咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 100 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 283 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 50 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 133 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 387 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 77 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
387 条 记 录,以下是281-290 订阅
排序:
A Novel Image encryption Algorithm Based on Chaotic Tent Mapping  3rd
A Novel Image Encryption Algorithm Based on Chaotic Tent Map...
收藏 引用
3rd International Conference on Cyberspace Simulation and Evaluation, CSE 2024
作者: Zhou, Xiangwei Sun, Hao Chen, Jia Zhao, Huan Zhang, Bo Travelsky Technology Limited Beijing101318 China Key Laboratory of Intelligent Application Technology for Civil Aviation Passenger Services CAAC Beijing101318 China
The security of data transmission across networks is paramount, where encryption poses a formidable challenge in network security. While chaos-based image encryption algorithms have garnered considerable research atte... 详细信息
来源: 评论
Detecting Anomalies on Cryptocurrency Markets Using Graph algorithms
Detecting Anomalies on Cryptocurrency Markets Using Graph Al...
收藏 引用
12th International Conference on Data Science, Technology and Applications, DATA 2023
作者: Skorupka, Agata Collegium of Economic Analysis Warsaw School of Economics Warsaw Poland
The low level regulation of cryptocurrency market as well as crucial role of trust and digital market specificity makes it a good environment for anonymous transactions without identity verification, therefore fraudul... 详细信息
来源: 评论
An efficient multimedia compression-encryption scheme using latin squares for securing internet of things networks
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 64卷
作者: El-Shafai, Walid Mesrega, Ahmed K. Ahmed, Hossam Eldin Abdelwahab, Nermin Abd El-Samie, Fathi E. Menoufia Univ Fac Elect Engn Dept Elect & Elect Commun Engn Menoufia Egypt Prince Sultan Univ Comp Sci Dept Secur Engn Lab Riyadh 11586 Saudi Arabia Menoufia Univ Fac Elect Engn Dept Comp Sci & Engn Menoufia Egypt Princess Nourah Bint Abdulrahman Univ Coll Comp & Informat Sci Dept Informat Technol Riyadh 84428 Saudi Arabia
The security of multimedia data and its applications has become a building block of any digital communication technology. The extensive use of multimedia content over wireless networks makes the applications exposed t... 详细信息
来源: 评论
Research and Application of Block Chain Technology in Electricity Market Transactions  4
Research and Application of Block Chain Technology in Electr...
收藏 引用
4th International Conference on Smart Power and Internet Energy Systems (SPIES)
作者: Zhang, Ye Wang, Rongmao Li, Qingchun Xia, Nannan Zhang, Na Hu, Jingwei Liaoning Elect Power Trading Ctr Co Ltd Shenyang Peoples R China State Grid Liaoning Elect Power Co Ltd Econ & Technol Res Inst Shenyang Peoples R China
With the entry of large-scale commercial power users into the market, the electricity trading retail market faces a surge in the number of users, agency relationships, and retail-side settlement. All these pose huge c... 详细信息
来源: 评论
The Spatial Data Sharing Security Model Based on Hybrid encryption Algorithm
The Spatial Data Sharing Security Model Based on Hybrid Encr...
收藏 引用
International Symposium on Artificial Intelligence and Robotics
作者: Wang, Di Lva, Yanli Chen, Yuxi Yang, Ruxia State Grid Corp China Big Data Ctr Beijing Peoples R China Global Energy Interconnect Res Inst Co Ltd Nanjing Peoples R China State Grid Key Lab Informat & Network Secur Nanjing Peoples R China
Hybrid encryption algorithms are flexible tools for modeling the correlation of random variables. They cover the scope from completely negative correlation to positive correlation, including independent cases and cont... 详细信息
来源: 评论
Secure data communication IoT and wireless sensor network for COVID-19
收藏 引用
INTERNATIONAL JOURNAL OF SENSOR NETWORKS 2021年 第1期36卷 11-24页
作者: Manoharan, Anto Merline Sumithra, M. G. Anna Univ Dept Informat & Commun Engn Chennai 600025 Tamil Nadu India KPR Inst Engn & Technol Dept Elect & Commun Engn Coimbatore 641407 Tamil Nadu India
Coronavirus disease (COVID 19) is the dangerous pandemic that scares the world from November 2019 affects more than 50% of the world population. Internet of things (IoT) is coming as a survivor to manage the pandemic ... 详细信息
来源: 评论
New video encryption schemes based on chaotic maps
收藏 引用
IET IMAGE PROCESSING 2020年 第2期14卷 397-406页
作者: Elkamchouchi, Hassan Salama, Wessam M. Abouelseoud, Yasmine Alexandria Univ Fac Engn Dept Elect Engn Alexandria Egypt Pharos Univ Dept Basic Sci Alexandria Egypt Alexandria Univ Fac Engn Dept Engn Math Alexandria Egypt
Two new encryption algorithms for secure video transmission are proposed in this paper. The two algorithms employ different types of chaotic maps to generate the keystream for encrypting the video frames. Both algorit... 详细信息
来源: 评论
Constructing Next-Generation IoT Security: Embedded Smart Contracts and Multi-Layer Security Protection
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhang, Linchao Hang, Lei Zu, Keke Wang, Yi Yang, Kun University of Electronic Science and Technology of China Quzhou324003 China Department of Fintech Shanghai Normal University Tianhua College Shanghai201815 China
With the rapid development of Internet of Things (IoT) technology, interconnectivity between devices has become increasingly widespread. However, traditional IoT security measures struggle to cope with increasingly co... 详细信息
来源: 评论
Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第16期18卷 158-173页
作者: Mwakajwanga, Gwamaka Mwambe, Othmar Dar es salaam Tanzania United Republic of Dar es salaam Tanzania United Republic of
Nowadays, man-in-the-middle (MITM) attacks have become a large problem due to the advancement of computational power and interactive mobile technologies. Message security is a crucial concern that ought to be managed ... 详细信息
来源: 评论
Information Security by employing RSA Algorithm and Graph Labeling
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2563-2568页
作者: Vani Shree, S. Dhanalakshmi, S. Department of Mathematics SRM Institute of Science and Technology - Ramapuram Chennai600089 India Department of Mathematics Faculty of Engineering and Technology SRM Institute of Science and Technology - Ramapuram Chennai600089 India
The RSA technique provides security for every user connected across the network. The mathematical factorization problem, which demonstrates how challenging it is to find two prime numbers whose product equals a partic... 详细信息
来源: 评论