咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是161-170 订阅
排序:
Hierarchical encryption in a Residual Number System  14
Hierarchical Encryption in a Residual Number System
收藏 引用
14th International Conference on Advanced Computer Information Technologies, ACIT 2024
作者: Yakymenko, Igor Martyniuk, Olesya Martyniuk, Serhii Martyniuk, Andrii Yakymenko, Yurii Kasianchuk, Mykhailo West Ukrainian National University Department of Cyber Security Ternopil Ukraine West Ukrainian National University Department of Applied Mathematies Ternopil Ukraine Ternopil Volodymyr Hnatiuk National Pedagogical University Department of Computer Science and Teaching Methods Ternopil Ukraine Taras Shevchenko National University of Kyiv Faculty of Mechanics and Mathematics Kyiv Ukraine
Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The propose... 详细信息
来源: 评论
SEASHA3: Secure and Efficient encryption for the IoT Data by Replacing Subkeys of AES with SHA3
SEASHA3: Secure and Efficient Encryption for the IoT Data by...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Soni, Ankush Sahay, Sanjay K. Bits Pilani Department of Computer Science and Information Systems Goa India
Advanced encryption Standard (AES) is one of the most widely used cipher for data encryption. However, recent studies have pointed out some weaknesses in the subkeys used in AES. Also, the sequential subkeys generatio... 详细信息
来源: 评论
A Cryptographic encryption Scheme based on a Pythagorean Triplets Manufacturing Formula  14
A Cryptographic Encryption Scheme based on a Pythagorean Tri...
收藏 引用
14th International Conference on Advanced Computer Information Technologies, ACIT 2024
作者: Voloch, Nadav Raicol, Noa Voloch - Bloch Ruppin Academic Center Computer Engineering department Emek Hefer Israel Raicol Crystals Ltd Rosh Ha'Ayin Israel
In the past decades cryptography and specifically encryption schemes were vastly researched. This is due to the developments in technology, communication, and the rising needs to use better, more resilient encryption ... 详细信息
来源: 评论
Research on Image encryption Algorithm Based on Chaotic System  4
Research on Image Encryption Algorithm Based on Chaotic Syst...
收藏 引用
4th IEEE International Conference on Data Science and Computer Application, ICDSCA 2024
作者: Yihang, Wu Yanling, Sun Yingqi, Li School of Mechanical Engineering Shenyang Jianzhu University Shenyang China Department of Science Shenyang Jianzhu University Shenyang China Computer Science and Engineering Shenyang Jianzhu University Shenyang China
With the development of the internet, social software and media have become ubiquitous, making images increasingly important in daily life. The dissemination of a large number of images on social networks has made inf... 详细信息
来源: 评论
Enhancing Quantum Information encryption System Security: An Optimization Approach with BFGS-Supported VQE Solver  9
Enhancing Quantum Information Encryption System Security: An...
收藏 引用
9th International Symposium on Computer and Information Processing Technology, ISCIPT 2024
作者: Guo, Hanze Jiang, Bo Wu, Yongzheng Wei, Shiheng The 32nd Research Institute of China Electronics Technology Group Corporation Shanghai China
With the rapid development in the field of quantum computing, the security of traditional encryption algorithms is facing serious challenges. And quantum key distribution (QKD) provides a new way to solve the key dist... 详细信息
来源: 评论
Image encryption Algorithm based on Pseudo-random Sequence  4
Image Encryption Algorithm based on Pseudo-random Sequence
收藏 引用
4th International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, SPIoT 2023
作者: Ma, Tengyu Ye, Jun Xu, Zheng Zhao, Jinghua School of Cyberspace Security Hainan University Hainan Province Haikou570000 China School of Computer and Information Engineering Institute for Artificial Intelligence Shanghai Innovation Center of Reverse Logistics and Supply Chain Shanghai Polytechnic University Shanghai201209 China Business School University of Shanghai for Science and Technology Shanghai200093 China
The applications of digital images is widespread in various fields such as medical diagnosis, film production, intelligent transportation, security monitoring, virtual reality and computer vision. The security of imag... 详细信息
来源: 评论
The Mathematical Principles of RSA encryption Algorithm  3
The Mathematical Principles of RSA Encryption Algorithm
收藏 引用
3rd International Conference on Artificial Intelligence and Computer Information Technology, AICIT 2024
作者: Zhang, Kun Cyber Security Academy Shandong University of Political Science and Law Ji Nan China
This article presents an overview of the emergence, content and characteristics of the RSA encryption algorithm, offering a comprehensive exposition on its mathematical principles while highlighting its limitations. T... 详细信息
来源: 评论
File encryption and Decryption Application using Elliptic CurveDiffie-Hellman Algorithm and Chaotic Map Function  9th
File Encryption and Decryption Application using Elliptic Cu...
收藏 引用
9th International Conference on Computer Science and Computational Intelligence, ICCSCI 2024
作者: Heru, Albert Toshiro Faisal Manalu, Sonya Rapinta Mathematics Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
In this modern era, the exchange of information through the internet happens almost constantly. The security of this exchanged information is crucial to prevent unauthorized parties from misusing it. One frequently ex... 详细信息
来源: 评论
Secure Sharing Method of Big Data Based on ECC encryption Algorithm and Casual Transmission  3
Secure Sharing Method of Big Data Based on ECC Encryption Al...
收藏 引用
3rd International Conference on Cloud Computing, Big Data Application and Software Engineering, CBASE 2024
作者: Wang, Shuang Li, Yang Xu, Guang Chen, Wei Gao, Ningning He, Zeyang R&D Center of Travelsky Technology Limited China Shunyi District Tianbei Rd Beijing101310 China
Due to the large amount of computation required for authentication and matching in the data sharing phase, there is a certain delay in the real-time performance of the corresponding efficiency. Therefore, this paper p... 详细信息
来源: 评论
An encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论