咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 285 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 105 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 85 篇 电气工程
    • 51 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 136 篇 理学
    • 89 篇 数学
    • 42 篇 物理学
    • 15 篇 化学
    • 15 篇 统计学(可授理学、...
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 390 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 6 篇 aes
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 rsa
  • 5 篇 des
  • 5 篇 encryption
  • 4 篇 ecc
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 307 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
390 条 记 录,以下是151-160 订阅
排序:
A High-Security Image encryption Algorithm Based on Chaotic Sequence and Blockchain Technology  4
A High-Security Image Encryption Algorithm Based on Chaotic ...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Science, EIECS 2024
作者: Wu, Guangfu Huang, Le School of Information Engineering Jiangxi University of Science & Technology Jiangxi Ganzhou China
In this paper, we propose a novel two-dimensional exponential cosine chaotic map based on cosine and exponential functions, alongside the design of a highly sensitive color image encryption algorithm. The algorithm ut... 详细信息
来源: 评论
Research on the Application of an Improved AES-based encryption Algorithm on a Multi-Protocol Conversion Gateway with Domestic Chip
Research on the Application of an Improved AES-based Encrypt...
收藏 引用
2024 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2024
作者: Jiao, Xuyang Shen, Youzhi Li, Jian Yu, Xiuli Zhang, Ying Beijing University of Posts and Telecommunications in Beijing Laboratory of Robotics Mechanism and Cross Innovation China Industry Solutions Group at Phytium Technology Co. Ltd. China
To ensure data security during the gateway's data uploading process, we introduce the advantages of chaotic mapping to AES. We then develop a multi-protocol encrypted gateway architecture based on an improved AES ... 详细信息
来源: 评论
Design of an Efficient encryption and Decryption Modular Exponentiation for Single Word Size  5
Design of an Efficient Encryption and Decryption Modular Exp...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Sreekar, Ragi Abhinav Sindhoor, S.G. Krishna Sharma, Sarda Chauhan, Sandeep Singh Amrita School of Engineering Department of Electronics and Communication Engineering Bangalore India
Modular exponentiation (ME) is a mathematical operation that is used for several public-key cryptosystems (PKCs) and other applications. It is a complex task that is an essential computational tool that enables effici... 详细信息
来源: 评论
Data Protection in the Era of Big Data Advanced encryption Standard VS Data encryption Standard  2
Data Protection in the Era of Big Data Advanced Encryption S...
收藏 引用
2nd International Conference Computational and Characterization Techniques in Engineering and Sciences, IC3TES 2024
作者: Mageshwaran, M.K. Sri Ramya, P. Saveetha University Saveetha School of Engineering Saveetha Institution of Medical and Technical Sciences Department of Information Technology Tamil Nadu Chennai India Saveetha University Saveetha School of Engineering Saveetha Institution of Medical and Technical Sciences Department of Computer Science and Engineering Tamil Nadu Chennai India
This research is to seek to know which algorithm between the DES (Data encryption Standard) and AES (Advanced encryption Standard) is faster in encryption and decryption as well as determine which is safer The data se... 详细信息
来源: 评论
An Enhanced Vigenère encryption Algorithm using 6S-Substitution and 2S-Transposition Technique
An Enhanced Vigenère Encryption Algorithm using 6S-Substitu...
收藏 引用
2024 IEEE International Conference on Data and Software Engineering, ICoDSE 2024
作者: Galeza, Sugar Mae T. Sison, Ariel M. Medina, Ruji P. Graduate Program Technological Institute of the Philippines Quezon City Philippines School of Computer Studies Emilio Aguinaldo College Manila Philippines
Vigenère encryption algorithm is a classical cryptographic algorithm featuring a polyalphabetic stream cipher, which as numerous limitations pertaining to finding the size and length of the encryption key. This s... 详细信息
来源: 评论
Selective encryption Algorithm for Vectoral Geographic Data under Feature Point Grouping Strategy
Selective Encryption Algorithm for Vectoral Geographic Data ...
收藏 引用
2024 Mid-term Symposium on Spatial Information to Empower the Metaverse
作者: Zhou, Qianwen Xiong, Ying Zhu, Changqing Ren, Na Nanjing Normal University Nanjing China Hunan Engineering Research Centre of Geographic Information Security and Application Changsha China
Selective encryption technology is a data security protection method that can balance encryption security and efficiency. Currently, there is ongoing research on applying this technology to vector geographic data. How... 详细信息
来源: 评论
File encryption and Decryption Application using Elliptic CurveDiffie-Hellman Algorithm and Chaotic Map Function  9th
File Encryption and Decryption Application using Elliptic Cu...
收藏 引用
9th International Conference on Computer Science and Computational Intelligence, ICCSCI 2024
作者: Heru, Albert Toshiro Faisal Manalu, Sonya Rapinta Mathematics Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
In this modern era, the exchange of information through the internet happens almost constantly. The security of this exchanged information is crucial to prevent unauthorized parties from misusing it. One frequently ex... 详细信息
来源: 评论
Image encryption Algorithm based on Pseudo-random Sequence  4
Image Encryption Algorithm based on Pseudo-random Sequence
收藏 引用
4th International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, SPIoT 2023
作者: Ma, Tengyu Ye, Jun Xu, Zheng Zhao, Jinghua School of Cyberspace Security Hainan University Hainan Province Haikou570000 China School of Computer and Information Engineering Institute for Artificial Intelligence Shanghai Innovation Center of Reverse Logistics and Supply Chain Shanghai Polytechnic University Shanghai201209 China Business School University of Shanghai for Science and Technology Shanghai200093 China
The applications of digital images is widespread in various fields such as medical diagnosis, film production, intelligent transportation, security monitoring, virtual reality and computer vision. The security of imag... 详细信息
来源: 评论
Secure Sharing Method of Big Data Based on ECC encryption Algorithm and Casual Transmission  3
Secure Sharing Method of Big Data Based on ECC Encryption Al...
收藏 引用
3rd International Conference on Cloud Computing, Big Data Application and Software Engineering, CBASE 2024
作者: Wang, Shuang Li, Yang Xu, Guang Chen, Wei Gao, Ningning He, Zeyang R&D Center of Travelsky Technology Limited China Shunyi District Tianbei Rd Beijing101310 China
Due to the large amount of computation required for authentication and matching in the data sharing phase, there is a certain delay in the real-time performance of the corresponding efficiency. Therefore, this paper p... 详细信息
来源: 评论
Enhancing Security: A Hybrid encryption Algorithm for Effective Key Generation  2
Enhancing Security: A Hybrid Encryption Algorithm for Effect...
收藏 引用
2nd International Conference on Recent Trends in Microelectronics, Automation, Computing, and Communications Systems, ICMACC 2024
作者: Jacob, Jeevan John Kiran, P.S. Shenoy, Jaigovind B Basavaraju, Sagar Amrita School of Computing Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Department of Electronics and Communication Engineering Bengaluru India
The abstract Data security is of most importance, in the present day- the introduction of high-level wireless communication channels has led to generation and transfer of massive amounts of data. Data security must ke... 详细信息
来源: 评论