咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是41-50 订阅
排序:
Parallelization of an encryption algorithm Based on a Spatiotemporal Chaotic System and a Chaotic Neural Network  15
Parallelization of an Encryption Algorithm Based on a Spatio...
收藏 引用
15th Annual International Conference on Computational Science (ICCS)
作者: Burak, Dariusz West Pomeranian Univ Technol Szczecin West Pomerania Poland
In this paper the results of parallelizing a block cipher based on a spatiotemporal chaotic system and a chaotic neural network are presented. A data dependence analysis of loops was applied in order to parallelize th... 详细信息
来源: 评论
Performance comparison between TEA and Rijndael encryption algorithm for wireless sensor networks  15
Performance comparison between TEA and Rijndael encryption a...
收藏 引用
15th International Conference on Computer Applications in Industry and Engineering (CAINE-2002)
作者: Kanamori, Y Jovanov, E Yoo, SM Univ Alabama Dept Elect & Comp Engn Huntsville AL 35899 USA
Wireless sensor networking is an emerging technology having a wide range of potential applications. Since most wireless sensors have significantly limited memory capacity and power consumption, we need to implement fa... 详细信息
来源: 评论
Simple encryption algorithm with Improved Performance in Wireless Communications
Simple Encryption Algorithm with Improved Performance in Wir...
收藏 引用
IEEE Radio and Wireless Symposium (RWS)
作者: Matalgah, Mustafa M. Magableh, Amer M. Univ Mississippi Radio & Wireless Dept Elect Engn University MS 38677 USA Jordan Univ Sci & Technol Dept Elect Engn Irbid Jordan
In this paper, inspired by network coding theory we propose an efficient hybrid encryption-coding algorithm that requires using traditional encryption only for the first small amount of data. This amount of data, whic... 详细信息
来源: 评论
Research and Realization of Random encryption algorithm
Research and Realization of Random Encryption Algorithm
收藏 引用
International Conference on Internet Computing in Science and Engineering
作者: Gao Wei Zhang Guoyin Li Yanmei Chen Weihua Harbin Engn Univ Coll Comp Sci & Technol Harbin 150001 Peoples R China
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true rand... 详细信息
来源: 评论
Blockchain encryption algorithm Based on Aggregated Signature  3
Blockchain Encryption Algorithm Based on Aggregated Signatur...
收藏 引用
2023 IEEE 3rd International Conference on Data Science and Computer Application, ICDSCA 2023
作者: Li, Guangye Ou, Chuang Xi'an Jiaotong-Liverpool University Suzhou China Central South University Changsha China
As the concept of blockchain continues to the hype, an increasing number of industries join the ranks of using blockchain, which also leads to privacy leaks becoming a potential hidden danger. Therefore, more secure a... 详细信息
来源: 评论
CRH Public encryption - the Study on High Intensity Data encryption algorithm
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2000年 第1期7卷 51-55页
作者: LIN Zi, XU Yong, LI Kui-jun (Department of Telecommunication Engineering, Changchun Institute of Posts and Telecommunications, Changchun 130012, P.R. China) Department of Telecommunication Engineering Changchun Institute of Posts and Telecommunications Changchun 130012 P.R. China
Encrypted Communication technique is an important measure to the information safety. Based on the advantages of two public encryption algorithm RSA & DES, a novel high intensity public encryption algorithm Chaos ... 详细信息
来源: 评论
Secure Transmission Method of Power Quality Data in Power Internet of Things Based on the encryption algorithm
收藏 引用
INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING 2023年 第1期19卷 1页
作者: Liu, Xin Chang, Yingxian Yao, Honglei Su, Bing State Grid Shandong Elect Power Res Inst Jinan Peoples R China State Grid Shandong Elect Power Co Jinan Peoples R China
As a new mobile communication technology in the era of the internet of things, 5G is characterized by high speed, low delay, and large connection. It is a network infrastructure to realize human-computer and internet ... 详细信息
来源: 评论
A novel image encryption algorithm based on DNA strand exchange and diffusion
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2022年 430卷
作者: Zou, Chengye Wang, Xingyuan Zhou, Changjun Xu, Shujuan Huang, Chun Anyang Normal Univ Sch Math & Stat Anyang 455000 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China Zhejiang Normal Univ Coll Math & Comp Sci Jinhua 321000 Zhejiang Peoples R China Dalian Minzu Univ Inst Machine Intelligence & Biol Comp Dalian 116600 Liaoning Peoples R China Zhengzhou Univ Light Ind Coll Elect & Elect Engn Zhengzhou 450002 Peoples R China
This article proposes an improved tent-dynamic cross coupled map lattice, which has superior ergodicity, broader chaotic range and higher information entropies than cross coupled map lattice and tent-dynamic cross cou... 详细信息
来源: 评论
A new discrete chaotic map application in image encryption algorithm
收藏 引用
PHYSICA SCRIPTA 2022年 第3期97卷 035202-035202页
作者: Yang, Feifei An, Xinlei Xiong, Li Lanzhou Univ Technol Coll Elect & Informat Engn Lanzhou 730050 Peoples R China Lanzhou Jiaotong Univ Sch Math & Phys Lanzhou 730070 Peoples R China Hexi Univ Sch Phys & Electromech Engn Zhangye 734000 Peoples R China
In this work, a new discrete chaotic map is developed from the 1D ICMIC (Iterative Map with Infinite Collapses) to control the 2D Henon map. The performances of the proposed discrete map are evaluated by using the pha... 详细信息
来源: 评论
Digital Image encryption algorithm Design Based on Genetic Hyperchaos
收藏 引用
INTERNATIONAL JOURNAL OF OPTICS 2016年 第1期2016卷 2053724-1-2053724-14页
作者: Wang, Jian Yanshan Univ Grad Sch Qinhuangdao 066004 Peoples R China Yanshan Univ Sch Informat Sci & Engn Qinhuangdao 066004 Peoples R China First Hosp Qinhuangdao Qinhuangdao 066000 Peoples R China
In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext) attack in the process of pixel position scrambling), we put forward a image enc... 详细信息
来源: 评论