咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是161-170 订阅
排序:
Study on Strategy of Account Security Based on SQL Server Database
Study on Strategy of Account Security Based on SQL Server Da...
收藏 引用
1st International Conference on E-Business and Information System Security
作者: Zhang, Hong-yan Wang, Wei Henan Inst Engn Dept Comp Zhengzhou Peoples R China
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the website, the security of... 详细信息
来源: 评论
Experiences from Using the CORAS Methodology to Analyze a Web Application
收藏 引用
JOURNAL OF CASES ON INFORMATION TECHNOLOGY 2005年 第3期7卷 110-130页
作者: den Braber, Folker Mildal, Arne Bjorn Nes, Jone Stolen, Ketil Vraalsen, Fredrik Leiden Univ Comp Sci Leiden Netherlands NetCom IT & Internet Responsibil IT Dev Activ Oslo Norway NetCom Oslo Norway SINTEF Qual & Secur Technol Grp Dept Cooperat & Trusted Syst Informat & Commun Technol Trondheim Norway SINTEF Informat & Commun Technol Cooperat & Trusted Syst Grp Trondheim Norway
During a field trial performed at the Norwegian telecom company NetCom from May 2003 to July 2003, a methodology for model-based risk analysis was assessed. The chosen methodology was the CORAS methodology (CORAS, 200... 详细信息
来源: 评论
Library data protection and threat detection system based on network security
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2024年 第1-2期24卷 137-153页
作者: Xiong, Jianxin Wang, Xianping Hunan Univ Arts & Sci Changde 415000 Hunan Peoples R China Chongqing Univ Arts & Sci Yongchuan 402160 Chongqing Peoples R China
Traditional libraries may have security risks such as data breach, network attack and virus infection, which requires a library data protection and threat detection system based on network security to effectively mana... 详细信息
来源: 评论
Investigation and application of key technologies of aggregated flash payment based on marketing blockchain in the context of massive distributed generation grid connection
收藏 引用
INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS 2023年 第4期24卷 465-474页
作者: Wang, Chao Zhang, Qingfang Yang, Pengfei Si, Xiaofeng Zhou, Li State Grid Gansu Elect Power Co Lanzhou 730000 Gansu Peoples R China State Grid Gansu Elect Power Co Mkt Serv Ctr Lanzhou 730000 Gansu Peoples R China
Optical flash payment technology is a form of optical flash payment application. Its payment scenario is mainly to directly realize "card free payment" in the consumption process through mobile devices, Blue... 详细信息
来源: 评论
How to encrypt a graph
收藏 引用
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS 2020年 第6期35卷 668-681页
作者: Akl, Selim G. Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, "the graph is the message": its vertices, its edges, and its edge weigh... 详细信息
来源: 评论
A visual DNA compilation of Rossler system and its application in color image encryption
收藏 引用
CHAOS SOLITONS & FRACTALS 2023年 第1期174卷
作者: Zou, Chengye Wang, Lin Yanshan Univ Coll Informat Sci & Engn Qinhuangdao 066004 Peoples R China Dalian Univ Technol Fac Elect Informat & Elect Engn Dalian 116024 Peoples R China Informedia Elect Co Ltd Dalian Peoples R China
This paper proposes the use of visual DNA compilation for the Ro & BULL;ssler chaotic system in the context of semi synthetic biology, which has promising prospects for the development of next-generation computers... 详细信息
来源: 评论
Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2024年 254卷
作者: Montano, Isabel Herrera Diaz, Juan Ramos Aranda, Jose Javier Garcia Molina-Cardin, Sergio Lopez, Juan Jose Guerrero Diez, Isabel de la Torre Univ Valladolid Dept Signal Theory & Commun & Telemat Engn Paseo Belen 15 Valladolid 47011 Spain Nokia Dept Innovat Maria Tubau St 9 Madrid 28050 Spain
The paper addresses the persistent challenge of insider threat in cybersecurity. Despite advancements in detection and prevention technologies and approaches, the complexity of digital environments and the ingenuity o... 详细信息
来源: 评论
Research on Medical Data Storage and Sharing Model Based on Blockchain  7
Research on Medical Data Storage and Sharing Model Based on ...
收藏 引用
IEEE/ACM 7th Symposium on Edge Computing (SEC)
作者: Zhao, Jian Qiang, Wenqian Zhao, Zisong An, Tianbo Kuang, Zhejun Xu, Dawei Shi, Lijuan Changchun Univ Coll Network Secur Changchun Peoples R China Changchun Univ Coll Comp Sci & Technol Changchun Peoples R China Changchun Univ Coll Elect Informat Engn Changchun Peoples R China
With the process of medical informatization, medical diagnosis results are recorded and shared in the form of electronic data in the computer. However, the security of medical data storage can not be effectively prote... 详细信息
来源: 评论
A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its' applications in image encryption
收藏 引用
CHAOS SOLITONS & FRACTALS 2022年 第0期154卷 111693-111693页
作者: Liu, Xilin Tong, Xiaojun Wang, Zhu Zhang, Miao Harbin Inst Technol Sch Comp Sci & Technol Weihai 264209 Peoples R China Harbin Inst Technol Sch Informat Sci & Engn Weihai 264209 Peoples R China
In view of the problem that dissipative chaos has attractors and is easy to be attacked by reconstruction, which leads to the security defects of encryption algorithm based on dissipative chaos, we design a new genera... 详细信息
来源: 评论
Overview of Image encryption Technology based on Chaos and Neural Network
International Core Journal of Engineering
收藏 引用
International Core Journal of Engineering 2021年 第10期7卷 196-201页
作者: Mindan Zhang Ye Tao Wenyu Zhang
Artificial neural network is a very important operation model in the field of artificial intelligence. Ann deals with complex problems by simulating the structure and logic of human brain. Chaotic system is a dynamic ... 详细信息
来源: 评论