咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是211-220 订阅
排序:
Semi-Fragile Watermarking for Image Tamper Localization and Self-Recovery
Semi-Fragile Watermarking for Image Tamper Localization and ...
收藏 引用
IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
作者: Li, Yuhang Du, Ling Shenyang Aerosp Univ Informat Network Ctr Shenyang 110136 Peoples R China Shenyang Aerosp Univ Sch Comp Tianjin 110136 Peoples R China
This paper proposes a semi-fragile digital watermarking scheme for image tamper localization and self-recovery. Firstly, the authentication watermark is generated for tampered area localization. After that, for conten... 详细信息
来源: 评论
AuthROS: Secure Data Sharing Among Robot Operating Systems based on Ethereum  22
AuthROS: Secure Data Sharing Among Robot Operating Systems b...
收藏 引用
22nd IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Zhang, Shenhui Li, Wenkai Li, Xiaoqi Liu, Boyi Hainan Univ Key Lab Internet Informat Retrieval Hainan Prov Haikou Hainan Peoples R China Hong Kong Univ Sci & Technol Inst Robot Hong Kong Peoples R China
The Robot Operating System (ROS) streamlines human processes, increasing the efficiency of various production tasks. However, the security of data transfer operations in ROS is still in its immaturity. Securing data e... 详细信息
来源: 评论
A Scheme of E-Commerce Security based on ECC & SSL, Protocol
A Scheme of E-Commerce Security based on ECC & SSL, Protocol
收藏 引用
1st International Symposium on Computer Network and Multimedia Technology
作者: Ren, Zhikao Liu, Minghua Ye, Chen Wang, Chuansheng Qingdao Univ Sci & Technol Coll Informat Qingdao Peoples R China Qingdao Univ Sci & Technol Coll Elect Engn Qingdao Peoples R China
Considering the inefficiency of using traditional RSA algorithm in SSL protocol at E-Business area, a new E-commerce security scheme which the ECC is embed into SSL Protocol has been put forward, and the test has been... 详细信息
来源: 评论
CONFIGURATION OF DNS SERVER WITH CRYPTOGRAPHIC algorithm FOR SECURE DNS AND DHCP UPDATES
CONFIGURATION OF DNS SERVER WITH CRYPTOGRAPHIC ALGORITHM FOR...
收藏 引用
3rd International Conference on Computing Communication and Networking Technologies (ICCCNT)
作者: Chatterjee, Tanmay ABV IIITM Gwalior ABV IIITM Informat Technol Gwalior India
As we know the Domain Name System (DNS) is one of the most successful and critical part of the internet infrastructure today. Of the many network protocols we use in networking today, it is one of the most fundamental... 详细信息
来源: 评论
The DES algorithm Based on DSP Technology
The DES Algorithm Based on DSP Technology
收藏 引用
2nd International Conference on Frontiers of Mechanical Engineering and Materials Engineering (MEME 2013)
作者: Hao, Wang Ren, Chen Dian Shasha Changchun Univ Sci & Technol Changchun Jilin Peoples R China
this paper designed a kind of DES algorithm implementation based on DSP technology, application of TI company C54x series general DSP implementation mechanisms, with the introduction of DSP, this paper proposes a new ... 详细信息
来源: 评论
Discussion of one new symmetric algorithm
Discussion of one new symmetric algorithm
收藏 引用
International Multiconference of Engineers and Computer Scientists
作者: Chan, Xiaorui Liu, Guangzhong Shanghai Maritime Univ Coll Informat Engn Shanghai Peoples R China
We have devised one now kind of 160 bits symmetric encryption algorithms, basing on a kernel encryption function called S. By incising 160 bits data block into eight pieces, S function produces one brand-new 160 bits ... 详细信息
来源: 评论
A Generic Construction of Identity-Based Online/Offline Signcryption
A Generic Construction of Identity-Based Online/Offline Sign...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications
作者: Sun, Dongdong Mu, Yi Susilo, Willy Univ Wollongong Sch Comp Sci & Software Engn Wollongong NSW 2522 Australia
Signcryption has clear advantage over traditional sign-then-encrypt schemes. However, the computational overhead for signcryption is still too heavy when it is applied to resource-constraint systems. In this paper, we... 详细信息
来源: 评论
Secure and Efficient LBIST for Feedback Shift Register-Based Cryptographic Systems
Secure and Efficient LBIST for Feedback Shift Register-Based...
收藏 引用
19th IEEE European Test Symposium (ETS)
作者: Dubrova, Elena Naslund, Mats Selander, Goran Royal Inst Technol S-16440 Stockholm Sweden Ericsson Res S-16480 Stockholm Sweden
Cryptographic methods are used to protect confidential information against unauthorised modification or disclosure. Cryptographic algorithms providing high assurance exist, e.g. AES. However, many open problems relate... 详细信息
来源: 评论
Randomness Extraction Techniques for Jittery Oscillators  38
Randomness Extraction Techniques for Jittery Oscillators
收藏 引用
38th International Spring Seminar on Electronics Technology (ISSE)
作者: Marghescu, Andrei Svasta, Paul Simion, Emil Univ Politehn Bucuresti Bucharest Romania CETTI Bucharest Romania Adv Technol Inst Bucharest Romania
Random numbers represent one of the most sensitive parts of cryptography, being used in different encryption algorithms and/or communication protocols for their property of being irreversible and non-deterministic. Us... 详细信息
来源: 评论
Laying a Secure Foundation for Mobile Devices  20
Laying a Secure Foundation for Mobile Devices
收藏 引用
20th Annual Network and Distributed System Security Symposium, NDSS 2013
作者: Smalley, Stephen Trusted Systems Research National Security Agency
Conduct and sponsor research to provide information assurance for national security systems. Enabling safe operation in risky or compromised environments. Research into cryptographic algorithms and protocols, system a... 详细信息
来源: 评论