咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 32 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 57 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 22 篇 信息与通信工程
    • 11 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 3 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 6 篇 理学
    • 5 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 84 篇 cryptographic al...
  • 12 篇 cryptography
  • 11 篇 security
  • 7 篇 encryption
  • 5 篇 fpga
  • 4 篇 throughput
  • 4 篇 aes
  • 4 篇 smart grid
  • 3 篇 power grid
  • 3 篇 wide-area monito...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 decryption
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 digital signatur...
  • 2 篇 application spec...
  • 2 篇 data security
  • 2 篇 access control
  • 2 篇 cipher

机构

  • 3 篇 univ chinese aca...
  • 2 篇 loyola univ mary...
  • 2 篇 science and tech...
  • 2 篇 kookmin univ dep...
  • 2 篇 brno university ...
  • 2 篇 chinese acad sci...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ chile dept ...
  • 1 篇 univ cooperat co...
  • 1 篇 dept. of compute...
  • 1 篇 elect & telecomm...
  • 1 篇 al maarif univ c...
  • 1 篇 delhi technical ...
  • 1 篇 hiroshima univ r...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 sci & technol co...
  • 1 篇 tsinghua univ ts...
  • 1 篇 dept.of computer...
  • 1 篇 electrical engin...

作者

  • 2 篇 li zerun
  • 2 篇 zhang lei
  • 2 篇 baloian nelson
  • 2 篇 chakraborty moum...
  • 2 篇 yun seunghwan
  • 2 篇 budko mikhail
  • 2 篇 wu liji
  • 2 篇 kuhn d. richard
  • 2 篇 yi okyeon
  • 2 篇 saha debasri
  • 2 篇 qiu meikang
  • 2 篇 zhang xiangmin
  • 2 篇 liu rui
  • 2 篇 chakrabarti amla...
  • 2 篇 kacker raghu
  • 2 篇 guirik alexei
  • 2 篇 lijun zhang
  • 2 篇 zhang xiaoyu
  • 2 篇 luther wolfram
  • 2 篇 jia fan

语言

  • 78 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"主题词=cryptographic algorithm"
84 条 记 录,以下是71-80 订阅
排序:
Establishment and Application of cryptographic Library Model
Establishment and Application of Cryptographic Library Model
收藏 引用
2015 Workshop 5
作者: Tie-Ming Liu Lie-Hui Jiang Jing Jing Yuan-Yuan Zhang The State Key Laboratory of Mathematical Engineering and Advanced Computing
When doing reverse analysis of program's binary codes, it is often to encounter the function of cryptographic *** order to reduce workload, a cryptographic library model has been de-signed by *** use formalized ap... 详细信息
来源: 评论
COOPERATIVE RECONFIGURATION OF USER INTERFACE MODELS FOR LEARNING cryptographic PROTOCOLS
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING 2012年 第6期11卷 1127-1154页
作者: Weyers, Benjamin Luther, Wolfram Baloian, Nelson U Duisburg Essen Dept Comp & Cognit Sci D-47057 Duisburg Germany Univ Chile Dept Comp Sci Santiago Chile
Cooperative work in learning environments has been shown to be a successful extension to traditional learning systems due to the great impact of cooperation on students' motivation and learning success. A recent e... 详细信息
来源: 评论
A Method of cryptographically Strong Pseudorandom Sequences Generation Based on the Blender  15
A Method of Cryptographically Strong Pseudorandom Sequences ...
收藏 引用
15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2023
作者: Grozov, Vladimir Guirik, Alexei Budko, Mikhail ITMO University Department of Secure Information Technologies St. Petersburg Russia
The paper deals with a method for generating cryptographic pseudorandom sequences (PRSs) applicable in data security tasks in cyber-physical systems. The following methods were used in the study: PRS generation based ... 详细信息
来源: 评论
Generování prvočísel pomocí hardware
Generování prvočísel pomocí hardware
收藏 引用
作者: Kabelková, Barbora Brno University of Technology
Bakalářská práce se zabývá problematikou prvočísel a jejich generováním. Stručně definuje prvočísla a poukazuje na význam bezpečných prvočísel v kryptografi... 详细信息
来源: 评论
A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2024年 第PartA期118卷
作者: Adeniyi, Abidemi Emmanuel Jimoh, Rasheed Gbenga Awotunde, Joseph Bamidele Bowen Univ Dept Comp Sci Iwo Nigeria Univ Ilorin Dept Comp Sci Ilorin Nigeria
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity protocols on IoT devices, platform packages, and Internet tools. A significant problem is developing a simple security mechanis... 详细信息
来源: 评论
Měření kvality elektrické energie
Měření kvality elektrické energie
收藏 引用
作者: Šenk, Marek Brno University of Technology
Bakalářská práce na úvod objasňuje pojem kvalita elektrické energie a popisuje jednotlivé charakteristiky napětí, které kvalitu elektrické energie určují. Dále ... 详细信息
来源: 评论
Combinational Counters: A Low Overhead Approach to Address DPA Attacks
收藏 引用
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 2020年 第6期29卷
作者: Zarrinchian, Ghobad Zamani, Morteza Saheb Amirkabir Univ Technol Dept Comp Engn & Informat Technol Tehran Iran
Differential Power Analysis (DPA) attacks are known as viable and practical techniques to break the security of cryptographic algorithms. In this type of attack, an adversary extracts the encryption key based on the c... 详细信息
来源: 评论
Multi-core architecture with asynchronous clocks to prevent power analysis attacks
收藏 引用
IEICE ELECTRONICS EXPRESS 2017年 第4期14卷 20161220-20161220页
作者: Du, Yuan Ye, Yong Jing, Weiliang Li, Zhenhua Li, Xiaoyun Song, Zhitang Chen, Bomy Chinese Acad Sci Shanghai Inst Micro Syst & Informat Technol State Key Lab Funct Mat Informat Shanghai 200050 Peoples R China Univ Chinese Acad Sci Beijing 100080 Peoples R China Shanghai Xinchu Integrated Circuit Inc Shanghai 200122 Shanghai Peoples R China
This paper proposes a multi-core architecture with asynchronous clocks to prevent power analysis attacks for the first time. The multi cores normally execute different tasks with default clocks, but will execute the c... 详细信息
来源: 评论
An Efficient ARIA-RSA-SHA256 Hybridized Encryption algorithm for Metering Data in Smart Grid Network Systems
收藏 引用
INTERNATIONAL JOURNAL OF RENEWABLE ENERGY RESEARCH 2023年 第4期13卷 1467-1480页
作者: Philips, Anita Jayakumar, J. Karunya Univ Dept Elect & Elect Coimbatore 641114 India
Digitizing the traditional electrical power grid and transitioning the grid operations to Smart Grid functionalities could yield very efficient results. Despite all the advantages, smart grid networks pose a serious t... 详细信息
来源: 评论
The security analysis of PhpBB forum
The security analysis of PhpBB forum
收藏 引用
International Conference on Cyberspace Technology (CCT 2014)
作者: Lijun Zhang Jia Fan Science and Technology on Communication Security Laboratory ChengDu China
PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including p... 详细信息
来源: 评论