咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是131-140 订阅
排序:
Preventing“Bad”Content Dispersal in Named Data Networking
收藏 引用
China Communications 2018年 第6期15卷 109-119页
作者: Yi Wang Zhuyun Qi Bin Liu Southern University of Science and Technology Shenzhen 518055China Peking University Shenzhen 518055China Tsinghua University Beijing 100084China
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ... 详细信息
来源: 评论
Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift
收藏 引用
IET IMAGE PROCESSING 2022年 第7期16卷 1959-1972页
作者: Ye, Hanmin Su, Keqin Cheng, Xiaohui Huang, Shiming Guilin Univ Technol Sch Informat Sci & Engn Guilin 541000 Guangxi Peoples R China
In view of the mutual restriction between the image encryption and information hiding process in the ciphertext domain reversible algorithm, the existing ciphertext domain image reversible image steganography algorith... 详细信息
来源: 评论
An AES crypto chip using a high-speed parallel pipelined architecture
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2005年 第7期29卷 317-326页
作者: Yoo, SM Kotturi, D Pan, DW Blizzard, J Univ Alabama Dept Elect & Comp Engn Huntsville AL 35899 USA Cadence Design Syst Inc Plano TX USA
The number of Internet and wireless communications users has rapidly grown and that increases demand for security measures to protect user data transmitted over open channels. In December 200 1, the National Institute... 详细信息
来源: 评论
A new access control method based on multi-authority in cloud storage service
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS 2018年 第1期11卷 483-495页
作者: Luo, Sheng Liu, Qiang South China Univ Technol Sch Econ & Commerce Guangzhou 510006 Guangdong Peoples R China Southwestern Univ Sch Comp Chongqing 400715 Peoples R China
With the arrival of the era of big data, data has become a kind of important assets. In order to get a better utilization of big data, paid or unpaid data sharing will be a trend. And as one of key techniques to maint... 详细信息
来源: 评论
High-Security Sequence Design for Differential Frequency Hopping Systems
收藏 引用
IEEE SYSTEMS JOURNAL 2021年 第4期15卷 4895-4906页
作者: Chen, Rui Shi, Jia Yang, Lie-Liang Li, Zan Guan, Lei Xidian Univ Sch Telecommun Engn State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Univ Southampton Sch Elect & Comp Sci Southampton SO17 1BJ Hants England
Differential frequency hopping (DFH) technique is widely used in wireless communications by exploiting its capabilities of mitigating tracking interference and confidentiality. However, electronic attacks in wireless ... 详细信息
来源: 评论
Time Estimation for a New Block Generation in Blockchain-Enabled Internet of Things
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2024年 第1期21卷 535-557页
作者: Halgamuge, Malka N. Munasinghe, Geetha K. Zukerman, Moshe RMIT Univ Dept Informat Syst & Business Analyt Melbourne Vic 3000 Australia Sine Grp Pty Ltd Adelaide SA 5000 Australia City Univ Hong Kong Dept Elect Engn Hong Kong Peoples R China
The Internet of Things (IoT) has emerged with Distributed Ledger Technology (DLT) to address existing scalability challenges and improve the trustworthiness of machine-to-machine communication. Among the numerous pote... 详细信息
来源: 评论
Automated statistical methods for measuring the strength of block ciphers
收藏 引用
STATISTICS AND COMPUTING 1997年 第2期7卷 125-135页
作者: Gustafson, HM Dawson, EP Golic, JD QUEENSLAND UNIV TECHNOL SCH MATH FAC SCI BRISBANE QLD 4001 AUSTRALIA QUEENSLAND UNIV TECHNOL INFORMAT SECUR RES CTR FAC INFORMAT TECHNOL BRISBANE QLD 4001 AUSTRALIA
A block cipher is one of the most common forms of algorithms used for data encryption. This paper describes an efficient set of statistical methods for analysing the security of these algorithms under the black-box ap... 详细信息
来源: 评论
A Secure Subscription-Push Service Scheme Based on Biockchain and Edge Computing for IoT
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2022年 第2期16卷 445-466页
作者: Deng, Yinjuan Wang, Shangping Zhang, Qian Zhang, Duo Xian Univ Technol Shool Automat & Informat Engn Xian 710054 Peoples R China Baoji Univ Arts & Sci Sch Math & Informat Sci Baoji 721013 Peoples R China Xian Univ Technol Shool Sci Xian Peoples R China Xian Univ Technol Shool Comp Sci & Engn Xian Peoples R China
As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is t... 详细信息
来源: 评论
HIDDEN ASSUMPTIONS IN CRYPTOGRAPHIC PROTOCOLS
收藏 引用
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES 1990年 第6期137卷 433-436页
作者: BOYD, C Electrical Engineering Laboratories Comunications Research Group University of Manchester Manchester UK
It is shown that some well known cryptographic protocols for authentication are insecure if the underlying cryptographic algorithm does not avoid certain special features. Explicit assumptions based on the fundamental... 详细信息
来源: 评论
Lightweight Trust Management Scheme Based on Blockchain in Resource-Constrained Intelligent IoT Systems
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2024年 第15期11卷 25706-25719页
作者: Deng, Min Lyu, Yuanlin Yang, Chunmeng Xu, Fang Ahmed, Manzoor Yang, Na Xu, Ze Ke, Can Hubei Engn Univ Sch Comp & Informat Sci Xiaogan 432000 Peoples R China Hubei Engn Univ Artificial Intelligence Ind Technol Res Inst Xiaogan 432000 Peoples R China Hubei Univ Sch Comp Sci & Informat Engn Wuhan 430062 Peoples R China Hubei Engn Univ AI Ind Technol Res Inst Xiaogan 432000 Peoples R China
In order to realize an intelligent Internet of Things (IoT) system, various resource-constrained IoT devices today play an important role in data transmission and processing. However, the novel data protection require... 详细信息
来源: 评论