咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是21-30 订阅
排序:
Enhancing Security of ADS-B Systems with encryption algorithm in the Smart Ocean
收藏 引用
JOURNAL OF COASTAL RESEARCH 2020年 第Spe105期000卷 181-184页
作者: Liu, Zixin Ling, Mingxing Zhu, Ting Xu, Deru He, Yueshun Liu, Zhifeng East China Univ Technol State Key Lab Nucl Resources & Environm Nanchang 330013 Jiangxi Peoples R China East China Univ Technol Nanchang 330000 Jiangxi Peoples R China East China Univ Technol Sch Earth Sci Nanchang 330000 Jiangxi Peoples R China East China Univ Technol Software Coll Nanchang 330000 Jiangxi Peoples R China
The smart ocean is an influencer concept incorporating digitalized associated ocean and seaboard cities. The construction of an omni-bearing smart ocean requires urban resilience, and the application of smart means ca... 详细信息
来源: 评论
Research on an optimised encryption algorithm for network information security communication
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS 2023年 第1期29卷 31-46页
作者: Li, Ju Chongqing Technol & Business Inst Chongqing 401520 Peoples R China
At present, one of the commonly used encryption algorithms is the block cipher AES method, while in the design, we often only consider the bounded attack opponent, but in the face of the needs of the development of ar... 详细信息
来源: 评论
Connection-oriented computer network secure communication and encryption algorithm
收藏 引用
INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS 2021年 第1-2期14卷 98-116页
作者: Wu, Bin Shengli Coll China Univ Petr Eberly Coll Sci Dongying 257061 Shandong Peoples R China
This paper studies the data encryption model and encryption method of the connection-oriented computer network communication system. Firstly, the application and security analysis of digital certificate and big intege... 详细信息
来源: 评论
Energy Consumptions Analysis for a Class of Symmetric encryption algorithm
Energy Consumptions Analysis for a Class of Symmetric Encryp...
收藏 引用
8th IEEE Radio and Wireless Symposium (RWS)
作者: Zibideh, Walid Y. Matalgah, Mustafa M. Qualcomm Technol Inc San Diego CA 92121 USA Univ Mississippi Dept Elect Engn University MS 38677 USA
Due to the increased demand on wireless devices and their applications, the necessity for efficient and secure encryption algorithms is critical. A secure encryption algorithm is considered energy efficient if it uses... 详细信息
来源: 评论
An Image encryption algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map  6th
An Image Encryption Algorithm Based on Zigzag Transformation...
收藏 引用
6th International Conference on Applications and Techniques in Information Security (ATIS)
作者: Li, Yuzhen Li, Xiaodong Jin, Xin Zhao, Geng Ge, Shiming Tian, Yulu Zhang, Xiaokun Zhang, Kejun Wang, Ziyi Beijing Elect Sci & Technol Inst Beijing 100070 Peoples R China GOCPCCC Key Lab Informat Secur Beijing 100070 Peoples R China Xidian Univ Xian 710071 Peoples R China Chinese Acad Sci Inst Informat Engn Beijing 100093 Peoples R China
An image encryption algorithm based on Zigzag transformation and 3-Dimension Logistic chaotic map by making use of the permutation-diffusion encryption structure is proposed. The algorithm consists of two parts: first... 详细信息
来源: 评论
Cryptanalysis of a chaos-based encryption algorithm for distributed systems
Cryptanalysis of a chaos-based encryption algorithm for dist...
收藏 引用
8th International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Caragata, Daniel Tabia, Karim Luduena, Mauricio Univ Tecn Federico Santa Maria Telemat Grp Dept Elect Engn Av Espana 1680 Valparaiso Chile Univ Artois Ctr Rech Informat Lens CNRS UMR 8188 Douai France
This paper analyses the security of a recently proposed chaos based cryptosystem. It shows that the cryptosystem under study has weak diffusion and presents a cryptanalysis that allows the attacker to decrypt any encr... 详细信息
来源: 评论
Pluggable encryption algorithm In Secure Shell(SSH) Protocol
Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol
收藏 引用
2nd International Conference on Emerging Trends in Engineering and Technology (ICETET09)
作者: Iyappan, P. Arvind, K. S. Geetha, N. Vanitha, S. Rajiv Gandhi Coll Engg & Technol Pondicherry India Dr Pauls Coll Engn Pondicherry India
System security is a crucial constraint for Secure Transfer of data. Because of the nature of the SSH Protocol, anyone with access to the central server can manipulate files, it is imperative that only authorized user... 详细信息
来源: 评论
Research on Computer Network Secure Communication and encryption algorithm Based on Deep Learning  3
Research on Computer Network Secure Communication and Encryp...
收藏 引用
3rd Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS)
作者: Lu, Yingfeng Liu, Haiyan Yuxi Normal Univ Yuxi 653100 Yunnan Peoples R China
With the development of computer network technology, online communication has become more and more important, and network complete technology has also become a measure to ensure reliable network communication. Under t... 详细信息
来源: 评论
Color Image encryption algorithm Based on Tangent-Delay Ellipse Reflecting Cavity Map System
Color Image Encryption Algorithm Based on Tangent-Delay Elli...
收藏 引用
4th International Conference on Image Analysis and Signal Processing (IASP)
作者: Zhang Kun Fu Xing-an Chuxiong Normal Univ Dept Math Chuxiong Yunnan Peoples R China
Chaotic encryption has presently become the focus of the information security field. The article presents the main theory of TD-ERCS, and proposes a new algorithm to improve the security of image encryption based on T... 详细信息
来源: 评论
Parallelization of encryption algorithm Based on Chaos System and Neural Networks  1
收藏 引用
10th International Conference on Parallel Processing and Applied Mathematics (PPAM)
作者: Burak, Dariusz West Pomeranian Univ Technol Fac Comp Sci & Informat Technol PL-71210 Szczecin Poland
In this paper, the results of parallelizing of encryption algorithm based on a chaos system and neural networks are presented. A data dependence analysis of loops was applied in order to parallelize the algorithm. The... 详细信息
来源: 评论