咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是211-220 订阅
排序:
QFESTA: Efficient algorithms and Parameters for FESTA Using Quaternion Algebras  44th
QFESTA: Efficient Algorithms and Parameters for FESTA Using ...
收藏 引用
44th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
作者: Nakagawa, Kohei Onuki, Hiroshi NTT Social Informat Labs Minato City Japan Univ Tokyo Bunkyo City Japan
In 2023, Basso, Maino, and Pope proposed FESTA (Fast encryption from Supersingular Torsion Attacks), an isogeny-based public-key encryption (PKE) protocol that uses the SIDH attack for decryption. In the same paper, t... 详细信息
来源: 评论
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC algorithms FOR CLOUD SECURITY  2
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD S...
收藏 引用
International Conference on Inventive Communication and Computational Technologies (ICICCT)
作者: Vennela, G. Sai Varun, N. Venkata Neelima, N. Priya, L. Sai Yeswanth, J. VR Siddhartha Engn Coll Dept Informat Technol Vijayawada Andhra Pradesh India VR Siddhartha Engn Coll Dept IT Vijayawada Andhra Pradesh India
Cloud generally relates to storing, processing and managing of data over a network. The cloud provides mainly three services, storage as a service, platform as a service and software as a service using internet, based... 详细信息
来源: 评论
Reviewing Crypto-Agility and Quantum Resistance in the Light of Agile Practices
Reviewing Crypto-Agility and Quantum Resistance in the Light...
收藏 引用
24th International Conference on Agile Software Development (XP)
作者: Marchesi, Lodovica Marchesi, Michele Tonelli, Roberto Univ Cagliari Dept Math & Comp Sci Cagliari Italy
The term crypto-agility means the ability to quickly and securely change cryptographic algorithms and related data, in the case of their compromise. In this context, the advent of quantum computing constitutes a new p... 详细信息
来源: 评论
Large Integer Decomposition encryption Algorithm for Computer Network Data Communication Combined with Double BP Neural Network Combination Model
收藏 引用
Procedia Computer Science 2023年 228卷 609-618页
作者: Dengjun Li Shujie Xiong Gang Yuan Jiangxi Provincial Party School Jiangxi Institute of Administration Nanchang Jiangxi 330000 China Jiangxi Electric Vocational Technical College Nanchang Jiangxi 330000 China
Usually a complete computer network system has the following components: source of signals, signal host, cryptographic regime, attack, and interceptor. It is more vulnerable to attacks during the operation of the syst... 详细信息
来源: 评论
Some Graph Based encryption Techniques
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2727-2734页
作者: Narayan, H Dhanvanth Bhat, Surekha Ravishankar Bhat, Ravishankar Bhat, Smitha Ganesh Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India Department of Mathematics Milagres College Kallianpur Karnataka Udupi574111 India Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India
In today’s fast-evolving technological environment, ensuring confidentiality is of utmost importance. Cryptography stands as a critical discipline in safeguarding information from unauthorized access. It employs vari... 详细信息
来源: 评论
A Novel Effective Framework for Medical Images Secure Storage Using Advanced Cipher Text Algorithm in Cloud Computing
A Novel Effective Framework for Medical Images Secure Storag...
收藏 引用
IEEE International Conference on Imaging Systems and Techniques (IST)
作者: Praveen, S. Phani Sindhura, S. Madhuri, A. Karras, Dimitrios A. PVPSIT Dept Comp Sci & Engn Vijayawada AP India KoneruLakshmaiah Educ Fdn Dept Comp Sci & Engn Vaddeswaram AP India Natl & Kapodistrian Univ Athens NKUA Dept Gen Fac Sci Athens Greece
Cloud computing is one of the emerging technologies in present world. Many cloud computing services such as data storage, data usage and other types of services are available. Medical images storage is most widely use... 详细信息
来源: 评论
Employing Quantum Mechanics for Quantum Cryptography
Employing Quantum Mechanics for Quantum Cryptography
收藏 引用
International Conference on Computational Science and Computational Intelligence (CSCI)
作者: Abhanu, Rasika Aruigu, Naveen Bale, Sowmya Beeram, Geethanjali Bhattu, Zurendra Sai Raj Mahmoud, Mohammed Clark Univ Sch Profess Studies Worcester MA 01610 USA Univ Jamestown Dept Comp Sci Jamestown ND USA
Quantum cryptography is a field of study that explores the use of quantum mechanics to create new cryptographic techniques that are more secure than traditional cryptography. With the advancement of quantum computing ... 详细信息
来源: 评论
Security Data Management Process and its Impact on Smart Cities' Wireless Sensor Networks
Security Data Management Process and its Impact on Smart Cit...
收藏 引用
Conference on South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media (SEEDA-CECNSM)
作者: Antonopoulos, K. Petropoulos, Ch. Antonopoulos, Ch. P. Voros, N. S. TEI Western Greece Comp & Informat Engn Dept Antirio Greece
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scen... 详细信息
来源: 评论
Enhancing Protection Techniques of E-Banking Security Services Using Open Source Cryptographic algorithms
Enhancing Protection Techniques of E-Banking Security Servic...
收藏 引用
14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
作者: Khelifi, Adel Aburrous, Maher Abu Talib, Manar Shastry, P. V. S. ALHOSN Univ Software Engn Dept Abu Dhabi U Arab Emirates Zayed Univ Coll Technol Innovat Abu Dhabi U Arab Emirates Coll Engn Elect & Telecomm Dept Pune 411052 Maharashtra India
security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long ti... 详细信息
来源: 评论
Security Necessity and its Impact on Smart Cities' Wireless Sensor Networks
Security Necessity and its Impact on Smart Cities' Wireless ...
收藏 引用
Conference on South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media (SEEDA-CECNSM)
作者: Antonopoulos, K. Petropoulos, Ch. Antonopoulos, Ch. P. Voros, N. S. TEI Western Greece Comp & Informat Engn Dept Antirio Greece
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scen... 详细信息
来源: 评论