咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是271-280 订阅
排序:
Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing
Efficient Secure Outsourcing Computation of Matrix Multiplic...
收藏 引用
IEEE Global Communications Conference
作者: Shenmin Zhang Hongwei Li Kun Jia Yunshun Dai Lian Zhao Sch. of Comput. Sci. & Eng. Univ. of Electron. Sci. & Technol. of China Chengdu China Dept. of Electr. & Comput. Engineeirng Ryerson Univ. Toronto ON Canada
With development of outsourcing computation, it is possible for clients with limited computing resources to outsource heavy computational tasks to the cloud server and thus relieve huge burden of the client. As contin... 详细信息
来源: 评论
Linear Cryptanalysis Against Block Ciphered System Under Noisy Ciphertexts
Linear Cryptanalysis Against Block Ciphered System Under Noi...
收藏 引用
IEEE Global Communications Conference
作者: Yahya S. Khiabani Shuangqing Wei Jian Yuan Jian Wang School of Electrical Engineering and Computer Science Louisiana State University (LSU) Department of Electronic Engineering Tsinghua University
In this paper, we study the effect of channel errors on the performance of linear cryptanalysis against block ciphered system. We study DES block cipher working in cipher feedback mode (CFB) as a special case. In our ... 详细信息
来源: 评论
Sport Wearable Biometric Data Encrypted Emulation and Storage in Cloud
Sport Wearable Biometric Data Encrypted Emulation and Storag...
收藏 引用
IEEE Canadian Conference on Electrical and Computer Engineering
作者: Nick Mcdonald Daniel Atkinson Youry Khmelevsky Scott McMillan Computer Science Okanagan College Kelowna BC Canada XCo Tech Inc. Penticton BC Canada
We investigated different encryption algorithms for sport wearable devices by utilizing a newly developed data generator for the testing purposes. Additionally we investigated different data encryption algorithms for ... 详细信息
来源: 评论
A Smaller and Faster Variant of RSM  14
A Smaller and Faster Variant of RSM
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Noritaka Yamashita Kazuhiko Minematsu Toshihiko Okamura Yukiyasu Tsunoo NEC Corporation Nakahara-Ku Kawasaki Kanagawa Japan
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be... 详细信息
来源: 评论
The security analysis of PhpBB forum
The security analysis of PhpBB forum
收藏 引用
International Conference on Cyberspace Technology (CCT 2014)
作者: Lijun Zhang Jia Fan Science and Technology on Communication Security Laboratory ChengDu China
PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including p... 详细信息
来源: 评论
A Contemplator on Reversible Data Hiding in Encrypted Domain
A Contemplator on Reversible Data Hiding in Encrypted Domain
收藏 引用
Emerging Trends in Communication, Control and Computing (ICONC3), International Conference on
作者: Subarna Sen Anirban Mukherjee Jayanta Mondal Anil Saroliya Information technology MAKAUT West Bengal India Information Technology RCCIIT Kolkata India Computer Science and Engineering School of Engineering and Technology Mody University of Science and Technology Lakshmangarh India
Reversible Data Hiding (RDH) has proved itself to be the best technique for providing security to sensitive datasets. RDH provides confidentiality, preserves privacy of secret and personal data and ensures reversibili... 详细信息
来源: 评论
IC-Card Reader Antenna and IC-Card Technology's Analysis by Wireless Communications
IC-Card Reader Antenna and IC-Card Technology's Analysis by ...
收藏 引用
European Conference on Antennas and Propagation
作者: Donghun Yoon Keio University of Japan
This paper describes wireless communications study for IC-Card Reader Antenna and IC-Card technology. IC-Card is plastic card with embedded micro circuit. It is embedded induction coil and condenser. IC-Card is a pass... 详细信息
来源: 评论
Secure Fuzzy Recognition and its General Problems
Secure Fuzzy Recognition and its General Problems
收藏 引用
2002年安全与科学技术国际会议
作者: LI Yong & SHI Kaiquan ( School of Mathematics and System Science, Shandong University, Jinan 250100, China ) and HU Haiqing ( School of Control Science and Engineering, Shandong University, Jinan 250061, China )
The paper is a term of research in which fuzzy recognition theory, information encryption theory and encryption technique are mutually engrafted. encryption of fuzzy recognition and its general concept are introduced ... 详细信息
来源: 评论
Information Leakage in Encrypted IP Video Traffic
Information Leakage in Encrypted IP Video Traffic
收藏 引用
IEEE Global Communications Conference
作者: Chris Wampler Selcuk Uluagac Raheem Beyah School of Electrical and Computer Engineering Georgia Institute of Technology Electrical and Computer Engineering Department Florida International University
Voice chat and conferencing services may be assumed to be private and secure because of strong encryption algorithms applied to the video stream. We show that information leakage is occurring in video over IP traffic,... 详细信息
来源: 评论
Efficient FPGA-Based Reconfigurable Accelerators for SIMON Cryptographic algorithm on Embedded Platforms
Efficient FPGA-Based Reconfigurable Accelerators for SIMON C...
收藏 引用
International Conference on Reconfigurable Computing and FPGAs (ReConFig)
作者: Arkan Alkamil Darshika G. Perera University of Colorado Colorado Springs Colorado USA
With the advancement of embedded computing, many applications are becoming common on these devices, which have stringent constraints and requirements. FPGA-based systems are currently the most promising avenue to supp... 详细信息
来源: 评论