咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是241-250 订阅
排序:
Research on an Attribute Based encryption Method Oriented IHE-XDS
Research on an Attribute Based Encryption Method Oriented IH...
收藏 引用
2018 International Symposium on Communication Engineering & Computer Science(CECS 2018)
作者: Yanfeng Li Runtong Zhang School of Economics and Management Beijing Jiao Tong University
IHE-XDS(Integrating the Healthcare Cross-Enterprise Document Sharing) is an interagency,involving multiple medical institutions and users,for the integration of medical information sharing *** medical information shar... 详细信息
来源: 评论
A Survey on the Techniques of Medical Image encryption
A Survey on the Techniques of Medical Image Encryption
收藏 引用
IEEE International Conference on Computational Intelligence and Computing Research
作者: V. Pavithra C. Jeyamala Thiagarajar College of Engineering Madurai Tamil Nadu IN
Medical images are considered as one of the most important and sensitive data in Information systems. Sending medical images over the network requires a strong encryption algorithm such that it is resistant against cr... 详细信息
来源: 评论
Symmetric image encryption scheme based on multiple chaotic maps
Symmetric image encryption scheme based on multiple chaotic ...
收藏 引用
International Conference on Emerging Trends in Science, Engineering and Technology (INCOSET)
作者: R. Krishnamoorthy P. Murali Dept. of CSE Anna University Trichirappalli
In this paper, a new asymmetric encryption algorithm based on multiple chaotic maps with invertible matrices to encrypt the image is proposed. In order to increase the security of the image, a new shuffling algorithm ... 详细信息
来源: 评论
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-379
收藏 引用
2016年
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-379 by published by
来源: 评论
Akcelerace šifrovacích algoritmů pomocí FPGA
Akcelerace šifrovacích algoritmů pomocí FPGA
收藏 引用
作者: Gajdoš, Miroslav Brno University of Technology
Tato práce se zabývá možností akcelerace šifrovacích algoritmů pomocí rekonfigurovatelných obvodů FPGA a zkoumáním rozdílu rychlosti implementace oproti implementaci s... 详细信息
来源: 评论
Digital image information hiding algorithm research based on LDPC code
收藏 引用
EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING 2018年 第1期2018卷 1页
作者: Wang, Zhong-xun Meng, Xiang-cai Yantai Univ Inst Sci & Technol Optoelect Informat Yantai Peoples R China
LDPC (low-density parity-check code) is a parity check code, and its performance is very close to Shannon limit. It is a sort of good channel code which has good ability of error correction. The coding can be introduc... 详细信息
来源: 评论
Kryptoanalýza moderních kryptografických modulů
Kryptoanalýza moderních kryptografických modulů
收藏 引用
作者: Fördős, András Brno University of Technology
Práce se zaměřuje na proudovou analýzu moderních kryptografických modulů. V první části práce je krátký úvod do problematiky proudového postranního kaná... 详细信息
来源: 评论
E2 -: A new 128-bit block cipher
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2000年 第1期E83A卷 48-59页
作者: Kanda, M Moriai, S Aoki, K Ueda, H Takashima, Y Ohta, K Matsumoto, T NTT Labs Yokosuka Kanagawa 2390847 Japan Yokohama Natl Univ Yokohama Kanagawa 2408501 Japan
This paper describes the design principles, the specification, and evaluations of a new 128-bit block cipher E2**, which was proposed to the AES (Advanced encryption Standard) candidates. This algorithm supports 128-b... 详细信息
来源: 评论
A compressive sensing-based adaptable secure data collection scheme for distributed wireless sensor networks
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2019年 第6期15卷 1-12页
作者: Liu, Zhen Han, Yi-Liang Yang, Xiao-Yuan Armed Police Force Engn Univ Coll Cryptog Engn Xian 710086 Shaanxi Peoples R China
Toward the goal of high security and efficiency for data collection in wireless sensor network, this article proposed an adaptable secure compressive sensing-based data collection scheme for distributed wireless senso... 详细信息
来源: 评论
A Secure Subscription-Push Service Scheme Based on Biockchain and Edge Computing for IoT
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2022年 第2期16卷 445-466页
作者: Deng, Yinjuan Wang, Shangping Zhang, Qian Zhang, Duo Xian Univ Technol Shool Automat & Informat Engn Xian 710054 Peoples R China Baoji Univ Arts & Sci Sch Math & Informat Sci Baoji 721013 Peoples R China Xian Univ Technol Shool Sci Xian Peoples R China Xian Univ Technol Shool Comp Sci & Engn Xian Peoples R China
As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is t... 详细信息
来源: 评论