咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是111-120 订阅
排序:
PWLCM Based Image encryption Through Compressive Sensing
PWLCM Based Image Encryption Through Compressive Sensing
收藏 引用
IEEE Recent Advances in Intelligent Computational Systems (RAICS)
作者: Abhishek George, Sudhish N. Deepthi, P. P. Natl Inst Technol Dept Elect & Commun Engn Calicut 673601 Kerala India
In this paper, compressive sensing is combined with a chaotic key based generation of measurement matrix to provide an effective encryption algorithm for multimedia security. Block-based compressive sensing provides a... 详细信息
来源: 评论
Enhancements of encryption Method Used in SDEx  24th
Enhancements of Encryption Method Used in SDEx
收藏 引用
24th International Conference on Computer Networks (CN)
作者: Hlobaz, Artur Podlaski, Krzysztof Milczarski, Piotr Univ Lodz Fac Phys & Appl Informat Pomorska 149-153 PL-90236 Lodz Poland
In the paper, we present enhancements of the encryption method for secure data transmission used in Secure Data Exchange method (SDEx) [1-3]. Potential weaknesses and possible attacks have been previously described in... 详细信息
来源: 评论
Multicore encryption and Authentication on a Reconfigurable Hardware  2
Multicore Encryption and Authentication on a Reconfigurable ...
收藏 引用
IEEE 2nd International Conference on Recent Trends in Information Systems (ReTIS)
作者: Ghosh, Saheli Das, Subha Jyoti Paul, Rourab Chakrabarti, Amlan Comp Sci & Engn RCC Inst Technol 2012 2014 Kolkata W Bengal India Univ Calcutta AK Choudhury Sch Informat Technol Kolkata W Bengal India
Security has always been the toughest challenge in data communication, at the same time it is the biggest necessity in transmitting confidential data. Sensitive data are often at stake when they are deployed in a netw... 详细信息
来源: 评论
Image information hiding encryption using chaotic sequence
Image information hiding encryption using chaotic sequence
收藏 引用
11th International Conference on Knowledge-Based Intelligent Informational and Engineering Systems/17th Italian Workshop on Neural Networks
作者: Liu, Zhen Xi, Lifeng Zhejiang Wanli Univ Sch Comp Sci & Informat Technol Ningbo 315100 Zhejiang Peoples R China
In this paper, we propose a new image watermark algorithm of information hiding scheme based on chaotic encryption. Chaotic sequence is regarded as a noise-like spread sequence, and the secret signal to be transmitted... 详细信息
来源: 评论
The design of encryption system based on RC5 arithmetic
The design of encryption system based on RC5 arithmetic
收藏 引用
International Conference on Advanced Design and Manufacturing Engineering (ADME 2011)
作者: Liang, SongFeng Dong, ZhuRong Qiu, Hao Shenzhen Polytech Sch Automot & Transportat Engn Shenzhen Guangdong Peoples R China
This paper includes some conceptions of symmetrical cryptology such as " Liner Feed Back Shift Register"(LFSR) and RC5 arithmetic. The paper also introduces the application of symmetrical cryptology in encry... 详细信息
来源: 评论
A New Image Stream encryption Technique  58
A New Image Stream Encryption Technique
收藏 引用
IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Hassan, Firas Limbird, Michael Ullagaddi, Vishwanath Devabhaktuni, Vijay Ohio No Univ Dept Elec & Comp Engn & Comp Sc Ada OH 45810 USA Univ Toledo Dept Elec & Comp Engn & Comp Sc Toledo OH 43606 USA
This paper introduces a self-synchronous stream cipher with a considerable key space. In the proposed technique, the parity bit plane of a public image is used to encrypt the message. Simulation results showed that th... 详细信息
来源: 评论
Secure H.264 Video Coding Using AES/CFB/PKCS5 Padding encryption on Various Video Frames (I, P, B)  10
Secure H.264 Video Coding Using AES/CFB/PKCS5 Padding Encryp...
收藏 引用
10th International Conference on Telecommunication Systems Services and Applications (TSSA)
作者: Adiguna, Tahta Hendrawan Bandung Inst Technol Sch Elect Engn & Informat Bandung Indonesia
Video applications are essential nowadays. Even though almost everyone has access to it right now, the means and ability to access it is not uniform. Some of the important aspects to consider are the bandwidth availab... 详细信息
来源: 评论
A Public Key encryption Scheme Based on Compressed Sensing  9
A Public Key Encryption Scheme Based on Compressed Sensing
收藏 引用
9th International Conference on Advanced Infocomm Technology (ICAIT)
作者: Zhen, Liu Engn Univ Armed Police Force Elect Dept Xian Shaanxi Peoples R China
In order to improve the security of Compressed Sensing, this paper put forward a new idea-Compressed Sensing Public Key encryption (CSPKE), realized a concrete CSPKE algorithm by combing Lattice-based Cryptography wit... 详细信息
来源: 评论
AES-Driven Image encryption: Overcoming Security and Transmission Challenges  3
AES-Driven Image Encryption: Overcoming Security and Transmi...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Bodat, Harshil Patel, Harshil Arora, Monika Ambekar, Dhruti Bodat, Sonu Sonia Pandit Deendayal Energy University Gandhinagar India Gujrat India Amity Business School Amity University Haryana India Yogananda School of AI computers and Data Science Shoolini University Solan India
Continuous demand for digitization of data necessitates world to take robust measures for securing messages sent over the insecure channels. Thus, the presented research gives an innovative image encryption scheme tha... 详细信息
来源: 评论
A Novel Public Key encryption Model Based on Transformed Biometrics
A Novel Public Key Encryption Model Based on Transformed Bio...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Yan, Bin You, Lin Sch Commun Engn Hangzhou 310018 Zhejiang Peoples R China
In the fuzzy identity-based encryption scheme, a trusted KGC (key generation center) is needed to generate the corresponding private key corresponding to the user's biometric public key. In order to deal with the ... 详细信息
来源: 评论