咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 100 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 283 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 50 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 133 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 387 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 77 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
387 条 记 录,以下是271-280 订阅
排序:
Large Integer Decomposition encryption Algorithm for Computer Network Data Communication Combined with Double BP Neural Network Combination Model
收藏 引用
Procedia Computer Science 2023年 228卷 609-618页
作者: Dengjun Li Shujie Xiong Gang Yuan Jiangxi Provincial Party School Jiangxi Institute of Administration Nanchang Jiangxi 330000 China Jiangxi Electric Vocational Technical College Nanchang Jiangxi 330000 China
Usually a complete computer network system has the following components: source of signals, signal host, cryptographic regime, attack, and interceptor. It is more vulnerable to attacks during the operation of the syst... 详细信息
来源: 评论
AN END-TO-END GSM/SMS ENCRYPTED APPROACH FOR SMARTPHONE EMPLOYING ADVANCED encryption STANDARD (AES)
arXiv
收藏 引用
arXiv 2025年
作者: Abbas, Wasim Joshua, Salaki Reynaldo Abbas, Asim Lee, Je-Hoon Department of Electronics Information and Communication Engineering Kangwon National University Samcheok Korea Republic of Division of Computer Science Mathematics and Science St. John’s University QueensNY11439 United States
encryption is crucial for securing sensitive data during transmission over networks. Various encryption techniques exist, such as AES, DES, and RC4, with AES being the most renowned algorithm. We proposed methodology ... 详细信息
来源: 评论
Color Image encryption Based on Chaotic Systems and Dynamic Transformation Matrices
收藏 引用
International Journal of Network Security 2024年 第5期26卷 867-873页
作者: Xu, Chunming Zhang, Yong School of Mathematics and Statistics Yancheng Teachers University No.50 Kaifang Avenue Yancheng224002 China
Matrix transformation has been successfully used in image encryption. However, conventional image encryption algorithms often employ fixed transformation matrices, which limits the randomness and versatility of image ... 详细信息
来源: 评论
Unidirectional Key Update in Updatable encryption, Revisited
arXiv
收藏 引用
arXiv 2024年
作者: Jurkiewicz, Mariusz Prabucka, Kamila Military University of Technology Warsaw Poland
In this paper we construct a new efficient updatable encryption (UE) scheme based on FrodoPKE learning with errors key encapsulation [1]. We analyse the security of the proposed scheme in the backward-leak uni-directi... 详细信息
来源: 评论
Quantum Cryptanalysis: Analyzing Shor’s Algorithm and Its Impact on RSA Security  5th
Quantum Cryptanalysis: Analyzing Shor’s Algorithm and Its I...
收藏 引用
5th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, ICMISC 2024
作者: Purkar, Vaishnavi Khandu Gavande, Roshani Sunil Kulkarni, Shailaja Satishrao Thakar, H.S. Savitribai Phule Pune University Pune India
The security of long-standing cryptographic protocols such as the RSA algorithm is under threat from the emergence of quantum computing, which is transforming the landscape of cryptography. The interact... 详细信息
来源: 评论
Shifted Multiplicative Cipher System Based on the Algebraic Graph Theory for Generating Automorphic Graph Used for Image encryption
SSRN
收藏 引用
SSRN 2024年
作者: Aithal, Ganesh Kumar, Ranjan H.S. Shetty, Ganesh Vasanth, M.H. Karthik, K. Shri Madhwa Vadiraja Institute of Technology and Management Bantakal Karnataka Udupi India Vellore Institute of Technology Tamilnadu Vellore India National Institute of Technology Goa India Shriram Institute of Management and Technology India
The broad spectrum of cryptography provides secure protocols for communication and data security. These protocols are based on structures of mathematics such as groups, rings and fields. In particular, cyclic groups a... 详细信息
来源: 评论
An efficient construction of S-box based on the fractional-order Rabinovich-Fabrikant chaotic system
收藏 引用
INTEGRATION-THE VLSI JOURNAL 2024年 94卷
作者: Ullah, Saeed Liu, Xinge Waheed, Adil Zhang, Shuailei Cent South Univ Sch Math & Stat Changsha 410083 Hunan Peoples R China Natl Univ Modern Languages Fac Engn & Comp Sci Islamabad 44000 Pakistan Univ Educ Dept Informat Sci Div Sci & Technol Lahore 54770 Pakistan
For many block encryption algorithms, confusion properties are only related to the substitution box (S-box). The S-box is a crucial component of cryptography. The security of the whole system is affected by the Sbox. ... 详细信息
来源: 评论
On the Implementation and Security Analysis of Routable-GOOSE Messages Based on IEC 61850 Standard
On the Implementation and Security Analysis of Routable-GOOS...
收藏 引用
IEEE International Conference on Environment and Electrical Engineering (EEEIC) / IEEE Industrial and Commercial Power Systems Europe (I and CPS Europe) Conference
作者: Kharchouf, Ibtissam Alrashide, Abdulmeen Abdelrahman, Mahmoud S. Mohammed, Osama A. Florida Int Univ Dept Elect & Comp Engn Energy Syst Res Lab Miami FL 33174 USA
Advanced smart grid applications such as wide-area monitoring, protection, and control (WAMPAC), considerably depend on the synchrophasor measurements gathered from different locations of the power grid. These timesta... 详细信息
来源: 评论
A Detailed Study on Security and Privacy Analysis and Mechanisms in Cloud Computing
A Detailed Study on Security and Privacy Analysis and Mechan...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering, RMKMATE 2023
作者: Sukeerthi, Kooragayala Kesavan, R. Kalaiselvan, S.A. Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Avadi Chennai India
When it comes to delivering IT services to businesses or consumers, the cloud provides a scalable, reliable, and cost-effective option. However, there is an increased risk associated with cloud computing due to the fa... 详细信息
来源: 评论
Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems
Franklin Open
收藏 引用
Franklin Open 2024年 8卷
作者: Haridas, Thejas Upasana, S.D. Vyshnavi, G. Krishnan, Malavika S. Muni, Sishu Shankar School of Digital Sciences Digital University Kerala Kerala Thiruvananthapuram PIN 695317 India
Secure communication in the digital age is necessary;securing audio data becomes very critical since this is normally transmitted across susceptible networks. Traditional approaches to encryption, like Advanced Encryp... 详细信息
来源: 评论