咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是51-60 订阅
排序:
Parallelization of an encryption algorithm Based on a Spatiotemporal Chaotic System and a Chaotic Neural Network
收藏 引用
Procedia Computer Science 2015年 51卷 2888-2892页
作者: Dariusz Burak West Pomeranian University of Technology Szczecin West Pomerania Poland
In this paper the results of parallelizing a block cipher based on a spatiotemporal chaotic system and a chaotic neural network are presented. A data dependence analysis of loops was applied in order to parallelize th... 详细信息
来源: 评论
Image encryption algorithm based on reversible information hiding and physical chaos in images
收藏 引用
RESULTS IN PHYSICS 2023年 54卷
作者: Liu, Pengcheng Shaoxing Univ Yuanpei Coll Shaoxing 312000 Zhejiang Peoples R China
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and ... 详细信息
来源: 评论
Enhancing Data Security of iOS Client by encryption algorithm
Enhancing Data Security of iOS Client by Encryption Algorith...
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Yuli Shen Hong Wang School of Information Engineering Wuhan University of Technology
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or laptop
来源: 评论
Energy consumption research of AES encryption algorithm in ZigBee
Energy consumption research of AES encryption algorithm in Z...
收藏 引用
International Conference on Cyberspace Technology (CCT 2014)
作者: Fang Rao Jianjun Tan School of Information Engineering Hubei MinZu University Enshi 445000 China
This paper applies IAR to simulate the improved AES algorithm and compares with the standard AES algorithm, to demonstrate the fact that improved AES algorithm can not only reduce the code size, but also reduce the ov... 详细信息
来源: 评论
GPU Random Numbers via the Tiny encryption algorithm  10
GPU Random Numbers via the Tiny Encryption Algorithm
收藏 引用
Conference on High-performance Graphics
作者: Fahad Zafar Marc Olano Aaron Curtis University of Maryland Baltimore County
Random numbers are extensively used on the GPU. As more computation is ported to the GPU, it can no longer be treated as rendering hardware alone. Random number generators (RNG) are expected to cater general purpose a... 详细信息
来源: 评论
Research on the Mobile Security encryption algorithm for Manufacturing Execution System
Research on the Mobile Security Encryption Algorithm for Man...
收藏 引用
IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems
作者: Pan Fucheng Hu Guoliang Shenyang Institute of Automation Chinese Academy of Sciences Department of Digital Factory Shenyang Institute of AutomationChinese Academy of Sciences
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution... 详细信息
来源: 评论
The development of tiny encryption algorithm (TEA) crypto-core for mobile systems
The development of tiny encryption algorithm (TEA) crypto-co...
收藏 引用
International Conference on Electronic Devices, Systems and Applications (ICEDSA)
作者: Stephanie Ang Yee Hunn Siti Zarina binti Md. Naziri Norina binti Idris School of Microelectronic Engineering Universiti Malaysia Perlis Arau Perlis Malaysia
In this paper, a cryptographic algorithm design called Tiny encryption algorithm (TEA) is proposed in order to minimize the memory footprint and maximize the speed. The design was targeted for embedded and mobile syst... 详细信息
来源: 评论
Improve the Privacy of AES encryption algorithm in Cloud Computing
Improve the Privacy of AES Encryption Algorithm in Cloud Com...
收藏 引用
2019 4th International Workshop on Materials Engineering and Computer Sciences(IWMECS 2019)
作者: Heng Wang Xinrui Chen School of Electronics and Information Engineering Jingchu University of Technology
This article through to the symmetrical secret key and asymmetric contrast and secret key system requirements analysis identified on the basis of AES encryption mode choice,in describing the AES encryption principle i... 详细信息
来源: 评论
Image encryption algorithm Based on A New Combined Chaotic System
Image Encryption Algorithm Based on A New Combined Chaotic S...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: C. L. Philip Chen Tong Zhang Yicong Zhou Department of Computer and information science University of Macau Department of computer and information science University of Macau
Chaotic theory has been applied to image encryption as an effective and robust technique due to its unique properties. In this paper, we introduce a new combined chaotic system, which shows better chaotic behaviors th... 详细信息
来源: 评论
Adopting Tiny encryption algorithm for Patient Healthcare Record on Smart Card
Adopting Tiny Encryption Algorithm for Patient Healthcare Re...
收藏 引用
International Conference of Computer Science and Information Technology
作者: Muhammad Rizki Adiwiganda Endro Ariyanto Rahmat Yasirandi Novian Anggis Suwastika Yoso Adi Setyoko School of Computing Telkom University Bandung Indonesia Industrial and Informatics Faculty Telkom Institute of Technology Purwokerto Indonesia
Smart Card is something that is used for data transactions quickly and practically. The definition of ”smart” is when a card has a chip implanted. The card is very helpful in the authentication and administration pr... 详细信息
来源: 评论