咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 285 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 105 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 85 篇 电气工程
    • 51 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 136 篇 理学
    • 89 篇 数学
    • 42 篇 物理学
    • 15 篇 化学
    • 15 篇 统计学(可授理学、...
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 390 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 6 篇 aes
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 rsa
  • 5 篇 des
  • 5 篇 encryption
  • 4 篇 ecc
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 307 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
390 条 记 录,以下是251-260 订阅
排序:
Hardware implementation of lightweight cryptographic algorithms: An overview
Hardware implementation of lightweight cryptographic algorit...
收藏 引用
2024 International Conference Automatics and Informatics, ICAI 2024
作者: Dimitrova, Dilyana Dimitrov, Ivaylo Nikola Vaptsarov Naval Academy Department of Information Technologies Varna Bulgaria Blu11 Ltd Engineering Department Varna Bulgaria
The main aim of the paper is to evaluate and compare the hardware implementation of three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus to determine their efficiency and suitability for IoT enviro... 详细信息
来源: 评论
A Mobile Adaptive Elliptic Curve Cryptography Technique for Internet of Things Device
A Mobile Adaptive Elliptic Curve Cryptography Technique for ...
收藏 引用
2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Adeniyi, Abidemi Emmanuel Gbenga Jimoh, Rasheed Bowen University College of Computing and Communication Studies Department of Computer Science Iwo Nigeria University of Ilorin Faculty of Communication and Information Sciences Department of Computer Science Ilorin Nigeria
Cryptography is a bedrock of IoT security, and elliptic curve cryptography (ECC) has been recognized as a potential option due to its effectiveness and robust security qualities. The heterogeneous nature of IoT deploy... 详细信息
来源: 评论
A Dual-Layer Approach: Combining Lightweight and Dynamic RSA for Enhanced Data Security  5
A Dual-Layer Approach: Combining Lightweight and Dynamic RSA...
收藏 引用
5th IEEE International Conference on Communication, Computing and Industry 6.0, C2I6 2024
作者: Balaji, R. Sriraam, C. Lionel Donato, L. Ragav, Krithin Kanthimathi, S. Vellore Institute of Technology School of Computer Science and Engineering TamilNadu Chennai India
An important aspect for both individuals and business data is security. Security has been studied extensively by many researchers. Security gaps or threats are ever increasing, and data protection is a primary issue. ... 详细信息
来源: 评论
Hypercomplex Numbers in Cryptosystems
Hypercomplex Numbers in Cryptosystems
收藏 引用
International Conference on Current Problems of Applied Mathematics and Computer Systems, CPAMCS 2023
作者: Dukhnich, Evgeny Chefranov, Alexander Admiral Ushakov Maritime State University Novorossiysk Russia Eastern Mediterranean University North Cyprus Famagusta Cyprus
A systematic analysis of the use of the hypercomplex numbers in the construction of the cryptographic algorithms is given. The cases of constructing various types of ciphers, both symmetric and asymmetric, with the us... 详细信息
来源: 评论
IoT Security Based On Lightewight Cryptographic (LWC) algorithms: A survey  25
IoT Security Based On Lightewight Cryptographic (LWC) Algori...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al-Mousa, Mohammad Rasmi Suleiman Al-Zou'bi, Samah Askar, Sami Alqawasmi, Khaled Al-Sherideh, Ala'a Saeb Samara, Ghassan Almatarneh, Rami Khouj, Mohammed Odeh, Mahmoud Zarqa University Department of Cybersecurity Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
The Internet of Things is millions of devices that communicate with each other and transmit sensitive information between them. The information is collected through the sensors on these devices, and is transmitted bet... 详细信息
来源: 评论
Public-key encryption from a trapdoor one-way embedding of SL2()
arXiv
收藏 引用
arXiv 2024年
作者: Hines, Robert
We obfuscate words of a given length in a free monoid on two generators with a simple factorization algorithm (namely SL2()) to create a public-key encryption scheme. We provide a reference implementation in Python an... 详细信息
来源: 评论
Research on encryption Protection of Patients’ Electronic Medical Privacy Data from the Legal Perspective
收藏 引用
International Journal of Network Security 2024年 第5期26卷 761-766页
作者: Wang, Feng Yang, Fei Tibet Police College The Tibet Autonomous Region No. 68 Duodi Road Chengguan District Lasa City850000 China
The medical privacy of patients is protected by law. This paper briefly introduces the legal basis of medical privacy protection and the attribute-based encryption algorithm used for encrypting medical privacy data. A... 详细信息
来源: 评论
Enhancing Protection Techniques of E-Banking Security Services Using Open Source Cryptographic algorithms
Enhancing Protection Techniques of E-Banking Security Servic...
收藏 引用
14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
作者: Khelifi, Adel Aburrous, Maher Abu Talib, Manar Shastry, P. V. S. ALHOSN Univ Software Engn Dept Abu Dhabi U Arab Emirates Zayed Univ Coll Technol Innovat Abu Dhabi U Arab Emirates Coll Engn Elect & Telecomm Dept Pune 411052 Maharashtra India
security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long ti... 详细信息
来源: 评论
Memristor-Based Chaotic Circuit Design on Image En/Decryption  31
Memristor-Based Chaotic Circuit Design on Image En/Decryptio...
收藏 引用
31st Youth Academic Annual Conference of Chinese-Association-of-Automation (YAC)
作者: Hu, Qingqing Yu, Yongbin Men, Lefei Lei, Fei Zhang, Huan Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Sichuan Peoples R China
Two kinds of image encryption algorithms based on a three-dimensional chaotic system is presented in this paper. Firstly, a new three-dimensional chaotic circuit based on memristor is designed, and the characteristics... 详细信息
来源: 评论
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC algorithms FOR CLOUD SECURITY  2
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD S...
收藏 引用
International Conference on Inventive Communication and Computational Technologies (ICICCT)
作者: Vennela, G. Sai Varun, N. Venkata Neelima, N. Priya, L. Sai Yeswanth, J. VR Siddhartha Engn Coll Dept Informat Technol Vijayawada Andhra Pradesh India VR Siddhartha Engn Coll Dept IT Vijayawada Andhra Pradesh India
Cloud generally relates to storing, processing and managing of data over a network. The cloud provides mainly three services, storage as a service, platform as a service and software as a service using internet, based... 详细信息
来源: 评论