咨询与建议

限定检索结果

文献类型

  • 3 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 生物学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 5 篇 data encryption ...
  • 2 篇 cryptography
  • 1 篇 telecommunicatio...
  • 1 篇 symmetric encryp...
  • 1 篇 secure network s...
  • 1 篇 component
  • 1 篇 power consumptio...
  • 1 篇 software proflli...
  • 1 篇 advanced encrypt...
  • 1 篇 networking techn...
  • 1 篇 rsa algorithm
  • 1 篇 advanced encrypt...
  • 1 篇 infrared communi...
  • 1 篇 resource-constra...
  • 1 篇 power consumptio...
  • 1 篇 wireless securit...
  • 1 篇 iot sensors
  • 1 篇 information tech...
  • 1 篇 power evaluation...
  • 1 篇 code analysis

机构

  • 1 篇 lingayas univ fa...
  • 1 篇 univ teknol mala...
  • 1 篇 univ teknol mala...
  • 1 篇 hankou universit...
  • 1 篇 zhejiang univ sc...
  • 1 篇 wuhan university...
  • 1 篇 hankou universit...
  • 1 篇 hankou universit...
  • 1 篇 mokwon univ dept...
  • 1 篇 korea atom energ...
  • 1 篇 hankou universit...
  • 1 篇 qingdao technol ...
  • 1 篇 chungnam natl un...

作者

  • 1 篇 kim ki-il
  • 1 篇 park tae-jin
  • 1 篇 zhou lijian
  • 1 篇 zhu shuai
  • 1 篇 kumar neeraj
  • 1 篇 you yi
  • 1 篇 yi xueqin
  • 1 篇 khodadadi touraj
  • 1 篇 alizadeh mojtaba
  • 1 篇 zamani mazdak
  • 1 篇 lu zhe-ming
  • 1 篇 moon sangook
  • 1 篇 jain rajat sheel
  • 1 篇 shayan jafar
  • 1 篇 nie tingyuan
  • 1 篇 chen chuanting
  • 1 篇 zhou bo
  • 1 篇 kumar brijesh

语言

  • 5 篇 英文
检索条件"主题词=data encryption algorithm"
5 条 记 录,以下是1-10 订阅
排序:
Optimization of data encryption algorithms in Information Construction
Optimization of Data Encryption Algorithms in Information Co...
收藏 引用
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity, ICDSCNC 2024
作者: Zhu, Shuai You, Yi Zhou, Bo Chen, Chuanting Yi, Xueqin Hankou University Network Information Center Wuhan China Hankou University School of Computer Science and Technology Wuhan China Wuhan University of Engineering Science Library and Information Center Wuhan China Hankou University School of Music Wuhan China Hankou University Board Office Wuhan China
data encryption algorithms play a crucial role in information construction, effectively protecting data security. The problems in traditional research include a lack of targeting, a balance between efficiency and safe... 详细信息
来源: 评论
Securing Infrared Communication in Nuclear Power Plants: Advanced encryption for Infrared Sensor Networks
收藏 引用
SENSORS 2024年 第7期24卷 2054页
作者: Park, Tae-Jin Kim, Ki-il Moon, Sangook Korea Atom Energy Res Inst KAERI Nucl Syst Integr Sensing & Diag Div 989-111 Daedeok Daero Daejeon 34057 South Korea Chungnam Natl Univ Dept Comp Sci & Engn Daejeon 34134 South Korea Mokwon Univ Dept Elect & Elect Engn 88 Doanbuk Ro Daejeon 35349 South Korea
This study enhances infrared communication security in nuclear power plants' secondary systems, addressing the risk of mechanical and cyber failures. A novel random address generator, employing an innovative S-box... 详细信息
来源: 评论
Power evaluation methods for data encryption algorithms
收藏 引用
IET SOFTWARE 2014年 第1期8卷 12-18页
作者: Nie, Tingyuan Zhou, Lijian Lu, Zhe-Ming Qingdao Technol Univ Commun & Elect Engn Inst Qingdao Peoples R China Zhejiang Univ Sch Aeronaut & Astronaut Hangzhou 310027 Zhejiang Peoples R China
With the increasingly extensive application of networking technology, security of network becomes significant than ever before. encryption algorithm plays a key role in construction of a secure network system. However... 详细信息
来源: 评论
Code Analysis of Lightweight encryption algorithms Using in RFID Systems to Improve Cipher Performance
Code Analysis of Lightweight Encryption Algorithms Using in ...
收藏 引用
IEEE Conference on Open Systems (ICOS) / IEEE Symposium on E-Learning, E-Management and E-Services (IS3e)
作者: Alizadeh, Mojtaba Zamani, Mazdak Shayan, Jafar Khodadadi, Touraj Univ Teknol Malaysia UTM Fac Comp & Informat Syst Skudai 81310 Malaysia Univ Teknol Malaysia Adv Informat Sch Kuala Lumpur 54100 Malaysia
This research has investigated the performance analysis of lightweight encryption algorithms, which are using in RFID applications. In the first part, the codes of the investigated ciphers are analyzed, and then, four... 详细信息
来源: 评论
Design and Simulation of Security Sub-layer of WMAN IEEE 802.16 Standard (Wi-Max Compliant)  1
收藏 引用
International Conference on Advances in Information and Communication Technologies
作者: Jain, Rajat Sheel Kumar, Neeraj Kumar, Brijesh Lingayas Univ Faridabad India
The data could be provided from the MAC Layer to the Security Sub Layer that is going to be designed & simulated. In this paper the security sub-layer will provide subscribers with total privacy across the fixed b... 详细信息
来源: 评论