咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
295 条 记 录,以下是281-290 订阅
排序:
Towards Security of Cyber-Physical Systems using Quantum Computing algorithms
Towards Security of Cyber-Physical Systems using Quantum Com...
收藏 引用
IEEE International Conference on System of Systems Engineering (SoSE)
作者: Deepak Tosh Oscar Galindo Vladik Kreinovich Olga Kosheleva Department of Computer Science University of Texas at El Paso El Paso TX USA Department of Teacher Education University of Texas at El Paso El Paso TX USA
For cyber-physical systems (CPS), ensuring process and data security is critically important since the corresponding infrastructure needs to have high operational efficiency with no downtime. There are many techniques... 详细信息
来源: 评论
Generalized Delayed Logistic Map Suitable For Pseudo-random Number Generation
Generalized Delayed Logistic Map Suitable For Pseudo-random ...
收藏 引用
International Conference on Science and Technology
作者: Samar M. Ismail Lobna A. Said Ahmed G. Radwan Ahmed H. Madian Mohamed F. Abu-ElYazeed Ahmed M. Soliman Faculty of IET German University in Cairo (GUC) Dept. of Engineering Mathematics and Physics Cairo University NISC Research Center Nile University Electronics and comm. Eng. Dept. Cairo University
This paper presents the generalization of a delayed version of the logistic map. The effect of the added two general parameters is studied, which offers the option of having three different maps. The dynamic behavior ... 详细信息
来源: 评论
Research on Attack and Defense of Android Mobile Screen Password
Research on Attack and Defense of Android Mobile Screen Pass...
收藏 引用
作者: Lei Wang School of information technology School of Jianqiao University
This paper mainly introduces the basic principle of screen graphics lock password and PIN password in Android system, and puts forward relevant protective measures, providing users with a better use of security experi... 详细信息
来源: 评论
The Research and Design of ATM PIN Pad Based on Triple DES
The Research and Design of ATM PIN Pad Based on Triple DES
收藏 引用
第八届IEEE信息与自动化国际会议(ICIC 2011)
作者: Wanping Wu Jianxun Jin Jun Cheng Center of Applied Superconductivity and Electrical Engin.University of Electronic Science and Techno Center of Applied Superconductivity and Electrical Engin.University of Electronic Science and Techno Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences.Shenzhen Guangdong ProvinceC
ATM(Automatic Teller Machine)PIN (personal identification number)pad is essential in *** present,DES (Data encryption Standard),RSA (public key encryption algorithm),DUKPT(Derived Unique Key per Transaction)etc encryp... 详细信息
来源: 评论
Extensive Medical Data Storage With Prominent Symmetric algorithms On Cloud - A Protected Framework
Extensive Medical Data Storage With Prominent Symmetric Algo...
收藏 引用
IEEE International Conference on Smart Structures and Systems
作者: G. Nalinipriya R. Aswiri Kumar Associate Professor Saveetha Engineering College Chennai India. PG Scholar Saveetha Engineering College Chennai India.
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life ... 详细信息
来源: 评论
Improving Security in Optical Networks with Random Forwarding and Parallel Transmission
Improving Security in Optical Networks with Random Forwardin...
收藏 引用
IEEE Global Communications Conference
作者: Anna Engelmann Siqian Zhao Admela Jukan Technische Universitat Carolo-Wilhelmina zu Braunschweig
We focus on the problem on security, and to an extent, privacy in optical networks, under the assumption that the wiretap attacker either gains knowledge about secret key and encryption algorithm, or is able to deciph... 详细信息
来源: 评论
Digital encrypt watermarking based on wavelet transform
Digital encrypt watermarking based on wavelet transform
收藏 引用
ICINS 2014 - 2014 International Conference on Information and Network Security
作者: Shibing Zhang Yanan Wu School of Electrical and Information Nantong University China
Watermarking encryption is an effective technique in the copyright protection of digital media. This paper focuses on the watermarking encryption and proposes a digital watermarking encryption algorithm which is based... 详细信息
来源: 评论
A Network Traffic Prediction Model Based on Recurrent Wavelet Neural Network
A Network Traffic Prediction Model Based on Recurrent Wavele...
收藏 引用
International Conference on Computer Science and Network Technology
作者: Kun Zhang Yinping Chai Xing-an Fu Department of Mathematics Chuxiong normal university
The network traffic prediction model is the foundation of network performance analysis and designing. The traditional traffic models have the weakness of low-level efficiency. The recurrent wavelet neural network (RWN... 详细信息
来源: 评论
Several security improvements of authentication solution based on Kerberos
Several security improvements of authentication solution bas...
收藏 引用
2017第二届亚太计算智能与信息技术学术会议 (APCIIT 2017)
作者: Nan Zhang Communication university of china
This paper is based on author's last paper:A lightweight authentication and authorization solution based on Kerberos(KLAS) [1]. In this paper,we pointed out some existing or potential security problems of KLAS,and... 详细信息
来源: 评论
E-REA Symmetric Key Cryptographic Technique
E-REA Symmetric Key Cryptographic Technique
收藏 引用
Emerging Trends in Information Technology and Engineering (ic-ETITE), Conference on
作者: B Dhanuja B. Prabadevi K Bhavani Shankari G. Sathiya School of Information Technology and Engineering Vellore Institute of Technology Vellore India
As the internet evolves and computer networks grow bigger and bigger every day, network security has become one of the most unsafe factors for the companies towards digital computations. Security is a major concern in... 详细信息
来源: 评论