咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 388 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
388 条 记 录,以下是151-160 订阅
Securing Edge Computing Environments with a Novel Chaos Theory-Based Lightweight encryption Algorithm for Real-Time Data Protection  2
Securing Edge Computing Environments with a Novel Chaos Theo...
收藏 引用
2nd IEEE International Conference on Integrated Intelligence and Communication Systems, ICIICS 2024
作者: Vanitha, V. Saritha, G. Hemalatha, K. Sathish, P. Devi, P. Gayathri Department of of Computer Science and Engineering Kumaraguru College of Technology Coimbatore India Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai India Department of Information Technology Sona College of Technology Salem India Nandha Engineering College Erode India Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India
In the era of edge computing, securing data transmission has become paramount, especially given the real-time requirements and limited computational resources of edge devices. This study introduces a novel Chaos Theor... 详细信息
来源: 评论
Image encryption Algorithm Based on 2D-Sine-Cosine Chaotic Mapping and Compression Sensing  43
Image Encryption Algorithm Based on 2D-Sine-Cosine Chaotic M...
收藏 引用
43rd Chinese Control Conference, CCC 2024
作者: Shen, Junyi Zhou, Qianyao Wang, Qinghua Gu, Yangchen Nanjing University of Science and Technology Nanjing210094 China Southeast University Nanjing211189 China
This paper introduces an image encryption algorithm based on 2D-Sine-Cosine chaotic mapping and compressed sensing technology. This algorithm introduces a novel 2D-Sine-Cosine chaotic mapping function. By using nested... 详细信息
来源: 评论
A Security encryption Algorithm for Transmission Line Monitoring Images
A Security Encryption Algorithm for Transmission Line Monito...
收藏 引用
2024 International Conference on Artificial Intelligence and Power Systems, AIPS 2024
作者: Chu, Zhiguang Meng, Haibin Zhao, Xingquan Liu, Dejun Zhang, Hao Mengdong Branch Guohua Energy Investment Company TongLiao China
Aiming at the problem of improving image security in the process of transmission line monitoring under the condition of limited computing resources, a security encryption algorithm for transmission line monitoring ima... 详细信息
来源: 评论
Research on the Application of an Improved AES-based encryption Algorithm on a Multi-Protocol Conversion Gateway with Domestic Chip
Research on the Application of an Improved AES-based Encrypt...
收藏 引用
2024 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2024
作者: Jiao, Xuyang Shen, Youzhi Li, Jian Yu, Xiuli Zhang, Ying Beijing University of Posts and Telecommunications in Beijing Laboratory of Robotics Mechanism and Cross Innovation China Industry Solutions Group at Phytium Technology Co. Ltd. China
To ensure data security during the gateway's data uploading process, we introduce the advantages of chaotic mapping to AES. We then develop a multi-protocol encrypted gateway architecture based on an improved AES ... 详细信息
来源: 评论
Design of an Efficient encryption and Decryption Modular Exponentiation for Single Word Size  5
Design of an Efficient Encryption and Decryption Modular Exp...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Sreekar, Ragi Abhinav Sindhoor, S.G. Krishna Sharma, Sarda Chauhan, Sandeep Singh Amrita School of Engineering Department of Electronics and Communication Engineering Bangalore India
Modular exponentiation (ME) is a mathematical operation that is used for several public-key cryptosystems (PKCs) and other applications. It is a complex task that is an essential computational tool that enables effici... 详细信息
来源: 评论
Retrieval Rate Analysis of Triple Advanced encryption Standard Compared over Blow Fish in Privacy Data Sharing Secured Cloud Computing  15
Retrieval Rate Analysis of Triple Advanced Encryption Standa...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Jaswanth, Thavva Venkata Thangaraj, S. John Justin Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Dept of Cse Chennai India
Tripe Advanced encryption Standard was utilized for the purpose of enhancing retrieval rate analysis in privacy data sharing secured cloud computing. This was contrasted to Blowfish. Many people believe that security ... 详细信息
来源: 评论
SEASHA3: Secure and Efficient encryption for the IoT Data by Replacing Subkeys of AES with SHA3
SEASHA3: Secure and Efficient Encryption for the IoT Data by...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Soni, Ankush Sahay, Sanjay K. Bits Pilani Department of Computer Science and Information Systems Goa India
Advanced encryption Standard (AES) is one of the most widely used cipher for data encryption. However, recent studies have pointed out some weaknesses in the subkeys used in AES. Also, the sequential subkeys generatio... 详细信息
来源: 评论
Hierarchical encryption in a Residual Number System  14
Hierarchical Encryption in a Residual Number System
收藏 引用
14th International Conference on Advanced Computer Information Technologies, ACIT 2024
作者: Yakymenko, Igor Martyniuk, Olesya Martyniuk, Serhii Martyniuk, Andrii Yakymenko, Yurii Kasianchuk, Mykhailo West Ukrainian National University Department of Cyber Security Ternopil Ukraine West Ukrainian National University Department of Applied Mathematies Ternopil Ukraine Ternopil Volodymyr Hnatiuk National Pedagogical University Department of Computer Science and Teaching Methods Ternopil Ukraine Taras Shevchenko National University of Kyiv Faculty of Mechanics and Mathematics Kyiv Ukraine
Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The propose... 详细信息
来源: 评论
Research on Image encryption Algorithm Based on Chaotic System  4
Research on Image Encryption Algorithm Based on Chaotic Syst...
收藏 引用
4th IEEE International Conference on Data Science and Computer Application, ICDSCA 2024
作者: Yihang, Wu Yanling, Sun Yingqi, Li School of Mechanical Engineering Shenyang Jianzhu University Shenyang China Department of Science Shenyang Jianzhu University Shenyang China Computer Science and Engineering Shenyang Jianzhu University Shenyang China
With the development of the internet, social software and media have become ubiquitous, making images increasingly important in daily life. The dissemination of a large number of images on social networks has made inf... 详细信息
来源: 评论
Enhancing Quantum Information encryption System Security: An Optimization Approach with BFGS-Supported VQE Solver  9
Enhancing Quantum Information Encryption System Security: An...
收藏 引用
9th International Symposium on Computer and Information Processing Technology, ISCIPT 2024
作者: Guo, Hanze Jiang, Bo Wu, Yongzheng Wei, Shiheng The 32nd Research Institute of China Electronics Technology Group Corporation Shanghai China
With the rapid development in the field of quantum computing, the security of traditional encryption algorithms is facing serious challenges. And quantum key distribution (QKD) provides a new way to solve the key dist... 详细信息
来源: 评论