咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是21-30 订阅
排序:
Analysis of Hopfield Chaotic Neural Network Based Image encryption Algorithm in Communication Security Application
收藏 引用
International Journal of Network Security 2025年 第2期27卷 274-284页
作者: Jin, Xinsheng Henan Logistics Vocational College Zhengzhou450012 China
In the digital era, image encryption security is a focus. Facing security risks such as the irrelevance of plaintext and ciphertext and the independence of the disarrangement and diffusion steps, a new algorithm combi... 详细信息
来源: 评论
Compact and Secure Image encryption for IoT Systems Employing ECC and AES Hybrid Cryptography
Compact and Secure Image Encryption for IoT Systems Employin...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science, SCEECS 2025
作者: Wandile, Piyush S Singh Kirar, Bhupendra Jain, Saurabh Sahu, Yatendra Computer Science and Engineering Indian Institute of Information Technology Madhya Pradesh Bhopal India Electronics and Communications Engineering Indian Institute of Information Technology Madhya Pradesh Bhopal India
This study focuses on development of a secure and efficient image cryptosystem optimized for IoT devices. The proposed technique addresses the and resource constraints of IoT devices, it introduces a hybrid encryption... 详细信息
来源: 评论
Research on Secure encryption Communication Method for Unmanned Aerial Vehicle System Based on Hybrid encryption Algorithm  24
Research on Secure Encryption Communication Method for Unman...
收藏 引用
8th International Conference on Electronic Information Technology and Computer Engineering, EITCE 2024
作者: Su, Haohui Luo, Wangchun Zhang, Xinghua The Electric Power Research Institute of the Ultra High Voltage Transmission Company of China Southern Power Grid Co. Ltd. Guangdong Guangzhou China
In order to ensure the security of communication information under attack, a research on secure encrypted communication method for unmanned aerial vehicle systems based on hybrid encryption algorithm is proposed. Afte... 详细信息
来源: 评论
Quantum image encryption algorithm based on generalized Arnold transform and Lorenz chaotic systems
Quantum image encryption algorithm based on generalized Arno...
收藏 引用
2024 International Conference Optoelectronic Information and Optical Engineering, OIOE 2024
作者: Zhang, Ruqing School of Information Engineering Shanghai Maritime University Shanghai201306 China
With the rapid development of the internet and information technology, the traditional encryption methods suffer from drawbacks such as poor processing capacity and low security, making them vulnerable to attacks. Thi... 详细信息
来源: 评论
Low Area Design and Implementation of Lightweight encryption Algorithm on FPGA for IoT Devices  4
Low Area Design and Implementation of Lightweight Encryption...
收藏 引用
4th IEEE International Conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Kumar, Keshav Ramasubramanian, Dr Chinnaiyan Pandey, Bishwajeet Department of E.C.E Haryana Faridabad India GL Bajaj College of Technology and Management Greater Department of MCA Noida India
The increasing necessity for secure communication in resource-constrained platforms those found in the Internet of Things (IoT), has drawn to a key spike in demand for lightweight symmetric cyphers. However, a number ... 详细信息
来源: 评论
A Reversible Data Hiding in encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic encryption Algorithm  21st
A Reversible Data Hiding in Encryption Domain for JPEG Ima...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Ma, Bin Zhao, Chunxin Ma, Ruihe Xian, Yongjin Wang, Chunpeng Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Economics Jilin University Changchun130015 China
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted... 详细信息
来源: 评论
Genetic Algorithm Powered Bivariate Function encryption for Robust Data Security  4
Genetic Algorithm Powered Bivariate Function Encryption for ...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Hariharan, N.R. Ritheshwar, R.Sai Suseendran, R. Meena, R. Kalaiselvi, T. Easwari Engineering College Department of Artificial Intelligence and Data Science Chennai India
This paper introduces a new encryption technique which bases its operations on advanced bivariate mathematical functions and uses a genetic algorithm to optimize these along with random key generation techniques. This... 详细信息
来源: 评论
Using the y-intercept in Collision Attacks for encryption  15
Using the y-intercept in Collision Attacks for Encryption
收藏 引用
15th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2025
作者: Singh, Mandeep Carlson, Albert Briscoe, Christopher Entropy and Encryption Quantum Security Alliance KyleTX United States Emet Classical Academy Department of Mathematics and Physics New YorkNY United States
Patterns are key to decrypting messages. Language is composed of repeat groupings of symbols encoded in words and the syntax of a language. Patterns bleed through encryption since all encryption algorithms can be repl... 详细信息
来源: 评论
Research on Image encryption Algorithm Based on Four-Dimensional Hyperchaotic System and Mandelbrot Set
Research on Image Encryption Algorithm Based on Four-Dimensi...
收藏 引用
作者: Sun, Yanling Jiang, Tianjiao Liu, Baoxing Li, Yingqi Xiao, Mingkun Su, Qun Faculty of Science Shenyang Jianzhu University Shenyang China School of Computer Science and Engineering Shenyang Jianzhu University Shenyang China
In view of the problems of small key space and poor key sensitivity in classical image encryption algorithm, the characteristics of chaotic system and M set are analyzed, and a new image encryption algorithm is propos... 详细信息
来源: 评论
Quantum Key-Revocable Dual-Regev encryption, Revisited  22nd
Quantum Key-Revocable Dual-Regev Encryption, Revisited
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Ananth, Prabhanjan Hu, Zihan Huang, Zikuan UCSB Santa Barbara United States EPFL Lausanne Switzerland Tsinghua University Beijing China
Quantum information can be used to achieve novel cryptographic primitives that are impossible to achieve classically. A recent work by Ananth, Poremba, Vaikuntanathan (TCC 2023) focuses on equipping the dual-Regev enc... 详细信息
来源: 评论