咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 116 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 155 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 293 篇 encryption algor...
  • 79 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 image
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 decryption
  • 9 篇 algorithms
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 security level

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 279 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=encryption algorithm"
293 条 记 录,以下是71-80 订阅
排序:
encryption algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2022年 第8期13卷 64-76页
作者: Alnasser, Sulaiman Alsaqour, Raed Saudi Elect Univ Coll Comp & Informat Dept Informat Technol Riyadh 93499 Saudi Arabia
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man... 详细信息
来源: 评论
Privacy protection technology in e-commerce based on dilated convolution network model
收藏 引用
JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2025年 第1期25卷 54-66页
作者: Huang, Furong Shaoxing Univ Shangyu Coll Room 504Bldg 10Baiguan St Shaoxing 312300 Zhejiang Peoples R China
This paper aims to investigate and advance the privacy protection techniques within the e-commerce domain by leveraging the dilated convolutional network (DCN) model. It endeavors to elevate the safeguarding of user d... 详细信息
来源: 评论
Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第13期82卷 20537-20551页
作者: Adeniyi, A. E. Abiodun, K. M. Awotunde, J. B. Olagunju, M. Ojo, O. S. Edet, N. P. Precious Cornerstone Univ Dept Comp Sci Ibadan Oyo State Nigeria Landmark Univ SDG 4 Qual Educ Grp Omu Aran Nigeria Landmark Univ SDG 9 Ind Innovat & Infrastruct Res Grp Omu Aran Nigeria Landmark Univ Dept Comp Sci Omu Aran Kwara State Nigeria Univ Ilorin Dept Comp Sci Ilorin Kwara State Nigeria Fed Univ Oye Ekiti Dept Comp Sci Oye Ekiti State Nigeria Ajayi Crowther Univ Dept Comp Sci Oyo Nigeria
The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an ina... 详细信息
来源: 评论
encryption of accounting data using DES algorithm in computing environment
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020年 第4期39卷 5085-5095页
作者: Wu, Yanhong Dai, Xiuqing Guangdong Ocean Univ Coll Management Cunjin Coll Zhanjiang 524094 Guangdong Peoples R China
The more and more developed network has caused more and more impact on people's life and work, providing convenient channels for people's information exchange, and then improving people's living and workin... 详细信息
来源: 评论
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2020年 第3期16卷 1-10页
作者: Li, Yuanming Guo, Wei Meng, Xuejun Xia, Wen State Key Lab Astronaut Dynam Xian 710043 Shaanxi Peoples R China China Xian Satellite Control Ctr Xian Shaanxi Peoples R China
With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life... 详细信息
来源: 评论
A COMPUTER PACKAGE FOR MEASURING THE STRENGTH OF encryption algorithmS
收藏 引用
COMPUTERS & SECURITY 1994年 第8期13卷 687-697页
作者: GUSTAFSON, H DAWSON, E NIELSEN, L CAELLI, W QUEENSLAND UNIV TECHNOL FAC INFORMAT TECHNOLINFORMAT SEC RES CTRBRISBANEQLD 4001AUSTRALIA
Designers and users of encryption algorithms used in cipher systems need a systematic approach in examining their ciphers prior to use, to ensure that they are safe from crypt-analytic attack. This paper describes a c... 详细信息
来源: 评论
Analysis of some recently proposed chaos-based encryption algorithms
收藏 引用
PHYSICS LETTERS A 2001年 第6期291卷 381-384页
作者: Jakimoski, G Kocarev, L Univ Calif San Diego Inst Nonlinear Sci La Jolla CA 92093 USA
We analyze the security and performance of two recently proposed encryption algorithms designed using deterministic chaotic dynamical systems. The analysis shows not only that the encryption rates of these algorithms ... 详细信息
来源: 评论
Efficient Video encryption using Lightweight Cryptography algorithm  3
Efficient Video Encryption using Lightweight Cryptography Al...
收藏 引用
3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)
作者: Hussain, Syed Saiq Ibrahim, Muhammad Sohail Mir, Syed Zain Yasin, Sajid Majeed, Muhammad Kashif Ghani, Azfar Iqra Univ FEST Karachi Pakistan
The natural redundancy in video data due to its spatio-temporal correlation of neighbouring pixels require highly complex encryption process to successfully cipher the data. Conventional encryption methods are based o... 详细信息
来源: 评论
Study on algorithm for Grid Subdivision and encryption Based on Technology of Three Dimensional Geological Modeling
Study on Algorithm for Grid Subdivision and Encryption Based...
收藏 引用
2nd International Conference on Measurement, Instrumentation and Automation (ICMIA 2013)
作者: He, Wei Wu, Wenli Chinese Acad Geol Sci Inst Geophys & Geochem Explorat Langfang 065000 Hebei Peoples R China
To achieve 3D grid models which have a non-uniform size and varying properties, we proposed the algorithm of grid subdivision and encryption by human-computer interaction. This algorithm was the technology based on 3D... 详细信息
来源: 评论
Evaluating the Security of Logic encryption algorithms
Evaluating the Security of Logic Encryption Algorithms
收藏 引用
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
作者: Subramanyan, Pramod Ray, Sayak Malik, Sharad Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is logic enc... 详细信息
来源: 评论