咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 aes

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 278 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是251-260 订阅
encryption algorithm Based on New Composite Chaos Dynamics System
Encryption Algorithm Based on New Composite Chaos Dynamics S...
收藏 引用
3rd International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2007)
作者: Tong Xiao-Jun Cui Ming-Gen Harbin Inst Technol Sch Comp Sci & Engn Weihai 264209 Peoples R China Harbin Inst Technol Coll Sci Weihai 264209 Peoples R China
Chaos defined in general in quantitative characteristics is not a strict definition In this paper two new chaos functions are proposed and theoretical proof about chaos is finished based on a strict Devaney definition... 详细信息
来源: 评论
An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
收藏 引用
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION 2011年 第6期16卷 2383-2389页
作者: Yoon, Eun-Jun Jeon, Il-Soo Kumoh Natl Inst Technol Sch Elect Engn Gumi 730701 Gyeongbuk South Korea Kyungpook Natl Univ Sch Elect Engn & Comp Sci Taegu 702701 South Korea
This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshey chaotic map. The proposed key agreement protocol uses the semi-group property of Chebyshev polynomials to agree D... 详细信息
来源: 评论
A Performance Analysis Model for Cryptographic Protocols  2
A Performance Analysis Model for Cryptographic Protocols
收藏 引用
2nd International Conference on Society and Information Technologies (ICSIT 2011)
作者: Olagunju, Amos Soenneker, Jake St Cloud State Univ Comp Networking & Applicat Program St Cloud MN 56301 USA
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of ... 详细信息
来源: 评论
Improved Design of GPRS Wireless Security System Based on AES
收藏 引用
International Conference on Advances in Computer Science, Environment, Ecoinformatics, and Education
作者: Ma, TaoLin Sun, XiaoLan Zhang, LiangPei Whuhan Univ Sch Printing & Packaging Wuhan 430079 Peoples R China Whuhan Univ State Key Lab for Informat Engn Surveying Mapping & Remote Sensing Wuhan 430079 Peoples R China
This paper mainly studied how to improve security system by analyzing the current situation and defects of existing encryption security systems. Based on existing studies, optimized GPRS wireless security system (GPRS... 详细信息
来源: 评论
The Research and Design of ATM PIN Pad Based on Triple DES
The Research and Design of ATM PIN Pad Based on Triple DES
收藏 引用
第八届IEEE信息与自动化国际会议(ICIC 2011)
作者: Wanping Wu Jianxun Jin Jun Cheng Center of Applied Superconductivity and Electrical Engin.University of Electronic Science and Techno Center of Applied Superconductivity and Electrical Engin.University of Electronic Science and Techno Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences.Shenzhen Guangdong ProvinceC
ATM(Automatic Teller Machine)PIN (personal identification number)pad is essential in *** present,DES (Data encryption Standard),RSA (public key encryption algorithm),DUKPT(Derived Unique Key per Transaction)etc encryp... 详细信息
来源: 评论
A Speed-Adaptive Media encryption Scheme for Real-Time Recording and Playback System
收藏 引用
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING 2010年 第1期2010卷 371513-371513页
作者: Xiao, Chen Lian, Shiguo Wang, Lifeng Ma, Shilong Lv, Weifeng Xu, Ke France Telecom R&D Beijing Beijing 100080 Peoples R China Beihang Univ Sch Comp Sci & Engn State Key Lab Software Dev Environm Beijing 100083 Peoples R China Beijing Elect Sci & Technol Inst Elect & Informat Engn Dept Beijing 100070 Peoples R China
The recording and playback system (RPS) in video conference system needs to store mass of media data real-timely. Considering the security issue, media data should be encrypted before storing. Traditional full encrypt... 详细信息
来源: 评论
Image encryption Research based on chaotic sequences and wavelet transform
Image Encryption Research based on chaotic sequences and wav...
收藏 引用
2010 International Conference on Audio,Language and Image Processing(2010年音频、语言与图像处理国际会议 ICALIP 2010)
作者: Runhe Qiu Yuzhe Fu Yun Cao Institute of Information Science and Technology Donghua University Shanghai China
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic ... 详细信息
来源: 评论
Keys Don't Grow in Threes
收藏 引用
IEEE INTERNET COMPUTING 2009年 第3期13卷 96-95页
作者: Farrell, Stephen Trinity Coll. Dublin Dublin
Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-... 详细信息
来源: 评论
Study on Strategy of Account Security Based on SQL Server Database
Study on Strategy of Account Security Based on SQL Server Da...
收藏 引用
1st International Conference on E-Business and Information System Security
作者: Zhang, Hong-yan Wang, Wei Henan Inst Engn Dept Comp Zhengzhou Peoples R China
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the website, the security of... 详细信息
来源: 评论
A Scheme of E-Commerce Security based on ECC & SSL, Protocol
A Scheme of E-Commerce Security based on ECC & SSL, Protocol
收藏 引用
1st International Symposium on Computer Network and Multimedia Technology
作者: Ren, Zhikao Liu, Minghua Ye, Chen Wang, Chuansheng Qingdao Univ Sci & Technol Coll Informat Qingdao Peoples R China Qingdao Univ Sci & Technol Coll Elect Engn Qingdao Peoples R China
Considering the inefficiency of using traditional RSA algorithm in SSL protocol at E-Business area, a new E-commerce security scheme which the ECC is embed into SSL Protocol has been put forward, and the test has been... 详细信息
来源: 评论