咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是221-230 订阅
排序:
Secure and Efficient LBIST for Feedback Shift Register-Based Cryptographic Systems
Secure and Efficient LBIST for Feedback Shift Register-Based...
收藏 引用
19th IEEE European Test Symposium (ETS)
作者: Dubrova, Elena Naslund, Mats Selander, Goran Royal Inst Technol S-16440 Stockholm Sweden Ericsson Res S-16480 Stockholm Sweden
Cryptographic methods are used to protect confidential information against unauthorised modification or disclosure. Cryptographic algorithms providing high assurance exist, e.g. AES. However, many open problems relate... 详细信息
来源: 评论
Randomness Extraction Techniques for Jittery Oscillators  38
Randomness Extraction Techniques for Jittery Oscillators
收藏 引用
38th International Spring Seminar on Electronics Technology (ISSE)
作者: Marghescu, Andrei Svasta, Paul Simion, Emil Univ Politehn Bucuresti Bucharest Romania CETTI Bucharest Romania Adv Technol Inst Bucharest Romania
Random numbers represent one of the most sensitive parts of cryptography, being used in different encryption algorithms and/or communication protocols for their property of being irreversible and non-deterministic. Us... 详细信息
来源: 评论
Laying a Secure Foundation for Mobile Devices  20
Laying a Secure Foundation for Mobile Devices
收藏 引用
20th Annual Network and Distributed System Security Symposium, NDSS 2013
作者: Smalley, Stephen Trusted Systems Research National Security Agency
Conduct and sponsor research to provide information assurance for national security systems. Enabling safe operation in risky or compromised environments. Research into cryptographic algorithms and protocols, system a... 详细信息
来源: 评论
Correlation Based Cryptanalysis on A Chaotic encryption of JPEG Image
Correlation Based Cryptanalysis on A Chaotic Encryption of J...
收藏 引用
International Congress on Image and Signal Processing
作者: Weihai Li Key Lab. of Electromagn. Space Inf. Univ. of Sci. & Technol. of China Hefei China
Image encryption is a hotspot of multimedia security. Many researchers adopted chaotic systems as pseudo-random number generators in image encryptions considering the properties of high sensitivity, large periodicity,... 详细信息
来源: 评论
Research on the Design of Lower Computer of Data encryption System
Research on the Design of Lower Computer of Data Encryption ...
收藏 引用
2015 4th National Conference on Electrical,Electronics and Computer Engineering(NCEECE 2015)
作者: Honghui Lai Juan Zhong College of Information Engineering Gannan Medical University
In the modern information and network society, the data security is very important to our daily lives. The data encryption system can help us to protect the security of personal information. This paper mainly introduc... 详细信息
来源: 评论
Research on Information Security of Pulmonary Nodules Based on DOSA  11
Research on Information Security of Pulmonary Nodules Based ...
收藏 引用
11th International Conference on Information Communication and Applications (ICICA)
作者: Wu, Lin Dawod, Ahmad Yahya Miao, Fang Chiang Mai Univ Int Coll Digital Innovat 239 Nimmanhaemin Rd Chiang Mai 50200 Thailand Chengdu Univ Big Data Res Inst Chengdu Sichuan Peoples R China
At present, the information disclosure, especially medical information disclosure, is very serious,According to bitglass, the number of medical data leaks in the United States doubled in 2020, affecting more than 26 m... 详细信息
来源: 评论
A Novel Approach to Enhance Security in WEP  1
A Novel Approach to Enhance Security in WEP
收藏 引用
International Conference on Green Computing and Internet of Things (ICGCIoT)
作者: Garg, Ashish Ctr Dev Adv Comp Noida India
This paper begins by introducing the concept of Ron's Code 4 (RC4). The introductory section gives brief information about the architecture of RC4 and its various flaws. In order to examine the RC4 security threat... 详细信息
来源: 评论
CRYPTOGRAPHY BASED ON NEURAL NETWORK
CRYPTOGRAPHY BASED ON NEURAL NETWORK
收藏 引用
26th European Conference on Modelling and Simulation (ECMS 2012)
作者: Volna, Eva Kotyrba, Martin Kocian, Vaclav Janosek, Michal Univ Ostrava Dept Informat & Comp Dvorakova 7 Ostrava 70200 Czech Republic
The goal of cryptography is to make it impossible to take a cipher and reproduce the original plain text without the corresponding key. With good cryptography, your messages are encrypted in such a way that brute forc... 详细信息
来源: 评论
Differential Evolution for the Cryptanalysis of Transposition Cipher  3
Differential Evolution for the Cryptanalysis of Transpositio...
收藏 引用
3rd International Conference on Information and Communication Technology ICoICT
作者: Wulandari, Gia S. Rismawan, Wahyu Saadah, Siti Telkom Univ Sch Comp Bandung Indonesia
Transposition cipher is a class of hystorical encryption algorithms that rearrange positions in plaintext based on some fixed permutation which is its secret key. In this research Differential Evolution was used to at... 详细信息
来源: 评论
Efficient RFID authentication protocol for minimizing RFID tag computation
Efficient RFID authentication protocol for minimizing RFID t...
收藏 引用
1st International Conference on Hybrid Information Technology
作者: Rhee, Keunwoo Kwak, Jin Yi, Wan S. Park, Chanho Park, Sangjoon Yang, Hyungkyu Kim, Seungjoo Won, Dongho Sungkyunkwan Univ Informat Secur Grp 300 Cheoncheon Dong Suwon 440746 Gyeonggi Do South Korea Soonchunhyang Univ Dept Informat Secur Asan 336745 South Korea INDI SYST Co Ltd Seoul 152848 South Korea Kangnam Univ Dept Comp & Media Engn Giheung 446702 South Korea
RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, man... 详细信息
来源: 评论