咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是101-110 订阅
排序:
Image encryption scheme based on block-based confusion and multiple levels of diffusion
收藏 引用
IET COMPUTER VISION 2016年 第6期10卷 593-602页
作者: Murugan, Brindha Gounder, Ammasai Gounden Nanjappa Natl Inst Technol Dept Comp Sci & Engn Tiruchirappalli Tamil Nadu India Natl Inst Technol Dept Elect & Elect Engn Tiruchirappalli Tamil Nadu India
This study proposes a chaos-based image encryption scheme using Henon map and Lorenz equation with multiple levels of diffusion. The Henon map is used for confusion and the Lorenz equation for diffusion. Apart from th... 详细信息
来源: 评论
A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties
收藏 引用
COMPUTER SCIENCE REVIEW 2018年 第Aug.期29卷 14-20页
作者: Sokouti, Massoud Sokouti, Babak Mashhad Univ Med Sci Nucl Med Res Ctr Mashhad Iran Tabriz Univ Med Sci Biotechnol Res Ctr Tabriz Iran
During recent years, various encryption algorithms have been proposed for color image encryption based on DNA encoding. Image encryption is one of the most important areas of research which has taken attentions of res... 详细信息
来源: 评论
Data encryption algorithms for Internet-based Real-Time Systems
Data Encryption Algorithms for Internet-based Real-Time Syst...
收藏 引用
2004 International Symposium on Distributed Computing and Applications to Business, Engineering and Science
作者: Li Hongyan~(1,2),Shuang H.Yang~(1,3),and Tan LianSheng~1 1 Department of Computer Science,Central China Normal University,Wuhan,China. 2 Department of Computer and Electronic Science,Hubei University of Economics,Wuhan,China 3 Department of Computer Science,Loughborough University,Loughborough,Leicestershire LE113TU,UK
In recent years,the Intemet has proved to be a powerful tool for real-time ***,security risk of the Intemet communication still stops people to bring the real-time application into a *** work has so far been done in d... 详细信息
来源: 评论
Dynamical Analysis of Novel Memristor Chaotic System and DNA encryption Application
收藏 引用
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING 2020年 第1期44卷 449-460页
作者: Sun, Junwei Yang, Qinfei Wang, Yanfeng Zhengzhou Univ Light Ind Coll Elect & Informat Engn Zhengzhou 450002 Peoples R China
In this paper, a new circuit which can include a capacitor, an inductor and a novel nonlinear memristor is designed. Complex dynamics and special characters are investigated by changing three parameters for the design... 详细信息
来源: 评论
Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption
收藏 引用
EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS 2014年 第8期223卷 1711-1728页
作者: Metwaly, A. F. Rashad, M. Z. Omara, F. A. Megahed, A. A. Al Zahra Coll Women Dept Informat Technol Muscat Oman Mansoura Univ Fac Comp & Informat Sci Mansoura Egypt Cairo Univ Fac Comp & Informat Sci Cairo Egypt Cairo Univ Fac Engn Cairo Egypt
Multicasting refers to the transmission of a message or information from one sender to multiple receivers simultaneously. Although encryption algorithms can be used to secure transmitted messages among group members, ... 详细信息
来源: 评论
Use of elliptic curve cryptography for multimedia encryption
收藏 引用
IET INFORMATION SECURITY 2013年 第2期7卷 67-74页
作者: Tawalbeh, Lo'ai Mowafi, Moad Aljoby, Walid Jordan Univ Sci & Technol Dept Comp Engn Cryptog Hardware & Informat Secur CHiS Lab Irbid Jordan Jordan Univ Sci & Technol Dept Network Engn & Secur Irbid Jordan
The unique characteristics of the elliptic curve cryptography (ECC) such as the small key size, fast computations and bandwidth saving make its use attractive for multimedia encryption. In this study, the ECC is used ... 详细信息
来源: 评论
Image encryption using eight dimensional chaotic cat map
收藏 引用
EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS 2014年 第8期223卷 1611-1622页
作者: Ganesan, K. Murali, K. VIT Univ TIFAC CORE Vellore Tamil Nadu India Anna Univ Dept Phys Chennai Tamil Nadu India
In recent years, a large number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as lack of robustness and security. In this paper, we introduce a new... 详细信息
来源: 评论
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance
收藏 引用
COMPUTERS & SECURITY 2003年 第7期22卷 585-588页
作者: Sklavos, N Koufopavlou, O Univ Patras Dept Elect & Comp Engn GR-26500 Patras Greece
This work focuses an alternative direction of cryptography, based on Data Dependent Rotations (DDR). This methodology gives many promises for secure communication networks of the next years. DDR transformations have a... 详细信息
来源: 评论
The new lightweight encryption mechanism for large media signal processing system in global content delivery network
The new lightweight encryption mechanism for large media sig...
收藏 引用
International Conference on Information Technology and Computer Application Engineering (ITCAE)
作者: Heo, Juseung Park, Chulwoo Kim, Keecheon Ok, Kisang Konkuk Univ Dept Comp Sci & Engn Seoul South Korea KT Corp Seoul South Korea
GCDN (Global Content Delivery Networks) is supposed to provide contents quickly through the nearest cache server which can reduce the load of a cache server as the user's contents request. Recently, high-capacity ... 详细信息
来源: 评论
PWLCM Based Image encryption Through Compressive Sensing
PWLCM Based Image Encryption Through Compressive Sensing
收藏 引用
IEEE Recent Advances in Intelligent Computational Systems (RAICS)
作者: Abhishek George, Sudhish N. Deepthi, P. P. Natl Inst Technol Dept Elect & Commun Engn Calicut 673601 Kerala India
In this paper, compressive sensing is combined with a chaotic key based generation of measurement matrix to provide an effective encryption algorithm for multimedia security. Block-based compressive sensing provides a... 详细信息
来源: 评论