咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是91-100 订阅
排序:
The algorithm was implemented on PIC chip of MD5 encryption
The algorithm was implemented on PIC chip of MD5 encryption
收藏 引用
2014 2nd International Conference on Computer,Electrical,and Systems Sciences,and Engineering(CESSE 2014)
作者: Li Yang Li Yan Pingxiang University
MD5 encryption algorithm is a one-way encryption algorithm being used. This paper mainly introduces the design and implementation of some key technologies of MD5 encryption algorithm using PIC MCU, and simply introduc... 详细信息
来源: 评论
Research on Big Data encryption algorithms Based on Data Deduplication Technology
Research on Big Data Encryption Algorithms Based on Data Ded...
收藏 引用
International Conference on Electronic Engineering and Informatics (EEI)
作者: Zhengxiong Mao Yongjun Xue Huan Wang Wei Ou Yunnan Power Grid Co. Ltd. Kunming China
In recent years, with the continuous growth of science and technology in our country, we are exposed to more and more information. Computers are gradually coming into people's lives and constantly changing people&... 详细信息
来源: 评论
Optimized Identity-Based encryption from Bilinear Pairing for Lightweight Devices
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2017年 第2期14卷 211-220页
作者: Guo, Fuchun Mu, Yi Susilo, Willy Hsing, Homer Wong, Duncan S. Varadharajan, Vijay Univ Wollongong Sch Comp & Informat Technol Wollongong NSW 2500 Australia Facebook Inc Cambridge MA USA ASTRI Secur & Data Sci Hong Kong Hong Kong Peoples R China Macquarie Univ Dept Comp N Ryde NSW 2109 Australia
Lightweight devices such as smart cards and RFID tags have a very limited hardware resource, which could be too weak to cope with asymmetric-key cryptography. It would be desirable if the cryptographic algorithm could... 详细信息
来源: 评论
Face Image encryption Using Fuzzy K2DPCA and Chaotic MapReduce
收藏 引用
TEHNICKI VJESNIK-TECHNICAL GAZETTE 2024年 第4期31卷 1143-1153页
作者: Luo, Yunxiao Li, Ju Chongqing Open Univ Chongqing 401520 Peoples R China Chongqing Technol & Business Inst Chongqing 401520 Peoples R China
As technology continues to advance, safeguarding personal privacy and information security has become increasingly critical. Facial image encryption algorithms involve encrypting and decrypting facial images to preven... 详细信息
来源: 评论
A novel Implementation of encryption algorithms based on FPGA Gates
A novel Implementation of Encryption Algorithms based on FPG...
收藏 引用
2016 4th International Conference on Machinery,Materials and Computing Technology(ICMMCT 2016)
作者: Huabo Zhang Hongmin Gao Xuetian Wang Xiangzhi Yu Department of Information and Electronics Beijing Institute of Technology
A novel implementation of encryption algorithms based on FPGA gates is described in this paper. The encryption algorithm is focused on different FPGA devices with the same number of cascaded NOT gates but have differe... 详细信息
来源: 评论
Performance Analysis of various encryption algorithms for usage in Multistage encryption for Securing Data in Cloud
Performance Analysis of various Encryption Algorithms for us...
收藏 引用
IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology
作者: Krishna Keerthi Chennam Lakshmi Muddana Rajani Kanth Aluvalu Research Scholar GITAM UNIVERSITY Hyderabad Professor IT Dept. GITAM UNIVERSITY Hyderabad
Cloud computing is an emerging technology has grown a lot for virtualization and provides many services over the internet such as software as a service, platform as a service, infrastructure as a service and many more... 详细信息
来源: 评论
FPGA Implementation of encryption algorithms Based on Residual Polynomials
FPGA Implementation of Encryption Algorithms Based on Residu...
收藏 引用
IEEE International Conference on Electronics and Nanotechnology (ELNANO)
作者: Maksat Kalimoldayev Sakhybay Tynymbayev Miras Magzom Dana Tananova Sergey E. Lyshevski Information Security laboratory Institute of Information and Computational Technologies SC MES RK Almaty Republic of Kazahstan Rochester Institute of Technology Rochester NY USA
This paper describes an encryption algorithm based on a polynomial system of residual classes. We study the FPGA bitstream implementation on the Xilinx and 16-nm UltraScale™ ASIC architecture which enables floating-po... 详细信息
来源: 评论
Synchronization between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2019年 第3期22卷 S7423-S7434页
作者: Li, Guodong Pu, Yue Yang, Bing Zhao, Jing Xinjiang Univ Finance & Econ Dept Appl Math Urumqi 830012 Peoples R China Xinjiang Univ Finance & Econ Res Ctr Xinjiang Social & Econ Stat Urumqi 830012 Xinjiang Peoples R China
In order to discuss the synchronization characteristic of a class of the cellular neural network and Lorenz hyper chaotic systems. This paper puts forward on the control method between different chaotic and dimensions... 详细信息
来源: 评论
A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第19期83卷 57059-57088页
作者: Singh, Deep Kumar, Sandeep Cent Univ Punjab Dept Math & Stat Bathinda 151401 India Cent Univ Jammu Dept Math Jammu 181143 India
In the present time of increasing digital communication, the images are widely used over the multimedia networks for sharing of information. At the same time to ensure the security of images during transmission of dat... 详细信息
来源: 评论
Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators
收藏 引用
OPTICS AND LASERS IN ENGINEERING 2018年 第Mar.期102卷 59-69页
作者: Jridi, Maher Alfalou, Ayman ISEN Brest VISION L BISEN CS42807 Brest France
In this paper, enhancement of an existing optical simultaneous fusion, compression and encryption (SFCE) scheme in terms of real-time requirements, bandwidth occupation and encryption robustness is proposed. We have u... 详细信息
来源: 评论