咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是151-160 订阅
排序:
encryption upgrade method for vehicle terminal firmware based on improved AES algorithm  4
Encryption upgrade method for vehicle terminal firmware base...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Communication, EIECC 2024
作者: Zhang, Zhiwei Zheng, Gang Shanghai Institute of Technology School of Mechanical Engineering Shanghai China
With the rapid popularization of intelligent vehicles, the security of vehicle terminal firmware in the process of remote upgrade is becoming more and more important. To this end, two improvement measures are proposed... 详细信息
来源: 评论
An Optimized SIMON Lightweight Image encryption Algorithm for Internet of Things: Balancing Performance and Security  1
An Optimized SIMON Lightweight Image Encryption Algorithm fo...
收藏 引用
1st International Conference on Pioneering Developments in Computer Science and Digital Technologies, IC2SDT 2024
作者: Verma, Abhay Thokchom, Surmila National Institute of Technology Meghalaya Department of Computer Science and Engineering Shillong India
The paper presents an optimized SIMON lightweight cryptographic algorithm that balances security, performance, and cost in contexts with limited resources. By lowering the computational cost and preserving strong secu... 详细信息
来源: 评论
Securing Edge Computing Environments with a Novel Chaos Theory-Based Lightweight encryption Algorithm for Real-Time Data Protection  2
Securing Edge Computing Environments with a Novel Chaos Theo...
收藏 引用
2nd IEEE International Conference on Integrated Intelligence and Communication Systems, ICIICS 2024
作者: Vanitha, V. Saritha, G. Hemalatha, K. Sathish, P. Devi, P. Gayathri Department of of Computer Science and Engineering Kumaraguru College of Technology Coimbatore India Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai India Department of Information Technology Sona College of Technology Salem India Nandha Engineering College Erode India Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India
In the era of edge computing, securing data transmission has become paramount, especially given the real-time requirements and limited computational resources of edge devices. This study introduces a novel Chaos Theor... 详细信息
来源: 评论
A Security encryption Algorithm for Transmission Line Monitoring Images
A Security Encryption Algorithm for Transmission Line Monito...
收藏 引用
2024 International Conference on Artificial Intelligence and Power Systems, AIPS 2024
作者: Chu, Zhiguang Meng, Haibin Zhao, Xingquan Liu, Dejun Zhang, Hao Mengdong Branch Guohua Energy Investment Company TongLiao China
Aiming at the problem of improving image security in the process of transmission line monitoring under the condition of limited computing resources, a security encryption algorithm for transmission line monitoring ima... 详细信息
来源: 评论
Research on the Application of an Improved AES-based encryption Algorithm on a Multi-Protocol Conversion Gateway with Domestic Chip
Research on the Application of an Improved AES-based Encrypt...
收藏 引用
2024 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2024
作者: Jiao, Xuyang Shen, Youzhi Li, Jian Yu, Xiuli Zhang, Ying Beijing University of Posts and Telecommunications in Beijing Laboratory of Robotics Mechanism and Cross Innovation China Industry Solutions Group at Phytium Technology Co. Ltd. China
To ensure data security during the gateway's data uploading process, we introduce the advantages of chaotic mapping to AES. We then develop a multi-protocol encrypted gateway architecture based on an improved AES ... 详细信息
来源: 评论
Image encryption Algorithm Based on 2D-Sine-Cosine Chaotic Mapping and Compression Sensing  43
Image Encryption Algorithm Based on 2D-Sine-Cosine Chaotic M...
收藏 引用
43rd Chinese Control Conference, CCC 2024
作者: Shen, Junyi Zhou, Qianyao Wang, Qinghua Gu, Yangchen Nanjing University of Science and Technology Nanjing210094 China Southeast University Nanjing211189 China
This paper introduces an image encryption algorithm based on 2D-Sine-Cosine chaotic mapping and compressed sensing technology. This algorithm introduces a novel 2D-Sine-Cosine chaotic mapping function. By using nested... 详细信息
来源: 评论
Design of an Efficient encryption and Decryption Modular Exponentiation for Single Word Size  5
Design of an Efficient Encryption and Decryption Modular Exp...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Sreekar, Ragi Abhinav Sindhoor, S.G. Krishna Sharma, Sarda Chauhan, Sandeep Singh Amrita School of Engineering Department of Electronics and Communication Engineering Bangalore India
Modular exponentiation (ME) is a mathematical operation that is used for several public-key cryptosystems (PKCs) and other applications. It is a complex task that is an essential computational tool that enables effici... 详细信息
来源: 评论
Research on Vehicle-Pile-Net Identity Authentication Based on Improved Elliptic Curve encryption Algorithm  11
Research on Vehicle-Pile-Net Identity Authentication Based o...
收藏 引用
11th International Forum on Electrical Engineering and Automation, IFEEA 2024
作者: Chen, Jinshan Wang, Xinlan Wu, Shiyu Yu, Sihang Deng, Chaoping Lin, Guodong Li, Zhaoxiang State Grid Fujian Electric Power Research Institute Fuzhou China
In order to solve the problem of security and efficiency of identity authentication in the process of vehicle-pile-net communication, a vehicle-pile-net identity authentication method based on improved elliptic curve ... 详细信息
来源: 评论
Image encryption Algorithm Based on Compression Technology and Chaotic System  24
Image Encryption Algorithm Based on Compression Technology a...
收藏 引用
2nd International Conference on Educational Knowledge and Informatization, EKI 2024
作者: Zhang, Yang Li, Yongzhen Jin, Zhexue Network Information Security Laboratory Yanbian University China
The traditional image encryption algorithm provides a strong security in protecting image data, and there is a situation that the encryption and decryption process consumes too much time resource computing resources, ... 详细信息
来源: 评论
Retrieval Rate Analysis of Triple Advanced encryption Standard Compared over Blow Fish in Privacy Data Sharing Secured Cloud Computing  15
Retrieval Rate Analysis of Triple Advanced Encryption Standa...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Jaswanth, Thavva Venkata Thangaraj, S. John Justin Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Dept of Cse Chennai India
Tripe Advanced encryption Standard was utilized for the purpose of enhancing retrieval rate analysis in privacy data sharing secured cloud computing. This was contrasted to Blowfish. Many people believe that security ... 详细信息
来源: 评论