咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是1-10 订阅
排序:
Selection of optimal encryption algorithm based on hesitant bipolar complex fuzzy frank aggregation operators
收藏 引用
JOURNAL OF APPLIED MATHEMATICS AND COMPUTING 2025年 第2期71卷 1361-1395页
作者: Mahmood, Tahir Waqas, Hafiz Muhammad Rehman, Ubaid ur Int Islamic Univ Islamabad Dept Math & Stat Islamabad Pakistan SK Res Oxford Business Coll Oxford OX1 2EP England Univ Management & Technol Dept Math C II Johar Town Lahore 54700 Punjab Pakistan
A mathematical procedure known as an encryption algorithm is used to convert plaintext into ciphertext and protect sensitive data during transmission or storage. Its primary goals include preventing unauthorized acces... 详细信息
来源: 评论
Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2025年 274卷
作者: Singh, Deep Kumar, Sandeep Cent Univ Punjab Dept Math & Stat Bathinda 151401 India
In the era of today's open network communication, security issues of private data over these networks are at their peak, and it is challenging to secure data transmission. Therefore, to overcome these security cri... 详细信息
来源: 评论
encryption algorithm Based on New Composite Chaos Dynamics System
Encryption Algorithm Based on New Composite Chaos Dynamics S...
收藏 引用
3rd International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2007)
作者: Tong Xiao-Jun Cui Ming-Gen Harbin Inst Technol Sch Comp Sci & Engn Weihai 264209 Peoples R China Harbin Inst Technol Coll Sci Weihai 264209 Peoples R China
Chaos defined in general in quantitative characteristics is not a strict definition In this paper two new chaos functions are proposed and theoretical proof about chaos is finished based on a strict Devaney definition... 详细信息
来源: 评论
3D point cloud encryption algorithm based on hybrid key and spatial maintenance
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2024年 87卷
作者: Li, Xusheng Li, Jinqing Di, Xiaoqiang Guan, Hongmei Zhang, Mingao Gao, Mengli Ibrahim, Makram Changchun Univ Sci & Technol Sch Comp Sci & Technol Satellite Rd 7089 Changchun 130033 Jilin Peoples R China Changchun Univ Sci & Technol Jilin Prov Key Lab Network & Informat Secur Satellite Rd 7089 Changchun 130033 Jilin Peoples R China Changchun Univ Sci & Technol Chongqing Res Inst Chongqing 401135 Peoples R China Changchun Univ Sci & Technol Informat Ctr Satellite Rd 7089 Changchun 130022 Jilin Peoples R China Natl Res Inst Astron & Geophys Helwan 11421 Cairo Egypt
With the development of LiDAR technology, 3D point cloud data have a rich information-carrying capacity and environmental perception capabilities, have been widely applied infields such as the Internet of Vehicles(IoV... 详细信息
来源: 评论
The EEG signals encryption algorithm with K-sine-transform-based coupling chaotic system
收藏 引用
INFORMATION SCIENCES 2023年 第1期622卷 962-984页
作者: Wen, Dong Jiao, Wenlong Li, Xiaoling Wan, Xianglong Zhou, Yanhong Dong, Xianling Lan, Xifa Han, Wei Univ Sci & Technol Beijing Sch Intelligence Sci & Technol 30Xueyuan Rd Beijing 100083 Peoples R China Univ Sci & Technol Beijing Inst Artificial Intelligence 30Xueyuan Rd Beijing 100083 Peoples R China Yanshan Univ Sch Informat Sci & Engn Key Lab Comp Virtual Technol & Syst Integrat Hebei 438Hebei Ave Qinhuangdao 066004 Hebei Peoples R China Hebei Normal Univ Sci & Technol Sch Math & Informat Sci & Technol 360Hebei St Qinhuangdao 066004 Hebei Peoples R China Chengde Med Univ Dept Biomed Engn Anyuan Rd Chengde 067000 Hebei Peoples R China First Hosp Qinhuangdao Dept Neurol 258Wenhua Rd Qinhuangdao 066002 Hebei Peoples R China
Telemedicine provides remote online services for digital diagnosis and treatment via the Internet. However, there is a risk of data leakage during transmission. Therefore, data protection is an important challenge for... 详细信息
来源: 评论
An efficient pixel-level chaotic image encryption algorithm (vol 94, pg 745, 2018)
收藏 引用
NONLINEAR DYNAMICS 2018年 第4期94卷 3155-3155页
作者: Ye, Guodong Pan, Chen Huang, Xiaoling Mei, Qixiang Guangdong Ocean Univ Fac Math & Comp Sci Zhanjiang 524088 Peoples R China Zhejiang Univ Coll Informat Sci & Elect Engn Hangzhou 310027 Zhejiang Peoples R China
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position s... 详细信息
来源: 评论
Multiple Digital Image encryption algorithm Based on Chaos algorithm
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2022年 第4期27卷 1349-1358页
作者: Zhang, Ying He, Yi Zhang, Jing Liu, Xiaobo Guizhou Power Grid Corp Elect Power Res Inst Guiyang 550002 Peoples R China Guizhou Univ Elect Engn Coll Guiyang 550025 Peoples R China Wuhan Nanrui Co Ltd State Grid Elect Power Res Inst Wuhan 430074 Peoples R China
In this study, a multiple digital image encryption algorithm based on chaos algorithm is presented. The cyclic matrix is constructed by logical mapping, and sparse transformation of plaintext image is realized by disc... 详细信息
来源: 评论
An efficient self-adaptive model for chaotic image encryption algorithm
收藏 引用
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION 2014年 第12期19卷 4094-4104页
作者: Huang, Xiaoling Ye, Guodong Guangdong Ocean Univ Coll Sci Zhanjiang 524088 Guangdong Peoples R China City Univ Hong Kong Dept Elect Engn Kowloon Tong Hong Kong Peoples R China
In this paper, an efficient self-adaptive model for chaotic image encryption algorithm is proposed. With the help of the classical structure of permutation-diffusion and double simple two-dimensional chaotic systems, ... 详细信息
来源: 评论
Security enhancement of a phase-truncation based image encryption algorithm
收藏 引用
APPLIED OPTICS 2011年 第36期50卷 6645-6651页
作者: Wang, Xiaogang Zhao, Daomu Zhejiang A&F Univ Sch Sci Linan 311300 Peoples R China Zhejiang Univ Dept Phys Hangzhou 310027 Peoples R China
The asymmetric cryptosystem, which is based on phase-truncated Fourier transforms (PTFTs), can break the linearity of conventional systems. However, it has been proven to be vulnerable to a specific attack based on it... 详细信息
来源: 评论
A White-Box encryption algorithm for Computing with Mobile Agents
收藏 引用
JOURNAL OF INTERNET TECHNOLOGY 2011年 第6期12卷 981-993页
作者: Shi, Yang Lin, Jie Zhang, Cheng Fudan Univ Sch Management Shanghai Peoples R China Tongji Univ Sch Software Engn Shanghai Peoples R China Tongji Univ Sch Econ & Management Shanghai Peoples R China
A white-box encryption algorithm is proposed for computing using a mobile agent protected with time-limited black box security. Block matrix multiplication on finite fields and secure addition with randomly generated ... 详细信息
来源: 评论