咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 285 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 105 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 85 篇 电气工程
    • 51 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 136 篇 理学
    • 89 篇 数学
    • 42 篇 物理学
    • 15 篇 化学
    • 15 篇 统计学(可授理学、...
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 390 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 6 篇 aes
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 rsa
  • 5 篇 des
  • 5 篇 encryption
  • 4 篇 ecc
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 307 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
390 条 记 录,以下是121-130 订阅
排序:
Database encryption using asymmetric keys: a case study  21
Database encryption using asymmetric keys: a case study
收藏 引用
21st International Conference on Control Systems and Computer Science (CSCS)
作者: Boicea, Alexandru Raduleseu, Florin Truica, Ciprian-Octavian Costea, Cristina Univ Politehn Bucuresti Comp Sci & Engn Dept Fac Automat Control & Comp Bucharest Romania
Data security has become an issue of increasing importance, especially for Web applications and distributed databases. One solution is using cryptographic algorithms whose improvement has become a constant concern. Th... 详细信息
来源: 评论
Mathematical Backdoors in Symmetric encryption Systems Proposal for a Backdoored AES-like Block Cipher  3
Mathematical Backdoors in Symmetric Encryption Systems <i>Pr...
收藏 引用
3rd International Conference on Information Systems Security and Privacy (ICISSP) / International Conference on Security and Cryptography (SECRYPT)
作者: Bannier, Arnaud Filiol, Eric ESIEA Operat Cryptol & Virol Lab 38 Rue Drs Calmette & Guerin F-53000 Laval France
Recent years have shown that more than ever governments and intelligence agencies try to control and bypass the cryptographic means used for the protection of data. Backdooring encryption algorithms is considered as t... 详细信息
来源: 评论
Evaluating and Optimizing Cryptographic Offloading for IoT Devices: Attribute-Based encryption Case Study  59
Evaluating and Optimizing Cryptographic Offloading for IoT D...
收藏 引用
59th Annual IEEE International Conference on Communications (IEEE ICC)
作者: Roy, Sunanda Crowley, Thomas Mark, Brian L. Zeng, Kai Khasawneh, Khaled N. George Mason Univ Fairfax VA 22030 USA
Computational offloading can provide significant latency and energy savings. However, most computational offloading protocols have been theoretically proposed, with some empirical evidence supporting their effectivene... 详细信息
来源: 评论
The Secure UAV Communication Link Based on OTP encryption Technique  11
The Secure UAV Communication Link Based on OTP Encryption Te...
收藏 引用
11th International Conference on Ubiquitous and Future Networks (ICUFN)
作者: Atoev, Sukhrob Kwon, Oh-Jun Kim, Chee-Yong Lee, Suk-Hwan Choi, Young-Rak Kwon, Ki-Ryong Pukyong Natl Univ Dept IT Convergence & Applicat Engn Busan South Korea Dong Eui Univ Dept Comp Software Engn Busan South Korea Dong Eui Univ Game Animat Engn Busan South Korea Tongmyong Univ Dept Informat Secur Busan South Korea A&C Co Seoul South Korea
The demand on the security and reliability of the communication and data link of unmanned aerial vehicle (UAV) is much higher since the environment of the modern battlefield is becoming more and more complex. Since th... 详细信息
来源: 评论
Design of Light-weight encryption Algorithm Based on RISC-V Platform  35
Design of Light-weight Encryption Algorithm Based on RISC-V ...
收藏 引用
35th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP)
作者: Zhang, Zekai Cheung, Ray Chak Chung City Univ Hong Kong Hong Kong Peoples R China
In this work, we aim to design a lightweight encryption algorithm, GIFT, suitable for IoT systems. The design concept of the GIFT lightweight encryption algorithm is based on the PRESENT lightweight encryption algorit... 详细信息
来源: 评论
SEARCH: Symmetric encryption Algorithm Research and Characteristic Hunting  15
SEARCH: Symmetric Encryption Algorithm Research and Characte...
收藏 引用
15th International Conference on Communications, COMM 2024
作者: Banu, Teodora-Georgiana Togan, Mihai Military Technical Academy "Ferdinand I" Bucharest Romania
SEARCH is a Python library that we developed to help cryptanalysts evaluate the security of block ciphers, specifically those based on substitution- permutation networks (SPN), against differential cryptanalysis attac... 详细信息
来源: 评论
Image encryption Algorithm-Based Reversible Data Hiding With Triple Des  10
Image Encryption Algorithm-Based Reversible Data Hiding With...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Kumar, Praveen Bagavathi Anandhan, E. Balamurugan, K. Gowreesh, A.M. Jayanth, N.J. Department of Cse Sri Eshwar College of Engineering Coimbatore India
The proposed system presents an all-encompassing solution for embedding data within images, while simultaneously maintaining their visual quality. This is achieved through the utilization of the Reversible Data Hiding... 详细信息
来源: 评论
Secured Multi-Platform Communication Application Using Advanced encryption Standard Algorithm  10
Secured Multi-Platform Communication Application Using Advan...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Bhatt, Chandradeep Tiwari, Chirag Thalal, Bhupesh Singh Vishnoi, Arpit Joshi, Karan Singh, Teekam Graphic Era Hill University Cse Department Dehradun India Computer Science and Engineering Graphic Era Hill University Dehradun India Computer Science and Engineering Graphic Era Deemed to be University Dehradun India
Messaging applications have been a common tool used by individuals as smartphones gain popularity and provide a larger range of application functions. An instant messaging program with text messaging capabilities is a... 详细信息
来源: 评论
Optimized Fully Homomorphic encryption Strategy Based on Residue Number System  4
Optimized Fully Homomorphic Encryption Strategy Based on Res...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Science, EIECS 2024
作者: Cheng, Yaqing School of Software Beijing Jiaotong University Beijing China
With the increasing demand for data security computing, the BFV algorithm has become a research hotspot due to its relatively high efficiency. However, its performance bottlenecks limit its widespread deployment in pr... 详细信息
来源: 评论
An Algorithm for Image encryption Combining the Lorenz System, XOR Operation, and Inverted Bit Permutation  3
An Algorithm for Image Encryption Combining the Lorenz Syste...
收藏 引用
3rd International Conference on Embedded Systems and Artificial Intelligence, ESAI 2024
作者: Koulouh, Fatima Amine, Safae Taouil, Rafik Es-Sabry, Mohammed Hdioud, Ferdaous Akkad, Nabil El ENSAF USMBA LASET Laboratory Fez Morocco ENSAF LASET Laboratory Fez Morocco University of Abdelmalek Essaadi ECT FS Tetouan Morocco University of Abdelmalek Essaadi ISISAFS Tetouan Morocco EST USMBA Fez Morocco LASET Laboratory ENSAF Fez Morocco
This paper proposes a new image encoding algorithm that integrates inverted bit permutation with the chaotic behavior of a hybrid Lorenz chaotic system and XOR operation. The method capitalizes on the inherent of the ... 详细信息
来源: 评论