咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是11-20 订阅
排序:
A Novel Color Image encryption algorithm Based on Three-Dimensional Chaotic Maps and Reconstruction Techniques
收藏 引用
IEEE ACCESS 2021年 9卷 61334-61345页
作者: Qian, Xiaoliang Yang, Qi Li, Qingbo Liu, Qian Wu, Yuanyuan Wang, Wei Zhengzhou Univ Light Ind Coll Elect & Informat Engn Zhengzhou 450002 Peoples R China Zhengzhou Univ Light Ind Coll Math & Informat Sci Zhengzhou 450002 Peoples R China Hainan Univ Sch Informat & Commun Engn Haikou 570228 Hainan Peoples R China
In the paper, a novel color image encryption scheme is proposed by use of the three-dimensional chaotic maps and some data reconstruction techniques. In the diffusion process of the encryption algorithm, the three-dim... 详细信息
来源: 评论
Logistic map as a block encryption algorithm
收藏 引用
PHYSICS LETTERS A 2001年 第4-5期289卷 199-206页
作者: Kocarev, L Jakimoski, G Univ Calif San Diego Inst Nonlinear Sci La Jolla CA 92093 USA
We discuss the relationship between cryptography and chaos theory, and similarities of their crucial concepts such as mixing property and sensitivity to changes in initial conditions and parameters. A systematic proce... 详细信息
来源: 评论
Cryptanalysis of nonlinear confusion component based encryption algorithm
收藏 引用
INTEGRATION-THE VLSI JOURNAL 2021年 79卷 41-47页
作者: Munir, Noor Khan, Majid Shah, Tariq Alanazi, Ammar S. Hussain, Iqtadar Inst Space Technol Cyber & Informat Secur Lab Islamabad Pakistan Inst Space Technol Dept Appl Math & Stat Islamabad Pakistan Quaid I Azam Univ Dept Math Islamabad Pakistan King Abdul Aziz City Sci & Technol Riyadh Saudi Arabia Qatar Univ Dept Math Stat & Phys Doha 2713 Qatar
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encrypt... 详细信息
来源: 评论
A novel energy-efficient encryption algorithm for secure data in WSNs
收藏 引用
JOURNAL OF SUPERCOMPUTING 2021年 第5期77卷 4754-4777页
作者: Hayouni, Haythem Hamdi, Mohamed Univ Carthage SupCom Carthage Tunisia
Wireless sensor networks (WSNs) are typically deployed environments, often very hostile and without assistance. A certain level of security must be provided. However, the resource constraint is the most important char... 详细信息
来源: 评论
Image encryption algorithm with matrix semi-tensor product
收藏 引用
NONLINEAR DYNAMICS 2021年 第1期105卷 859-876页
作者: Zou, Chengye Wang, Xingyuan Li, Haifeng Anyang Normal Univ Sch Math & Stat Anyang 455000 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China Dalian Univ Technol Sch Software Dalian 116024 Peoples R China
This article proposed an improved 2D-logistic-adjusted-Sine map, which has better ergodicity, pseudo-randomness, unpredictability and wider chaotic range than many existing 2D-chaotic maps. Utilizing improved 2D-logis... 详细信息
来源: 评论
Session key based fast, secure and lightweight image encryption algorithm
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第7期80卷 10391-10416页
作者: Gupta, Manish Gupta, Kamlesh Kumar Shukla, Piyush Kumar UIT RGPV Dept Comp Sci & Engn Bhopal India RJIT Dept Informat Technol Tekanpur India
Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure encryption algorithm. Many encryption algorithms have been... 详细信息
来源: 评论
A Fast Image encryption algorithm Based on Logistic Mapping and Hyperchaotic Lorenz System for Clear Text Correlation
收藏 引用
IEEE ACCESS 2023年 11卷 91441-91453页
作者: He, Dandan Parthasarathy, Rajamohan Li, Hong Geng, Zexun Pingdingshan Univ Sch Informat Engn Pingdingshan 467000 Peoples R China SEGi Univ Fac Engn Built Environm & Informat Technol Kota Damansara 47810 Malaysia
Image encryption (IE) technology is vital to privacy, but the parameter range of the traditional image encryption technology is limited. So it is important to enhance the performance of IE methods. In this study, a pl... 详细信息
来源: 评论
HAZARDOUS CHEMICALS LOGISTICS INTERNET OF VEHICLES BASED ON encryption algorithm
收藏 引用
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE 2024年 第3期25卷 1287-1300页
作者: Tang, Yujian Chen, Ya Jung, Hoekyung Guangxi Police Coll Dept Informat Technol Nanning 530028 Guangxi Peoples R China PaiChai Univ Dept Comp Engn Daejeon 35345 South Korea
With the advancement of information and communication technology, vehicles role in people's lives is not just for transportation but also equipment for the carrier of mobile communication. The new direction is pro... 详细信息
来源: 评论
The Application of AES-SM2 Hybrid encryption algorithm in Big Data Security and Privacy Protection
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2024年 第6期15卷 989-997页
作者: Huang, Pingyun Liao, Guizhou Ren, Jianhong Jiangxi Vocat & Tech Coll Commun Sch Informat Engn Nanchang 330013 Peoples R China Jiangxi Educ Evaluat & Assessment Inst Nanchang 330038 Peoples R China
the times of big data, information security and privacy protection have become important issues facing today's society. To address big data's security and privacy problems, research designs and implements a hy... 详细信息
来源: 评论
Enhancing Security of ADS-B Systems with encryption algorithm in the Smart Ocean
收藏 引用
JOURNAL OF COASTAL RESEARCH 2020年 第Spe105期000卷 181-184页
作者: Liu, Zixin Ling, Mingxing Zhu, Ting Xu, Deru He, Yueshun Liu, Zhifeng East China Univ Technol State Key Lab Nucl Resources & Environm Nanchang 330013 Jiangxi Peoples R China East China Univ Technol Nanchang 330000 Jiangxi Peoples R China East China Univ Technol Sch Earth Sci Nanchang 330000 Jiangxi Peoples R China East China Univ Technol Software Coll Nanchang 330000 Jiangxi Peoples R China
The smart ocean is an influencer concept incorporating digitalized associated ocean and seaboard cities. The construction of an omni-bearing smart ocean requires urban resilience, and the application of smart means ca... 详细信息
来源: 评论