咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是31-40 订阅
排序:
Efficient Privacy of Message encryption algorithm for Anonymous Receivers in E-commerce
Efficient Privacy of Message Encryption Algorithm for Anonym...
收藏 引用
2nd International Conference on Biomedical Engineering and Informatics (BMEI)
作者: Xu Xiang-yang Changsha Univ Dept Comp Sci & Technol Country Changsha Peoples R China
Protecting the privacy of message receivers is an important issue in pay services of e-commerce and the distribution of digital contents on the Internet. This paper proposes an efficient privacy of message encryption ... 详细信息
来源: 评论
An encryption algorithm to Prevent Domain Name System Cache Poisoning Attacks  29
An Encryption Algorithm to Prevent Domain Name System Cache ...
收藏 引用
29th International Telecommunication Networks and Applications Conference (ITNAC)
作者: Li, Xue Jun Ma, Maode Arjun, Narayanan Auckland Univ Technol Dept EEE Auckland New Zealand Nanyang Technol Univ Sch EEE Singapore Singapore
One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many secu... 详细信息
来源: 评论
A Study of DES and Blowfish encryption algorithm
A Study of DES and Blowfish Encryption Algorithm
收藏 引用
IEEE Region 10 Conference 2009
作者: Nie, Tingyuan Zhang, Teng Qingdao Technol Univ Commun & Elect Engn Inst Qingdao Peoples R China
With the rapid growing of internet and networks applications, data security becomes more important than ever before. encryption algorithms play a crucial role in information security systems. In this paper, we have a ... 详细信息
来源: 评论
Analysis of the Effect of a Color Image encryption algorithm  3rd
Analysis of the Effect of a Color Image Encryption Algorithm
收藏 引用
3rd International Conference on Electrical Engineering and Information Technologies for Rail Transportation (EITRT)
作者: Guo, Yukun Hexi Univ Coll Informat Technol & Commun 846 Beihuan Rd Zhangye Gansu Peoples R China
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great devel... 详细信息
来源: 评论
Calculation of encryption algorithm Combination for Video encryption using Two Layers of AHP  10
Calculation of Encryption Algorithm Combination for Video En...
收藏 引用
10th International Conference on Telecommunication Systems Services and Applications (TSSA)
作者: Mustafa, Alvin Hendrawan Bandung Inst Technol Sch Elect Engn & Informat Bandung Indonesia
Nowadays, many algorithms in cryptography area has been developed. Choosing the appropriate algorithm and dealing with its tradeoff, require a specific analysis. One of the examples is calculating the optimum encrypti... 详细信息
来源: 评论
Research on the Mobile Security encryption algorithm for Manufacturing Execution System  5
Research on the Mobile Security Encryption Algorithm for Man...
收藏 引用
IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
作者: Pan Fucheng Hu Guoliang Univ Chinese Acad Sci Beijing Peoples R China Chinese Acad Sci Shenyang Inst Automat Shenyang Peoples R China Chinese Acad Sci Shenyang Inst Automat Dept Digital Factory Shenyang Peoples R China
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution... 详细信息
来源: 评论
A Fingerprint Featured Data encryption algorithm  7
A Fingerprint Featured Data Encryption Algorithm
收藏 引用
7th International Conference on Information and Communication Systems (ICICS)
作者: Al-Qassas, Raad S. Qasaimeh, Malik Al-Nouri, Hassan Princess Sumaya Univ Technol Dept Comp Sci Amman Jordan Princess Sumaya Univ Technol Dept Software Engn Amman Jordan New Horizons Comp Training Ctr Amman Jordan
In this paper, we propose a new DES variant named Hashed Data encryption Standard (or HDES for short), with an objective to enhance the limitation of static S-boxes arrangement in DES. The proposed HDES combines sever... 详细信息
来源: 评论
A Systematic encryption algorithm for Knapsack Scheme Using Random Sequence
A Systematic Encryption Algorithm for Knapsack Scheme Using ...
收藏 引用
7th International Conference on Computing and Convergence Technology (ICCCT)
作者: Hamasho, Shinsuke Murakami, Yasuyuki Kasahara, Masao Osaka Electrocommun Univ Neyagawa Osaka 572 Japan Osaka Gakuin Univ Osaka Japan
Authors, formerly, proposed a new knapsack cryptosystem which uses a random sequence as its secret key. In this paper we first propose a systematic encryption algorithm for this cryptosystem. We then evaluate the amou... 详细信息
来源: 评论
A Novel encryption algorithm Usted for Power Emergency Communication System  4
A Novel Encryption Algorithm Usted for Power Emergency Commu...
收藏 引用
4th IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)
作者: Cheng, Xiaowei Liu, Chao Qu, Qian Xiao, Bo Li, Wenhui Yuan, Bingyu Qiu, Yinghui China Gansu Elect Power Co Informat & Telecommun State Grid Corp Lanzhou Gansu Peoples R China North China Elect Power Univ Sch Elect & Elect Engn Beijing Peoples R China
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication h... 详细信息
来源: 评论
A New Symmetric Key encryption algorithm With Higher Performance  2
A New Symmetric Key Encryption Algorithm With Higher Perform...
收藏 引用
2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
作者: Murtaza, Abid Pirzada, Syed Jahanzeb Hussain Liu Jianwei Beihang Univ BUAA Sch Elect & Informat Engn Beijing Peoples R China
In this era of information technology, information security is a major concern. To address the challenges of data security, cryptography is used for storage as well as for the communication of data. A cryptographic al... 详细信息
来源: 评论