咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是301-310 订阅
排序:
A Hardware Implementation of Anti-noise Bayesian Deconvolution Algorithm Based on FPGA and Network Port Transmission  4
A Hardware Implementation of Anti-noise Bayesian Deconvoluti...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Communication, EIECC 2024
作者: Zhou, Yinqi Feng, Shiwei Wang, Yaning Zhang, Boyang Beijing University of Technology Chaoyang District Beijing China
In the field of computer science and engineering, hardware acceleration and encryption are key technologies for improving computing power and ensuring information security. FPGAs can be used to accelerate core algorit... 详细信息
来源: 评论
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems  22
Fast Distributed Polynomial Multiplication Algorithm for Lat...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhao, Hongjian Tao, Yunting Kong, Fanyu Zhang, Guoyan Zhang, Hanlin Yu, Jia Shandong University School of Software Jinan China Binzhou Polytechnic College of Information Engineering Binzhou China Shandong University Shandong Sansec Information Technology Co. Ltd School of Software Jinan China Shandong University School of Cyber Science and Technology Qingdao China Qingdao University College of Computer Science and Technology Qingdao China
Lattice-based Post-Quantum Cryptography (PQC) can effectively resist the quantum threat to blockchain's underlying cryptographic algorithms. Blockchain node decryption is one of the most commonly used cryptographi... 详细信息
来源: 评论
A Multi-Layered Quantum-Resistant algorithms Based Approach to Mitigate Emerging Threats in ISP Cybersecurity  3
A Multi-Layered Quantum-Resistant Algorithms Based Approach ...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Alagh, Arjun Wason, Ritika Arora, Parul Dept. of Computer Science and Applications Delhi India
The Internet Service Providers (ISP), and their structures are at high risk with the growing quantity and complexity of cyber threats. The growth of quantum computing further elevates the risks and challenges especial... 详细信息
来源: 评论
Finding Zero Correlation Linear Hulls Using Quantum Bernstein-vazirani Algorithm
Finding Zero Correlation Linear Hulls Using Quantum Bernstei...
收藏 引用
2024 International Conference on Computational Intelligence and Communication System, CCICS 2024
作者: Xie, Huiqin Zhao, Zhangmei Beijing Electronic Science and Technology Institute Beijing100070 China
Facing the threat of quantum computing to cryptography schemes, it is urgent to study the applications of quantum algorithms to cryptanalysis and evaluate the security of cryptographic schemes in a quantum computing e... 详细信息
来源: 评论
Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT
Enhancing IoT Security: A Comprehensive Review of Lightweigh...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Pradana, Aditya Permana, Fahmi Candra Mutijarsa, Kusprasapta Bandung, Yoanes Institut Teknologi Bandung School of Electrical Engineering and Informatics Bandung Indonesia
In this paper, we review lightweight security approaches for resource-constrained IoT devices. Previous research has explored various lightweight cryptographic algorithms, such as PRESENT, PRIDE, SNOW-V, and ChaCha20 ... 详细信息
来源: 评论
Effective Adaptable Framework for Security of IoT Devices  3
Effective Adaptable Framework for Security of IoT Devices
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Sharma, Cheshta Sharma, Tripti Shri Venkateshwara University Department of Computer Science and Engineering Gajraula India Inderprasth Engineering College Department of Computer Science and Engineering Ghaziabad India
The Internet of Things (IoT) becomes the most demanding technology over the past few years. IoT is the basic need of daily life. The security of these devices is very important because they contain large files of sens... 详细信息
来源: 评论
Secure Data Transmission Through Applied Cryptography algorithms  15
Secure Data Transmission Through Applied Cryptography Algori...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Kumar, Anup Seth, Jyoti Chethan, M. Department of Mechnical Engineering ARKA JAIN University Jharkhand Jamshedpur India Department of Computer Science & Engineering Vivekananda Global University Jaipur India Karnataka Bangalore India
Comfy records transmission is a crucial generation in the data safety area. It entails the use of cryptographic algorithms to secure statistics in order that it cannot be accessed without authorization. Cryptography a... 详细信息
来源: 评论
Optimizing AES-256 with Keccak Permutations: Achieving High Security and Performance with Reduced Rounds  15
Optimizing AES-256 with Keccak Permutations: Achieving High ...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Chio, Ma. Esther B. Sison, Ariel M. Medina, Ruji P. Technological Institute of the Philippines Quezon City Philippines University of Science and Technology of Southern Philippines Cagayan de Oro City Philippines Emilio Aguinaldo College Manila Philippines
This study introduces an innovative approach to enhancing AES-256 encryption by integrating the Keccak permutation into its key generation process, aiming to improve both security and performance while reducing the nu... 详细信息
来源: 评论
Examining the Efficiency of Implemented Cryptographic algorithms for Blockchain Technologies  15
Examining the Efficiency of Implemented Cryptographic Algori...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Premalatha, K.P. Sahu, Kuldip Kumar Gour, Murli Manohar Department of Management School of Mangement - PG JAIN Karnataka Bangalore India Department of Mechnical Engineering ARKA JAIN University Jharkhand Jamshedpur India Department of Mathematics Vivekananda Global University Jaipur India
This paper explores the performance of implemented cryptography algorithms used for various blockchain technologies, which include Bitcoin, Ethereum, and Hyperledger. Diverse techniques for assessing cryptographic alg... 详细信息
来源: 评论
Improving Blockchain Privacy Security Based on Improved RSA Algorithm  5
Improving Blockchain Privacy Security Based on Improved RSA ...
收藏 引用
5th International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2024
作者: Zeng, Zhejun Lin, Ning Xiao, Qunli Xiao, HengHui Huang, Xubin Ning, Liyan Huang, Yusi Wu, Hongwu Mai, Zhuoqi Hu, Faming Guangdong Planning and Designing Institute of Telecommunication Co. Ltd. Guangdong China Guangdong Communications Services Company Limited Guangdong China
This paper proposes a blockchain privacy encryption scheme based on CRT-RSA algorithm. This encryption scheme decomposes the large integer modular operation of RSA algorithm into two smaller modular operations, which ... 详细信息
来源: 评论