咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 100 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 283 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 50 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 133 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 387 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 77 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
387 条 记 录,以下是231-240 订阅
Performance Evaluation of Block Cipher algorithms Implementations in ARM Architecture  4
Performance Evaluation of Block Cipher Algorithms Implementa...
收藏 引用
4th IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
作者: Lopez Hernandez, Lissete Cabrera, Alberto Palacios Priego, Mario D. Perez De Abiega-L'eglisse, Alfonso F. Gallegos-Garcia, Gina Escuela Superior de Cómputo Instituto Politécnico Nacional Mexico City Mexico Tecnológico de Monterrey Science and Mathematics Department N.L. Monterrey Mexico Instituto Politécnico Nacional Centro de Investigación en Computación Mexico City Mexico
Since the arrival of devices connected to the Internet, cryptographic goals have become a constant challenge for cybersecurity specialists. Data transmitted between IoT devices can become sensitive depending on the ap... 详细信息
来源: 评论
Real Running Time Analysis of Multi Prime RSA Algorithm and XRSA in Securing Digital Messages
Real Running Time Analysis of Multi Prime RSA Algorithm and ...
收藏 引用
2024 International Conference on Information Technology Research and Innovation, ICITRI 2024
作者: Syanti, Nurfadhilah Budiman, Mohammad Andri Sawaluddin Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Mathematics and Sciences Medan Indonesia
All digital information exchange is not free from security threats in terms of information exchange, so a technique or method is needed to make message exchange in today's all-digital era safer. Therefore, this re... 详细信息
来源: 评论
An Implementation of R-Ate Pairing Based on FPGA  3
An Implementation of R-Ate Pairing Based on FPGA
收藏 引用
3rd International Conference on Big Data, Information and Computer Network, BDICN 2024
作者: Dong, Xiuze Gao, Mingze Ma, Xujian Xiao, Chaoen Zhang, Lei Beijing Electronic Science and Technology Institute Beijing100070 China
R-Ate pair is an important bilinear mapping in state secret SM9 cryptographic algorithm, and its computational efficiency is closely related to the implementation performance of SM9. This scheme uses variable-length M... 详细信息
来源: 评论
End to End Encrypted Messaging Application Using ORDEX  6
End to End Encrypted Messaging Application Using ORDEX
收藏 引用
6th International Conference on Electrical, Control and Instrumentation Engineering, ICECIE 2024
作者: Vishwas, M. Raghav Loknath, V. Agrawal, Vinti Mehta, Vishwa Mehul Sarasvathi, V. Computer Science and Engineering PES University Bangalore India
An end-to-end encrypted chatting application focuses on securely transmitting sensitive information. It prevents the intrusion of malicious parties with any ill intent. It is especially needed in organizations where e... 详细信息
来源: 评论
Construction of Nonlinear Cryptographic Protocol based on Multiple Linear Cryptosystems  14
Construction of Nonlinear Cryptographic Protocol based on Mu...
收藏 引用
14th International Conference on Advanced Computer Information Technologies, ACIT 2024
作者: Muliar, Ihor Anikin, Volodymyr Yatskiv, Vasyl Kulyna, Serhii Humennyy, Petro Kulyna, Halyna Khmelnytskyi National University Department of Cybersecurity Khmelnytskyi Ukraine West Ukrainian National University Department of Cybersecurity Ternopil Ukraine West Ukrainian National University Department of Specialized computer systems Ternopil Ukraine West Ukrainian National University Department of Financial Technologies and Banking Business Ternopil Ukraine
The paper describes the construction of nonlinear cryptographic protocol, based on separate linear cryptosystems. Implementation of suggested construction scheme enables encryption of data blocks with ready-made and p... 详细信息
来源: 评论
An Improved Secured Hash Algorithm(SHA1) Using Padding Index Method  1
An Improved Secured Hash Algorithm(SHA1) Using Padding Index...
收藏 引用
1st International Conference on Cyber Security and Computing, CyberComp 2024
作者: De Guzman, Larry B Salvador, Christian Ian P. Isabela State University College of Information Communication technology Isabela San Mateo Philippines
Today, hashing algorithms are employed in many applications for security purposes. Many developments have been made in the family of hashing algorithms, especially the SHA1 algorithm. Because of flaws in the past year... 详细信息
来源: 评论
A Group Ring-Based Provably Secure and Efficient Identity-Based Signature Scheme  1
收藏 引用
Congress on Smart Computing Technologies, CSCT 2023
作者: Kumar, Sunil Mittal, Gaurav Yadav, Arvind DRDO Near Metcalfe House New Delhi110054 India Department of Mathematics University of Delhi New Delhi110007 India Department of Mathematics Hansraj College University of Delhi New Delhi110007 India
Due to the advent of polynomial time quantum algorithms to solve well-known hard mathematical problems, various secure cryptographic primitives are vulnerable against large quantum computers. However, no such quantum ... 详细信息
来源: 评论
Employing Quantum Mechanics for Quantum Cryptography
Employing Quantum Mechanics for Quantum Cryptography
收藏 引用
International Conference on Computational Science and Computational Intelligence (CSCI)
作者: Abhanu, Rasika Aruigu, Naveen Bale, Sowmya Beeram, Geethanjali Bhattu, Zurendra Sai Raj Mahmoud, Mohammed Clark Univ Sch Profess Studies Worcester MA 01610 USA Univ Jamestown Dept Comp Sci Jamestown ND USA
Quantum cryptography is a field of study that explores the use of quantum mechanics to create new cryptographic techniques that are more secure than traditional cryptography. With the advancement of quantum computing ... 详细信息
来源: 评论
Image encryption algorithm based on hyperchaotic system and dynamic DNA encoding
收藏 引用
PHYSICA SCRIPTA 2023年 第11期98卷 115215-115215页
作者: Liang, Wuyan Zhang, Limin Yang, Zhongbao Yu, Tingting Li, Jingjing Li, Xianli Northeast Petr Univ Coll Phys & Elect Engn 99 Xuefu St Daqing 163318 Peoples R China
Since the existing DNA encryption algorithms only have fixed DNA coding and decoding rules and a single algorithm that cannot meet more complex and more secure encryption requirements, an image encryption algorithm ba... 详细信息
来源: 评论
A Complementary Algorithm for Image Cryptosystems to Enhance Entropy  9
A Complementary Algorithm for Image Cryptosystems to Enhance...
收藏 引用
9th International Conference on Mobile and Secure Services, MOBISECSERV 2024
作者: Cardona-Lopez, Manuel Alejandro Chimal-Eguia, Juan Carlos Silva-Garcia, Victor Manuel Flores-Carapia, Rolando Centro de Investigación en Computación Instituto Politécnico Nacional Mexico City Mexico Centro de Innovación y Desarrollo Tecnológico en Cómputo Instituto Politécnico Nacional Mexico City Mexico
Each new image cryptosystem aims to achieve improved security results, with entropy being one of the primary measures for quantifying its security. For 8-bit images, the ideal entropy value is 8.0. However, various en... 详细信息
来源: 评论