咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 aes

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 278 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是231-240 订阅
Laying a Secure Foundation for Mobile Devices  20
Laying a Secure Foundation for Mobile Devices
收藏 引用
20th Annual Network and Distributed System Security Symposium, NDSS 2013
作者: Smalley, Stephen Trusted Systems Research National Security Agency
Conduct and sponsor research to provide information assurance for national security systems. Enabling safe operation in risky or compromised environments. Research into cryptographic algorithms and protocols, system a... 详细信息
来源: 评论
QUATERNION GYRATOR TRANSFORM AND ITS APPLICATION TO COLOR IMAGE encryption
QUATERNION GYRATOR TRANSFORM AND ITS APPLICATION TO COLOR IM...
收藏 引用
IEEE International Conference on Image Processing
作者: Zhuhong Shao Jiasong Wu Jean Louis Coatrieux Gouenou Coatrieux Huazhong Shu Laboratory of Image Science and Technology School of Computer Science and Engineering Southeast University 210096 Nanjing China INSERM U1099 Rennes F-35000 France Institut Mines-Telecom Telecom Bretagne INSERM U1101 Latim Brest F-29238 France
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via th... 详细信息
来源: 评论
Extensive Medical Data Storage With Prominent Symmetric algorithms On Cloud - A Protected Framework
Extensive Medical Data Storage With Prominent Symmetric Algo...
收藏 引用
IEEE International Conference on Smart Structures and Systems
作者: G. Nalinipriya R. Aswiri Kumar Associate Professor Saveetha Engineering College Chennai India. PG Scholar Saveetha Engineering College Chennai India.
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life ... 详细信息
来源: 评论
Ultra-low Power encryption Engine for Wireless Implantable Medical Devices
Ultra-low Power Encryption Engine for Wireless Implantable M...
收藏 引用
55th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Hosseini-Khayat, Saied Bahmanyar, Parvin Rahiminezhad, Ehsan Sawan, Mohamad Ferdowsi Univ Mashhad Dept Elect Engn Digital Syst Design Lab Mashhad Iran Polytechn Montreal Dept Elect Engn Polystim Neurotechnol Lab Montreal PQ H3C 3A7 Canada
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PR... 详细信息
来源: 评论
Efficient integrated AES crypto-processor architecture for 8-bit stream cipher
收藏 引用
ELECTRONICS LETTERS 2012年 第23期48卷 1456-1457页
作者: Ahmad, N. Hasan, S. M. Rezaul Massey Univ Sch Engn & Adv Technol Ctr Res Analog & VLSI MicroSyst Design Palmerston North New Zealand
Adoption of the Advanced encryption Standard (AES) as a symmetric encryption algorithm for numerous applications requires a low cost and low power design. Presented is a new 8-bit stream cipher architecture core for a... 详细信息
来源: 评论
Research and Realization of Random encryption algorithm
Research and Realization of Random Encryption Algorithm
收藏 引用
International Conference on Internet Computing in Science and Engineering
作者: Gao Wei Zhang Guoyin Li Yanmei Chen Weihua Harbin Engn Univ Coll Comp Sci & Technol Harbin 150001 Peoples R China
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true rand... 详细信息
来源: 评论
Online Shopping System Based on Improved MD5  1
收藏 引用
3rd International Conference on Information Computing and Applications (ICICA 2012)
作者: Li, Ji-Rui Zhang, Su-Qing Henan Vocat & Tech Inst Informat Engineer Dept Zhengzhou Peoples R China
Message-Digest algorithm 5, a hash function which is widely used in the field of computer security, can provide the message integrity protection. But to the field following certain rules, for example, by date of birth... 详细信息
来源: 评论
Chaotic Generator Synthesis: Dynamical and Statistical Analysis
Chaotic Generator Synthesis: Dynamical and Statistical Analy...
收藏 引用
7th International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Taralova, Ina Lozi, Rene El Assad, Safwan Ecole Cent Nantes IRCCyN 1 Rue Noe F-44321 Nantes France Univ Nice Sophia Antipolis Laboratoire J Dieudonne CNRS UMR 7351 F-F06046 Nice France Polytech Nantes IETR CNRS UMR 6164 F-44306 Nantes France
The paper presents a novel chaotic encryption algorithm which can be used to improve the communication security. An uncomplicated process of chaotic substitution permutation network (SPN) with variable control paramet... 详细信息
来源: 评论
A Flight Data Storage System with Efficient Compression and Enhanced Security
A Flight Data Storage System with Efficient Compression and ...
收藏 引用
IEEE/AIAA 31st Digital Avionics Systems Conference (DASC)
作者: Cho, Seung-Hoon Ha, Seok-Wun Moon, Yong-Ho Jeong, Chan-Bok Gyeongsang Natl Univ Dept Informat Chinju South Korea
In general, all kinds of aircrafts have the flight data storage systems such as DTS, Black-box and etc. Data to be stored in such equipment contains very important information that is related to the flight performance... 详细信息
来源: 评论
Evaluation of Susceptibility of FPGA-based Circuits to Fault Injection Attacks Based on Clock Glitching
Evaluation of Susceptibility of FPGA-based Circuits to Fault...
收藏 引用
IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)
作者: Korczyc, Jakub Krasniewski, Andrzej Warsaw Univ Technol Inst Telecommun Warsaw Poland
We present a method and tool for examining an FPGA-based circuit, in particular an implementation of a cryptographic algorithm, subjected to a fault injection attack based on clock glitching. The proposed approach off... 详细信息
来源: 评论