some Cryptocores  3
Analysis of Power Distribution Network for some Cryptocores
收藏 引用
3rd International Conference on Advances in Computing, Communications and Informatics (ICACCI)
作者: Chakraborty, Moumita Guha, Krishnendu Chakrabarti, Amlan Saha, Debasri Univ Calcutta AK Choudhury Sch Informat Technol Kolkata India
With the progress in VLSI technology increase in circuit density is obvious. In present integrated circuits, electrical power is distributed to the large number of components of the chip over a network of on chip cond... 详细信息
来源: 评论
Analysis on Key-leakage Hardware Trojan of SM4 algorithm  12
Analysis on Key-leakage Hardware Trojan of SM4 Algorithm
收藏 引用
12th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)
作者: Chen, Yue Zhang, Zhenhui Wu, Liji Zhang, Xiangmin Yang, Yijun Heilongjiang Univ Key Lab Elect Engn Harbin 150080 Heilongjiang Peoples R China Tsinghua Univ Inst Microelect Beijing 100084 Peoples R China Tsinghua Univ Tsinghua Natl Lab Informat Sci & Technol Beijing 100084 Peoples R China
The cryptographic algorithm is an important part of the security system. Its purpose is to ensure that the attacker can not obtain the correct transmissive information if he has stolen the ciphertext but has not the s... 详细信息
来源: 评论
Design of an Electronic Voting System Using a Blockchain Network  6th
Design of an Electronic Voting System Using a Blockchain Net...
收藏 引用
6th Workshop on Engineering Applications (WEA)
作者: Ribon, Carlos A. Leon, Javier M. Corredor, Oscar F. Castellanos, Hermes E. Sanz, Fredy A. Ariza-Colpas, Paola Landero, Vanesa Collazos-Morales, Carlos Univ Cooperat Colombia Fac Ingn Bogota Colombia Univ Manuela Beltran Vicerrectoria Invest Bogota Colombia Univ Costa Dept Ciencias Comp & Elect Barranquilla Colombia Univ Politecn Apodaca Apodaca Nuevo Leon Mexico
Design of a scalable electronic voting system, which, based on a generic model designed for this application called voting cell, guarantees the integrity of the information through the use of a private network Blockch... 详细信息
来源: 评论
Exploiting Error Control Approaches for Hardware Trojans on Network-on-Chip Links
Exploiting Error Control Approaches for Hardware Trojans on ...
收藏 引用
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)
作者: Yu, Qiaoyan Frey, Jonathan Univ New Hampshire Dept Elect & Comp Engn Durham NH 03824 USA
We exploit transient and permanent error control methods to address Hardware Trojan (HT) issues in Network-on-Chip (NoC) links. The use of hardware-efficient error control methods on NoC links has the potential to red... 详细信息
来源: 评论
Google Drive Based Secured Anti-Theft Android Application
Google Drive Based Secured Anti-Theft Android Application
收藏 引用
IEEE International Conference on IoT and Its Applications (IEEE ICIOT)
作者: Raymond, V. Joseph Sushmitha, E. V. G. SRM Univ Dept Informat Technol Kattankalathur 603203 India
The prevalence of smartphone has led to creation of various innovative android applications which gives developers an opportunity to incorporate advanced technologies. One such application is location tracking and mon... 详细信息
来源: 评论
Differential Power Analysis of CAST-128
Differential Power Analysis of CAST-128
收藏 引用
IEEE Annual Symposium on VLSI (ISVLSI)
作者: Boey, K. H. Lu, Y. O'Neill, M. Woods, R. Queens Univ Belfast Inst Elect Commun & Informat Technol ECIT Belfast Antrim North Ireland
Power analysis is used to reveal the secret key of security devices by monitoring the power consumption of certain cryptographic algorithm operations through a statistical analysis approach known as Differential Power... 详细信息
来源: 评论