咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是181-190 订阅
排序:
An Enhanced Vigenère encryption Algorithm using 6S-Substitution and 2S-Transposition Technique
An Enhanced Vigenère Encryption Algorithm using 6S-Substitu...
收藏 引用
2024 IEEE International Conference on Data and Software Engineering, ICoDSE 2024
作者: Galeza, Sugar Mae T. Sison, Ariel M. Medina, Ruji P. Graduate Program Technological Institute of the Philippines Quezon City Philippines School of Computer Studies Emilio Aguinaldo College Manila Philippines
Vigenère encryption algorithm is a classical cryptographic algorithm featuring a polyalphabetic stream cipher, which as numerous limitations pertaining to finding the size and length of the encryption key. This s... 详细信息
来源: 评论
Securing IoT Devices with Enhanced Tiny encryption Algorithm  3
Securing IoT Devices with Enhanced Tiny Encryption Algorithm
收藏 引用
3rd International Conference on Automation, Computing and Renewable Systems, ICACRS 2024
作者: Bhagya, S. Jain, Kurunandhan Krishnan, Prabhakar Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Kerala India
The exponential growth of Internet of Things (IoT) devices has brought about significant security challenges, particularly due to their limited computational resources and deployment in critical applications such as s... 详细信息
来源: 评论
A Survey of Blind Sorting Techniques: Approaches Using Fully Homomorphic encryption  15
A Survey of Blind Sorting Techniques: Approaches Using Fully...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Kim, Seunghu Son, Yongseok Paek, Jeongyeup Cho, Sungrae Lee, Hyung Tae School of Computer Science and Engineering Chung-Ang University Seoul Korea Republic of
With recent advancements in cloud services, the demand for data security during outsourced computations has been increasing. Fully Homomorphic encryption (FHE) offers a promising solution to this demand by enabling th... 详细信息
来源: 评论
A Data Spoofing encryption Algorithm for Data Security and Data Privacy  8
A Data Spoofing Encryption Algorithm for Data Security and D...
收藏 引用
8th International Conference on Information Technology, InCIT 2024
作者: Makasiranondh, Woratat Angsirikul, Supanit Aribarg, Anucha Rangsit University College of Digital Innovation Technology Pathumthani Thailand
Data security and data privacy are two hot topics in the research world because they cause big damage and are against PDPA laws. Hacker always uses a sophisticated way to hack into the official database. The purpose o... 详细信息
来源: 评论
Comparison of encryption Time for Multi-level Authentication in Cloud using Lightweight Cryptography Method over Chipper Text-PolicyAttribute Based encryption Algorithm  15
Comparison of Encryption Time for Multi-level Authentication...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Reddy, Peram Venkata Krishna Teja Thangaraj, S. John Justin Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Dept of CSE Chennai India
In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography strategy for secure cloud data sharing. Tools and Methods... 详细信息
来源: 评论
CRYPTANALYSIS OF CIKS-128 AND CIKS-128H SUITABLE FOR INTELLIGENT MULTIMEDIA AND UBIQUITOUS COMPUTING SYSTEMS
收藏 引用
COMPUTING AND INFORMATICS 2011年 第3期30卷 447-466页
作者: Lee, Changhoon Kim, Jongsung Sung, Jaechul Lee, Yang-Sun Lee, Chang Hoon Kyungnam Univ Div E Business Kyungnam South Korea Hanshin Univ Sch Comp Engn Hanshin South Korea Univ Seoul Dept Math Seoul South Korea Chosun Univ Dept Informat & Commun Engn Kwangju South Korea Hankyong Natl Univ Dept Comp Engn Ausung City South Korea
Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption sy... 详细信息
来源: 评论
Towards the design of new cryptographic algorithm and performance evaluation measures
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2024年 第4期83卷 9709-9759页
作者: Farooq, Anum Tariq, Sana Amin, Asjad Qureshi, Muhammad Ali Memon, Kashif Hussain Islamia Univ Bahawalpur Dept Comp Syst Engn Bahawalpur Pakistan Islamia Univ Bahawalpur Dept Elect Engn Bahawalpur Pakistan Islamia Univ Bahawalpur Dept Informat & Commun Engn Bahawalpur Pakistan
Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security issues, many advanced cryptographic algorithms have been proposed in the... 详细信息
来源: 评论
Secure data communication IoT and wireless sensor network for COVID-19
收藏 引用
INTERNATIONAL JOURNAL OF SENSOR NETWORKS 2021年 第1期36卷 11-24页
作者: Manoharan, Anto Merline Sumithra, M. G. Anna Univ Dept Informat & Commun Engn Chennai 600025 Tamil Nadu India KPR Inst Engn & Technol Dept Elect & Commun Engn Coimbatore 641407 Tamil Nadu India
Coronavirus disease (COVID 19) is the dangerous pandemic that scares the world from November 2019 affects more than 50% of the world population. Internet of things (IoT) is coming as a survivor to manage the pandemic ... 详细信息
来源: 评论
Ender Wiggin Played Mafia Wars Too
收藏 引用
IT PROFESSIONAL 2011年 第4期13卷 6-8页
作者: Laplante, Phillip A. Penn State Univ University Pk PA 16802 USA
Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good... 详细信息
来源: 评论
A survey on secure communication techniques for 5G wireless heterogeneous networks
收藏 引用
INFORMATION FUSION 2020年 62卷 89-109页
作者: Kakkar, Ajay TIET Patiala Punjab India
With the increasing number of emerging robust networks, the challenges to design new security protocols and techniques are never ending. With the enlargement of 5G paradigm, there is a remarkable makeshift in how the ... 详细信息
来源: 评论