咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是261-270 订阅
排序:
A DEM Data Disguise algorithm Based on Matrix Transformation and Cryptographic algorithm
A DEM Data Disguise Algorithm Based on Matrix Transformation...
收藏 引用
International Congress on Image and Signal Processing
作者: Xuchong Liu Yong Luo College of information Science and Engineering Hunan University College of Science National University of Defense Technology
A disguise algorithm about DEM data is proposed in this paper, and it is based on matrix transformation and cryptographic algorithm. In this algorithm, a terrain is generated with a parametric surface, which is genera... 详细信息
来源: 评论
Electronic aircraft maintenance record signature technology based on SM2 cryptographic algorithm
Electronic aircraft maintenance record signature technology ...
收藏 引用
IEEE International Conference on Civil Aviation Safety and Information Technology (ICCASIT)
作者: Rui Liu Yingzhi Zou Xinfeng Chen Haitao Yang Division of Maintenance Engineering China Academy of Civil Aviation Science and Technology Beijing China China Academy of Civil Aviation Science and Technology Law Regulation and Standardization Institute Beijing China
The paperlessness of maintenance records is an inevitable trend in the development of civil aviation informationization. This paper proposes a method for the use of reliable electronic signatures for electronic record... 详细信息
来源: 评论
A New Method to Solve B/S Structure of Network Information Security
A New Method to Solve B/S Structure of Network Information S...
收藏 引用
2nd International Conference on Communication Technology(ICCT 2015)
作者: Jianning Yang Jiankun Yang Kun Lin Yunnan Normal University Business School Wuhua District Yunnan Normal University Business School Network Center Kunming branch of China Telecom Co.Ltd Dehong Vocational College
This paper introduces a new method to solve B/S structure of network information security, namely uses the session ID as the key to achieve encryption transmission and identity of fake sensitive information in the net... 详细信息
来源: 评论
Smart and simple method for encrypting and decrypting image based on crossover of GA
Smart and simple method for encrypting and decrypting image ...
收藏 引用
International Conference on Information Communication and Embedded Systems (ICICES)
作者: Gamil R.S. Qaid Alo Abdo M. Al-kubati Dept. of Computer Engineering Hodeidah University Hodeidah City - Yeman Dept. of Informatics Systems Community College Bisha University Bisha City-KSA
The current age is called the age of information technology. The security of transmitting and storing this information are facing a huge challenge. Traditional and classical methods are not suitabel to protect this in... 详细信息
来源: 评论
A Low Cost High Performance Polynomial Multiplier Design For FPGA Implementation
A Low Cost High Performance Polynomial Multiplier Design For...
收藏 引用
International Conference on Electronics Technology (ICET)
作者: Liejun Ma Xingjun Wu Guoqiang Bai Institute of Microelectronics Tsinghua University Beijing China
In the last few years, with the fleeting progress of quantum computer the traditional encryption technology is being threatened. Lattice based cryptography is a new post quantum cryptography which has been proved the ... 详细信息
来源: 评论
A Survey on Hardware Implementation of Cryptographic algorithms Using Field Programmable Gate Array
A Survey on Hardware Implementation of Cryptographic Algorit...
收藏 引用
International Conference on Communication Systems and Network Technologies (CSNT)
作者: Keshav Kumar K.R. Ramkumar Amanpreet Kaur Somanshu Choudhary Chitkara University Institute of Engineering and TechnologyChitkara University Punjab India
In the past recent years the idea towards secure data communication is increasing day by day. The secure communication is being achieved by applying various cryptographic algorithms on the data which is to be transfer... 详细信息
来源: 评论
Analyzing Energy and Time Overhead of Security Mechanisms in Wireless Sensor Networks
Analyzing Energy and Time Overhead of Security Mechanisms in...
收藏 引用
International Conference on Systems, Signals and Image Processing
作者: P. Trakadas T. Zahariadis H. C. Leligou S. Voliotis K. Papadopoulos Dept. of Electrical Engineering TEI of Chalkis Psahna Chalkis Greece
The primary requirements of a successful Wireless Sensor Network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash funct... 详细信息
来源: 评论
Several security improvements of authentication solution based on Kerberos
Several security improvements of authentication solution bas...
收藏 引用
2017 Asia-Pacific Computational Intelligence and Information Technology Conference
作者: Nan Zhang Communication university of china
This paper is based on author's last paper:A lightweight authentication and authorization solution based on Kerberos(KLAS) [1].In this paper,we pointed out some existing or potential security problems of KLAS,and ... 详细信息
来源: 评论
Cryptography using Artificial Intelligence
Cryptography using Artificial Intelligence
收藏 引用
International Joint Conference on Neural Networks
作者: Jonathan Blackledge Sergei Bezobrazov Paul Tobin School of Mathematics Statistics and Computer Science University of KwaZulu-Natal Durban South Africa Intelligent In formation Technologies Department Brest State Technical University Brest Belarus School of Electrical and Electronic Engineering Dublin Institute of Technology Dublin Ireland
This paper presents and discusses a method of generating encryption algorithms using neural networks and evolutionary computing. Based on the application of natural noise sources obtained from data that can include at... 详细信息
来源: 评论
Performance Evaluation for DES and AES algorithms-An Comprehensive Overview
Performance Evaluation for DES and AES Algorithms-An Compreh...
收藏 引用
IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology
作者: Sriperumbuduru Srilaya Sirisha velampalli Department of computer science CR RAO AIMSCS University of Hyderabad
Now-a-days there is fast evolution of internet and network applications so information security is very much important for secure transmission of data over an electronic way. Cryptography plays a very important role i... 详细信息
来源: 评论