咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是121-130 订阅
排序:
The Secure UAV Communication Link Based on OTP encryption Technique  11
The Secure UAV Communication Link Based on OTP Encryption Te...
收藏 引用
11th International Conference on Ubiquitous and Future Networks (ICUFN)
作者: Atoev, Sukhrob Kwon, Oh-Jun Kim, Chee-Yong Lee, Suk-Hwan Choi, Young-Rak Kwon, Ki-Ryong Pukyong Natl Univ Dept IT Convergence & Applicat Engn Busan South Korea Dong Eui Univ Dept Comp Software Engn Busan South Korea Dong Eui Univ Game Animat Engn Busan South Korea Tongmyong Univ Dept Informat Secur Busan South Korea A&C Co Seoul South Korea
The demand on the security and reliability of the communication and data link of unmanned aerial vehicle (UAV) is much higher since the environment of the modern battlefield is becoming more and more complex. Since th... 详细信息
来源: 评论
Efficient Identity-Based encryption with Minimal Server Trust  43
Efficient Identity-Based Encryption with Minimal Server Trus...
收藏 引用
43rd International Symposium on Reliable Distributed Systems
作者: Liang, Yuan Di Crescenzo, Giovanni Wang, Haining Patni, Zahir Virginia Tech Blacksburg VA 24061 USA Peraton Labs Basking Ridge NJ 07920 USA
Boneh and Franklin proposed one of the first constructions of the very elegant concept of identity-based encryption (IBE) two decades ago. Despite many research advances and its several potential applications, IBE has... 详细信息
来源: 评论
The Power Consumption Cost of Data encryption in Smartphones
The Power Consumption Cost of Data Encryption in Smartphones
收藏 引用
International Conference on Open Source Software Computing (OSSCOM)
作者: Masoud, Mohammad Jannoud, Ismael Ahmad, Amal Al-Shobaky, Haithm Al Zaytoonah Univ Jordan Fac Engn & Technol Comp & Commun Engn Dept Amman 11733 Jordan
this paper provides a performance evaluation of four different symmetric encryption algorithms in Android mobile platform. DES, Bluefish, RC6 and AES algorithms have been written and implemented in JAVA for Android pl... 详细信息
来源: 评论
Evaluating and Optimizing Cryptographic Offloading for IoT Devices: Attribute-Based encryption Case Study  59
Evaluating and Optimizing Cryptographic Offloading for IoT D...
收藏 引用
59th Annual IEEE International Conference on Communications (IEEE ICC)
作者: Roy, Sunanda Crowley, Thomas Mark, Brian L. Zeng, Kai Khasawneh, Khaled N. George Mason Univ Fairfax VA 22030 USA
Computational offloading can provide significant latency and energy savings. However, most computational offloading protocols have been theoretically proposed, with some empirical evidence supporting their effectivene... 详细信息
来源: 评论
Mathematical Backdoors in Symmetric encryption Systems Proposal for a Backdoored AES-like Block Cipher  3
Mathematical Backdoors in Symmetric Encryption Systems <i>Pr...
收藏 引用
3rd International Conference on Information Systems Security and Privacy (ICISSP) / International Conference on Security and Cryptography (SECRYPT)
作者: Bannier, Arnaud Filiol, Eric ESIEA Operat Cryptol & Virol Lab 38 Rue Drs Calmette & Guerin F-53000 Laval France
Recent years have shown that more than ever governments and intelligence agencies try to control and bypass the cryptographic means used for the protection of data. Backdooring encryption algorithms is considered as t... 详细信息
来源: 评论
Database encryption using asymmetric keys: a case study  21
Database encryption using asymmetric keys: a case study
收藏 引用
21st International Conference on Control Systems and Computer Science (CSCS)
作者: Boicea, Alexandru Raduleseu, Florin Truica, Ciprian-Octavian Costea, Cristina Univ Politehn Bucuresti Comp Sci & Engn Dept Fac Automat Control & Comp Bucharest Romania
Data security has become an issue of increasing importance, especially for Web applications and distributed databases. One solution is using cryptographic algorithms whose improvement has become a constant concern. Th... 详细信息
来源: 评论
Medical Image Integrity Control Using Joint encryption and Watermarking Techniques
Medical Image Integrity Control Using Joint Encryption and W...
收藏 引用
International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE)
作者: Suganya, G. Amudha, K. KS Rangasamy Coll Technol Dept ECE Tiruchengode India
A joint encryption and watermarking technique is an efficient method for verifying the reliability of medical images. The medical image integrity control is achieved by the combined watermarking algorithm, QIM (Quanti... 详细信息
来源: 评论
SEARCH: Symmetric encryption Algorithm Research and Characteristic Hunting  15
SEARCH: Symmetric Encryption Algorithm Research and Characte...
收藏 引用
15th International Conference on Communications, COMM 2024
作者: Banu, Teodora-Georgiana Togan, Mihai Military Technical Academy "Ferdinand I" Bucharest Romania
SEARCH is a Python library that we developed to help cryptanalysts evaluate the security of block ciphers, specifically those based on substitution- permutation networks (SPN), against differential cryptanalysis attac... 详细信息
来源: 评论
An Innovative Image encryption Algorithm rooted in the Concept of Latin Square Matrix Algorithm
An Innovative Image Encryption Algorithm rooted in the Conce...
收藏 引用
2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Akande, Oluwatobi Noah Grace Ebere, Egenti Saidu, Charles Isah Ogedebe, Peter Baze University Computer Science Department Abuja Nigeria ACETEL National Open University of Nigeria Nigeria
Image encryption techniques are crucial for guaranteeing the secrecy, consistency, and genuineness of images in diverse applications. These methods are specifically designed to transform images into a format that is i... 详细信息
来源: 评论
A High-Security Image encryption Algorithm Based on Chaotic Sequence and Blockchain Technology  4
A High-Security Image Encryption Algorithm Based on Chaotic ...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Science, EIECS 2024
作者: Wu, Guangfu Huang, Le School of Information Engineering Jiangxi University of Science & Technology Jiangxi Ganzhou China
In this paper, we propose a novel two-dimensional exponential cosine chaotic map based on cosine and exponential functions, alongside the design of a highly sensitive color image encryption algorithm. The algorithm ut... 详细信息
来源: 评论