咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是141-150 订阅
排序:
Research on security of information sharing in Internet of Things based on key algorithm
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2018年 88卷 599-605页
作者: Wei, Pengcheng Zhou, Zhen Chongqing Univ Posts & Telecommun Chongqing Univ Educ Chongqing Peoples R China Chongqing Univ Posts & Telecommun Chongqing Peoples R China
With the popularization of mobile devices and the development of wireless networks, the use of mobile devices to access services is becoming more and more popular. It is becoming more and more popular for users to acc... 详细信息
来源: 评论
The design and implementation of hybrid RSA algorithm using a novel chaos based RNG
收藏 引用
CHAOS SOLITONS & FRACTALS 2017年 104卷 655-667页
作者: Cavusoglu, Unal Akgul, Akif Zengin, Ahmet Pehlivan, Ihsan Sakarya Univ Fac Comp & Informat Sci Dept Comp Engn TR-54187 Serdivan Sakarya Turkey Sakarya Univ Fac Technol Dept Elect & Elect Engn TR-54187 Serdivan Sakarya Turkey
The number of attempts to break modern encryption methods increases day by day and therefore the need for the design of systems to ensure higher security has occurred. This study aims, an encryption algorithm that com... 详细信息
来源: 评论
An Efficient algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2018年 83卷 619-628页
作者: Memos, Vasileios A. Psannis, Kostas E. Ishibashi, Yutaka Kim, Byung-Gyu Gupta, B. B. Univ Macedonia Sch Informat Sci Dept Appl Informat Thessaloniki Greece Nagoya Inst Technol Grad Sch Engn Dept Comp Sci Nagoya Aichi 4668555 Japan Sookmyung Womens Univ Dept Informat Technol IT Engn Seoul South Korea Natl Inst Technol Kurukshetra Kurukshetra Haryana India
Internet of Things (IoT) is the new technological revolution that aspires to connect all the everyday physical objects to the Internet, making a huge global network of uniquely things which can share information among... 详细信息
来源: 评论
Keys Don't Grow in Threes
收藏 引用
IEEE INTERNET COMPUTING 2009年 第3期13卷 96-95页
作者: Farrell, Stephen Trinity Coll. Dublin Dublin
Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-... 详细信息
来源: 评论
Secure agent-based diagnosis and classification using optimal kernel support vector machine
收藏 引用
INTERNATIONAL JOURNAL OF BIOMEDICAL ENGINEERING AND TECHNOLOGY 2021年 第1期37卷 25-45页
作者: Tangod, Kiran Kulkarni, Gururaj GIT Dept Informat Sci & Engn Belagavi India Jain Coll Engn Dept Elect & Elect Engn Belagavi India
Diabetes is a serious complex condition which can affect the entire body. The existing multi-agent-based diabetes diagnosis and classification methods require a number of agents and hence communication between those a... 详细信息
来源: 评论
Optimized Implementations for ZUC-256 on FPGA
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2021年 第3期116卷 2615-2632页
作者: Yang, Yatao Zhao, Wenchen Xiong, Liangqing Wang, Ning Ma, Yingjie Beijing Elect Sci & Technol Inst Beijing 100070 Peoples R China Xidian Univ Sch Telecommun Engn Xian 710071 Peoples R China
ZUC-128 algorithm was listed as the core part in the third international encryption and integrity protection algorithms, EEA3 and EIA3 in 4G-LTE mobile communication system by 3rd generation partnership project (3GPP)... 详细信息
来源: 评论
Efficient integrated AES crypto-processor architecture for 8-bit stream cipher
收藏 引用
ELECTRONICS LETTERS 2012年 第23期48卷 1456-1457页
作者: Ahmad, N. Hasan, S. M. Rezaul Massey Univ Sch Engn & Adv Technol Ctr Res Analog & VLSI MicroSyst Design Palmerston North New Zealand
Adoption of the Advanced encryption Standard (AES) as a symmetric encryption algorithm for numerous applications requires a low cost and low power design. Presented is a new 8-bit stream cipher architecture core for a... 详细信息
来源: 评论
A Speed-Adaptive Media encryption Scheme for Real-Time Recording and Playback System
收藏 引用
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING 2010年 第1期2010卷 371513-371513页
作者: Xiao, Chen Lian, Shiguo Wang, Lifeng Ma, Shilong Lv, Weifeng Xu, Ke France Telecom R&D Beijing Beijing 100080 Peoples R China Beihang Univ Sch Comp Sci & Engn State Key Lab Software Dev Environm Beijing 100083 Peoples R China Beijing Elect Sci & Technol Inst Elect & Informat Engn Dept Beijing 100070 Peoples R China
The recording and playback system (RPS) in video conference system needs to store mass of media data real-timely. Considering the security issue, media data should be encrypted before storing. Traditional full encrypt... 详细信息
来源: 评论
Data sharing platform and security mechanism based on cloud computing under the Internet of Things
收藏 引用
OPEN COMPUTER SCIENCE 2022年 第1期12卷 403-415页
作者: Cai, Jie Wang, Jun NanJing City Vocat Coll Sch Intelligent Engn Nanjing 211200 Jiangsu Peoples R China BDStar Intelligent & Connected Vehicle Technol Co Software Dev Dept Nanjing 211100 Jiangsu Peoples R China
Under the background of the rapid development of information technology, people's data and information security problems are becoming increasingly serious. Data and information can be leaked in daily Internet acce... 详细信息
来源: 评论
Managing security policies: Modeling, verification and configuration
收藏 引用
JOURNAL OF HIGH SPEED NETWORKS 2006年 第3期15卷 207-208页
作者: Al-Shaer, Ehab Neuman, Clifford Li, Hong Verma, Dinesh C. Chung, Anthony Depaul Univ Multimedia Networking Lab Sch Comp Sci Telecommun & Informat Syst Chicago IL 60604 USA Univ So Calif Inst Informat Sci Los Angeles CA USA IBM Corp Thomas J Watson Res Ctr Yorktown Hts NY 10598 USA Depaul Univ Sch Comp Sci Chicago IL 60604 USA
The importance of security in present-day communication networks isundisputed. The security of a network depends not only on the encryption algorithm and securityprotocols that it supports, but even more so on the pol... 详细信息
来源: 评论