咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是121-130 订阅
排序:
Design of A Creative encryption Approach Based On Pataphysics  3
Design of A Creative Encryption Approach Based On Pataphysic...
收藏 引用
3rd International Conference on Trustworthy Systems and their Applications (TSA)
作者: Wang, Xuan Zhang, Lu Yang, Hongji Bath Spa Univ Ctr Creat Comp Bath Avon England
encryption algorithms are widely used to enhance the data confidentiality and integrity in software systems. Most of the conventional encryption algorithms are designed based on mathematical methods. Sometimes there a... 详细信息
来源: 评论
Implementation of BLAKE 256 Hash function for Password encryption and Parallel CRC
Implementation of BLAKE 256 Hash function for Password encry...
收藏 引用
Proceedings of Online International Conference on Green Engineering and Technologies (IC-GET)
作者: Fernandes, Floyd Gupta, Ritu Sivanantham, S. Sivasankaran, K. VIT Univ Sch Elect Engn Vellore Tamil Nadu India
One of the major sources of information in recent times is the internet, which facilitates the exchange of information between thousands of people at any instant. The transmission of sensitive data such as passwords m... 详细信息
来源: 评论
Attribute-Based Online/Offline encryption in Smart Grid  24
Attribute-Based Online/Offline Encryption in Smart Grid
收藏 引用
International Conference on Computer Communications and Networks ICCCN
作者: Wang, Zhiwei Chen, Feng Xia, Aidong Nanjing Univ Posts & Telecommun Sch Comp Sci Nanjing 210023 Jiangsu Peoples R China
A smart grid is a modernized electrical grid that uses distribution networks to deliver electricity. It aims to gather and act on information, such as information about the behaviors of grid entities, in an automated ... 详细信息
来源: 评论
Security encryption for video-on-radio devices
Security encryption for video-on-radio devices
收藏 引用
5th Conference on Applications and Science of Computational Intelligence
作者: Perrone, AL Basti, G Techniteia Adv Paradigms SRL I-00144 Rome Italy
In this paper we present an encryption module included in the Subsidiary Communication Channel (SCC) System we are developing for video-on-FM radio broadcasting. This module is aimed to encrypt by symmetric key the vi... 详细信息
来源: 评论
Ultra-low Power encryption Engine for Wireless Implantable Medical Devices
Ultra-low Power Encryption Engine for Wireless Implantable M...
收藏 引用
55th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Hosseini-Khayat, Saied Bahmanyar, Parvin Rahiminezhad, Ehsan Sawan, Mohamad Ferdowsi Univ Mashhad Dept Elect Engn Digital Syst Design Lab Mashhad Iran Polytechn Montreal Dept Elect Engn Polystim Neurotechnol Lab Montreal PQ H3C 3A7 Canada
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PR... 详细信息
来源: 评论
A common key recovery block format: Promoting interoperability between dissimilar key recovery mechanisms
收藏 引用
COMPUTERS & SECURITY 2000年 第1期19卷 41-47页
作者: Gupta, S CygnaCom Solutions United States
When cryptographic products chat employ different key recovery mechanisms need to interoperate with one another, one of che major obstacles is the inability of the decryptor product to recognize, and optionally valida... 详细信息
来源: 评论
High-performance FPGA implementation of DES using a novel method for implementing the key schedule
收藏 引用
IEE PROCEEDINGS-CIRCUITS DEVICES AND SYSTEMS 2003年 第5期150卷 373-378页
作者: McLoone, M McCanny, JV Queens Univ Belfast Sch Elect & Elect Engn DSiP Labs Belfast BT9 5AH Antrim North Ireland
A generic, parameterisable key scheduling core is presented, which can be utilised in pipelinable private-key encryption algorithms. The data encryption standard (DES) algorithm, which lends itself readily to pipelini... 详细信息
来源: 评论
Introduction to Soft-Cryptosystem and its Application
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2022年 第2期125卷 1801-1826页
作者: Paik, Biplab Mondal, Shyamal Kumar Vidyasagar Univ Midnapore 721102 W Bengal India Vidyasagar Univ Dept Appl Math Oceanol & Comp Programming Midnapore 721102 W Bengal India
The soft set theory offers a wide range of applications in a variety of domains. The soft set is more general and has more capabilities in controlling unpredictable data than other current apparatuses, such as fuzzy s... 详细信息
来源: 评论
State-of-the-art ciphers for commercial applications
收藏 引用
COMPUTERS & SECURITY 1999年 第1期18卷 67-74页
作者: Preneel, B Katholieke Univ Leuven Dept Elect Engn ESAT B-3001 Heverlee Belgium
We discuss recent developments in the area of conventional cryptographic primitives: encryption algorithms (block ciphers and stream ciphers),MAC algorithms, and hash functions. The security level and software perform... 详细信息
来源: 评论
A New Compression Scheme for Secure Transmission
收藏 引用
International Journal of Automation and computing 2013年 第6期10卷 578-586页
作者: M.Baritha Begum Y.Venkataramani Saranathan College of Engineering
encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and ba... 详细信息
来源: 评论