咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 385 篇 encryption algor...
  • 16 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 encryption
  • 4 篇 aes
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish
  • 2 篇 parallel process...

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...
  • 2 篇 quan cheng labor...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 304 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
385 条 记 录,以下是101-110 订阅
排序:
A Survey of Blind Sorting Techniques: Approaches Using Fully Homomorphic encryption  15
A Survey of Blind Sorting Techniques: Approaches Using Fully...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Kim, Seunghu Son, Yongseok Paek, Jeongyeup Cho, Sungrae Lee, Hyung Tae School of Computer Science and Engineering Chung-Ang University Seoul Korea Republic of
With recent advancements in cloud services, the demand for data security during outsourced computations has been increasing. Fully Homomorphic encryption (FHE) offers a promising solution to this demand by enabling th... 详细信息
来源: 评论
Comparison of encryption Time for Multi-level Authentication in Cloud using Lightweight Cryptography Method over Chipper Text-PolicyAttribute Based encryption Algorithm  15
Comparison of Encryption Time for Multi-level Authentication...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Reddy, Peram Venkata Krishna Teja Thangaraj, S. John Justin Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Dept of CSE Chennai India
In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography strategy for secure cloud data sharing. Tools and Methods... 详细信息
来源: 评论
Use of Russian standardized crypto algorithms in QUIC
收藏 引用
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2025年 第1期21卷 1-7页
作者: Smyslov, Valery JSC ELVIS PLUS Moscow Russia
This article evaluates the possibility of using Russian Standardized Crypto algorithms (also known as GOST algorithms) in the QUIC transport protocol. The conclusion is that it is generally feasible to use these algor... 详细信息
来源: 评论
A Method for Optimal Value Measurement of Some Parameters of Fault Attacks on Cryptographic algorithms
收藏 引用
Journal of Applied and Industrial Mathematics 2024年 第2期18卷 371-377页
作者: Zuev, Yu. A. Klyucharev, P.G. Bauman Moscow State Technical University Moscow105005 Russia
Abstract: This paper is devoted to the construction of a time-optimal method for measuring themaximum permissible (critical) value of the supply voltage (as well as other parameters) of thedevice on which the cryptogr... 详细信息
来源: 评论
THE INCOME ALLOCATION MECHANISM OF TRUSTED "DUAL CONTRIBUTION" DATA ASSETS BASED ON BLOCKCHAIN TECHNOLOGY
收藏 引用
Scalable Computing 2025年 第2期26卷 757-765页
作者: CHEN, QIANHUI DING, WEIBIN SHEN, HUAQIANG State Grid Zhejiang Electric Power Investment & Operation Co. Ltd. ZheJiang HangZhou310007 China State Grid ZheJiang Electric Power Co. Ltd. ZheJiang HangZhou310007 China State Grid ZheJiang Electric Power Co. Ltd. JiaXing Electric Power Supply Company ZheJiang JiaXing314033 China
In order to solve the problem of researching the distribution of returns on trustworthy "dual contribution" data assets, the authors propose a research on the distribution mechanism of returns on trustworthy... 详细信息
来源: 评论
An Interpolated Quantized Guard Band Algorithm for Physical Layer Key Generation
收藏 引用
Intelligent and Converged Networks 2025年 第1期6卷 102-114页
作者: An, Yongli Zha, Kun Song, Wenfeng Ji, Zhanlin College of Artificial Intelligence North China University of Science and Technology Tangshan063210 China
With the continuous progress of communication technology, traditional encryption algorithms cannot meet the demands of modern wireless communication security. Secure communication based on physical layer encryption em... 详细信息
来源: 评论
Application of Image Security Transmission encryption Algorithm Based on Chaos Algorithm in Networking Systems of Artificial Intelligence  3
Application of Image Security Transmission Encryption Algori...
收藏 引用
3rd International Conference on Networking Systems of AI, INSAI 2023
作者: Tian, Hongmei Yuan, Zhijie Zhou, Jiao He, Rui Xi'An University of Technology Xi'an China China Coal Technology & Engineering Group Xian Research Institute Xi'an China
This study focuses on enhancing the security of image transmission in Networking Systems of Artificial Intelligence (NSAI) by implementing an advanced encryption algorithm (AEA) based on chaotic algorithms. The resear... 详细信息
来源: 评论
An Image Scrambling encryption Algorithm Based on Combinatorial Chaos Mapping
An Image Scrambling Encryption Algorithm Based on Combinator...
收藏 引用
2023 International Conference on Evolutionary algorithms and Soft Computing Techniques, EASCT 2023
作者: Luo, Yuan Zhou, Ying Hou, Yongxu Ye, Jun School of Cyberspace Security Hainan University Key Laboratory of Internet Information Retrieval of Hainan Province Haikou China
With the development and application of network technology, digital images, as a form of information transmission, are at high risk of being stolen or decrypted. Our scheme utilizes the nature of low dimensional chaos... 详细信息
来源: 评论
Unbounded ABE for Circuits from LWE, Revisited  30th
Unbounded ABE for Circuits from LWE, Revisited
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Cini, Valerio Wee, Hoeteck NTT Res Sunnyvale CA 94085 USA
We introduce new lattice-based techniques for building ABE for circuits with unbounded attribute length based on the LWE assumption, improving upon the previous constructions of Brakerski and Vaikuntanathan (CRYPTO 16... 详细信息
来源: 评论
An Algorithmic Approach to (2,2)-Isogenies in the Theta Model and Applications to Isogeny-Based Cryptography  30th
An Algorithmic Approach to (2,2)-Isogenies in the Theta Mode...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Dartois, Pierrick Maino, Luciano Pope, Giacomo Robert, Damien Univ Bordeaux CNRS UMR 5251 IMBBordeaux INP Bordeaux France INRIA IMB UMR 5251 F-33400 Talence France Univ Bristol Bristol Avon England NCC Grp Cheltenham Glos England
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of elliptic curves in the theta model. The description of the algorithm is split into various subroutines to allow for a p... 详细信息
来源: 评论