咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 100 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 283 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 50 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 133 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 387 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 77 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
387 条 记 录,以下是181-190 订阅
Research of the graphic model of the points of the elliptic curve in the Edward form
Research of the graphic model of the points of the elliptic ...
收藏 引用
2024 Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II 2024
作者: Abramov, Serhii Sokolov, Volodymyr Abramov, Vadym Borys Grinchenko Kyiv Metropolitan University 18/2 Bulvarno-Kudryavska str. Kyiv04053 Ukraine
Elliptic curves in Edwards form, known for their speed and efficiency, are highly promising for asymmetric cryptosystems. The CSIDH protocol is particularly notable for post-quantum cryptography. Recent studies classi... 详细信息
来源: 评论
Improved Scalar Multiplication Based on ωNAFRepresentation of Feature Sequences Under Sliding Window Algorithm  4
Improved Scalar Multiplication Based on ωNAFRepresentation ...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Science, EIECS 2024
作者: Li, Junhao Wang, Le North China University of Technology Department of Information and Communication Engineering Beijing China
Elliptic Curve Cryptography (ECC) is extensively utilized in various security applications due to its high efficiency and security. The core operation in ECC, elliptic curve scalar multiplication, significantly impact... 详细信息
来源: 评论
A study on Post Quantum- Recent Techniques, Challenges and Bibliometric analysis  7
A study on Post Quantum- Recent Techniques, Challenges and B...
收藏 引用
7th IEEE Pune Section International Conference, PuneCon 2024
作者: Joshi, Pranav Saxena, Amit Mit World Peace University Dept. of Computer Science and Engineering Pune India CDAC-Pune Pune India
The advent of quantum computers spells doom for classical encryption schemes. Asymmetric key cryptosystems are easily solved by quantum computers using Shor's algorithm and Grover's algorithm in polynomial tim... 详细信息
来源: 评论
A Post Quantum Light Weight Cryptographic Algorithm over Quaternion Integers  21
A Post Quantum Light Weight Cryptographic Algorithm over Qua...
收藏 引用
21st International Bhurban Conference on Applied Sciences and Technology, IBCAST 2024
作者: Ul Haq, Tanveer Haq, Inam Ul Ahmed, Naveed Razzaq, Abdul Center of Excellence in Science and Applied Technologies Islamabad Pakistan Military College of Signals Department of Humanities & Basic Sciences Rawalpindi Pakistan
One of the discrete subgroup of Euclidean space, known as Lattices, play a crucial part in the construction of post-quantum cryptographic ciphers. Unlike classical public-key schemes vulnerable to quantum attacks, cer... 详细信息
来源: 评论
Comprehensive Review for Big Data-Based Sensitive Information Secure Sharing Using Blockchain Techniques  5
Comprehensive Review for Big Data-Based Sensitive Informatio...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Murukanantham, K. Uma Nandhini, D. Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India
Big Data (BD) has attracted much attention from science and industry. Recent developments in BD have raised significant security issues and increased the risk of BD data privacy breaches. The novel reviews recent rese... 详细信息
来源: 评论
Vulnerability Analysis of WPA Security Protocols  15
Vulnerability Analysis of WPA Security Protocols
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Chaudhary, Anurag Kumar, Krishan University Institute of Engineering and Technology Panjab University Information Technology Chandigarh India
Wireless data transmission across the air is quite common. Attackers have the ability to sniff all that data. To make sure only the actual recipient could decipher its contents, wireless encryption algorithms were int... 详细信息
来源: 评论
A survey of lightweight block cipher
A survey of lightweight block cipher
收藏 引用
2024 International Conference on algorithms, High Performance Computing, and Artificial Intelligence, AHPCAI 2024
作者: Lv, Weidong Chen, Yufei Liu, Jia Dept. of Information Security Naval Univ. of Engineering Hubei Province Wuhan430033 China
Compared with traditional computing devices, IoT devices are often smaller in size, resulting in weaker battery power, memory, and computing power. Additionally, IoT devices have a higher frequency of data exchange an... 详细信息
来源: 评论
Enhancing Data Security with RSA-SHA 256: Mitigating Timing Attacks  15
Enhancing Data Security with RSA-SHA 256: Mitigating Timing ...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Acasamoso, Dominador M. Sison, Ariel M. Medina, Ruji P. Technological Institute of the Philippines Quezon City Philippines Emilio Aguinaldo College Manila Philippines
This work considered the improvement of the RSA cryptosystem using a Secure Hash Algorithm, SHA-256, in its attempt to forestall attacks, more so against timing attacks. RSA is one of the most used asymmetric encrypti... 详细信息
来源: 评论
An Experience of Abcd-Problems Based Brief Cryptography Introduction  4
An Experience of Abcd-Problems Based Brief Cryptography Intr...
收藏 引用
4th International Conference on Technology Enhanced Learning in Higher Education, TELE 2024
作者: Krivosheev, Oleg I. Institute of Control Sciences Lab.40 Intellectual Control Systems Moscow Russia
Cryptography due to corresponding non-visual counter-intuitive mathematics is not a very suitable theme for basic general introductory applied mathematics courses for non-specialists. Still, according to the author... 详细信息
来源: 评论
Enhancemet of Network Security in Mobile Adhoc Networks using USASFO Algorithm for IoT Applications  5
Enhancemet of Network Security in Mobile Adhoc Networks usin...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Niharika, K. Dasam, Sridevi Kandarkar, Sucharita M Arun, M. Rao, G.V.S. Padma Krishnan, V. Gokula Velagapudi Ramakrishna Siddhartha Engineering College Department of Eie Vijayawada India Velagapudi Ramakrishna Siddhartha Engineering College Department of English AP Vijayawada India Arvind Gavali College of Engineering Department of E& Tc Engineering Maharashtra Satara India Panimalar Engineering College Department of Ece Tamil Nadu Chennai India S.R.K.R. Engineering College Department of Ece A.P. Bhimavaram India Saveetha School of Engineering Department of Cse Tamil Nadu Chennai India
The integration of Mobile Ad-hoc Networks (MANETs) in the Industrial Internet of Things (IIoT) facilitates decentralized communication between smart devices, offering flexibility for diverse applications such as law e... 详细信息
来源: 评论