咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 101 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 89 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 388 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 78 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
388 条 记 录,以下是161-170 订阅
排序:
Optimization and Security Analysis of Adversarial Neural Cryptography Applications  6
Optimization and Security Analysis of Adversarial Neural Cry...
收藏 引用
6th IEEE International Conference on Civil Aviation Safety and Information Technology, ICCASIT 2024
作者: Zhang, Zhiwen Nankai University College of Cyber Science Tianjin China
Compared with traditional cryptographic algorithms, neural network encryption algorithm is more aggressive, which is one of the hot issues in the field of intelligent cryptanalysis. In this paper, a simple improvement... 详细信息
来源: 评论
Image Cryptography using AES-256 Algorithm
Image Cryptography using AES-256 Algorithm
收藏 引用
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity, ICDSCNC 2024
作者: Chandel, Taniska Gangodkar, Ninad Gautam, Abhiraj Lohumi, Yogesh Ghazi, Mohd Rehan Goyal, Ashtha University Department of Computer Science and Engineering Dehradun India Graphic Era Hill University School of Computing Dehradun India
Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing use of social networking, ... 详细信息
来源: 评论
Application of Genetics algorithms in Cryptography  28
Application of Genetics Algorithms in Cryptography
收藏 引用
28th IEEE International Conference on Intelligent Engineering Systems (INES)
作者: Pekarcik, Peter Chovancova, Eva Chovanec, Martin Stancel, Martin Tech Univ Kosiciach Fak Elektrotechn Informat Katedra Pocitacov Informat Letna 9 Kosice 04200 Slovakia
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The cybersecurity practice, also known as cryptology, combines various disciplines like computer science, computer engineering, and mathem... 详细信息
来源: 评论
Deepface-based chaotic image encryption using key optimization and semi-tensor product theory
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Ding, Dawei Xie, Dong Zhang, Hongwei Yang, Zongli Liu, Chu'an Anhui university School of Electronic Information Engineering Hefei230601 China
Currently, protecting personal privacy through selective encryption of facial images has become a research hotspot. This paper aims to design a new image encryption scheme using chaotic systems, optimization algorithm... 详细信息
来源: 评论
Power efficient and area optimized advanced encryption standard-based cipher for improved cyber security
收藏 引用
Journal of Cyber Security Technology 2025年
作者: Upadhyay, Shipra Pandey, Amit Kumar Kumar, Shailendra Mishra, Shivendu Department of Electronics and Communication Engineering Ramaiah Institute of Technology Bangalore India Department of Applied Science and Humanities Rajkiya Engineering College Ambedkar Nagar Uttar Pradesh India Indian Space Research Organization Karnataka Bangalore India Department of Information Technology Rajkiya Engineering College Ambedkar Nagar Uttar Pradesh India
This paper uses reconfigurable hardware (Field-Programmable Gate Array (FPGA) board) for security implementation, which has less complexity, more flexibility, and yields more efficiency. The Data encryption Standard (... 详细信息
来源: 评论
HERFA: A Homomorphic encryption-Based Root-Finding Algorithm
收藏 引用
IEEE Embedded Systems Letters 2024年
作者: Bencini, Christopher Mendola, Jason He, Wei Kim, Sunwoong Rochester Institute of Technology Department of Electrical and Microelectronic Engineering RochesterNY14623 United States
Edge-cloud computing architectures are exposed to significant security challenges. Although general encryption methods can mitigate some of these concerns, they require decryption to perform operations on data, exposi... 详细信息
来源: 评论
Design of Chaotic Systems with Multiple Scrolls via Anti-Control Method and its encryption Application
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2636-2644页
作者: Wang, Shiya He, Jianbin School of Mathematics and Statistics Minnan Normal University Zhangzhou363000 China School of Mathematics and Statistics Minnan Normal University Zhangzhou363000 China
As the widespread application of multimedia communication technology, information transmission security has become increasingly important. The multi-scroll chaotic system exhibits complex dynamic behavior, and it is u... 详细信息
来源: 评论
k' -Lucas Sequence for Elliptic Curve Cryptography  1
k' -Lucas Sequence for Elliptic Curve Cryptography
收藏 引用
1st International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Abhinav Gonder, Surjeet Singh Chauhan Garg, Prachi Dubey, Sudhanshu Shekhar Chandigarh University Department of Mathematics Punjab Gharuan140413 India
The k′-Lucas sequence is a significant generalization of the classical Lucas sequence, exhibiting various intriguing properties and applications across mathematics and cryptography. The study of k′ -Lucas-like seque... 详细信息
来源: 评论
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation  22nd
Reducing the Share Size of Weighted Threshold Secret Shari...
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Farràs, Oriol Guiot, Miquel Universitat Rovira i Virgili Tarragona Spain
A secret sharing scheme is a cryptographic primitive that allows a dealer to share a secret among a set of parties, so that only authorized subsets of them can recover it. The access structure of the scheme is the fam... 详细信息
来源: 评论
Singularization: A New Approach to Designing Block Ciphers for Resource-Constrained Devices  7th
Singularization: A New Approach to Designing Block Ciphers ...
收藏 引用
7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Macario-Rat, Gilles Plesa, Mihail-Iulian Orange Chatillon France Orange Services Bucharest Romania
Running traditional symmetric encryption algorithms, such as AES, on resource-constrained devices presents significant challenges due to the limited computational resources available. A common bottleneck in these algo... 详细信息
来源: 评论