咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
389 条 记 录,以下是331-340 订阅
排序:
Access Control of Data with Different Sensitivities in Power Substations Based on Improved ABE Algorithm  11
Access Control of Data with Different Sensitivities in Power...
收藏 引用
11th International Forum on Electrical Engineering and Automation, IFEEA 2024
作者: Yang, Kun Ao, Zhiqi Li, Xiaolu Management Science Research Institute Guangdong Power Grid Corporation Guangzhou510062 China China Southern Power Grid Digital Platform Technology Company Guangdong Guangzhou510000 China CSG Digital Power Grid Research Institute Co. Ltd. Guangdong Guangzhou510000 China
In the power grid, due to the diversity of data sensitivity, a reasonable encryption strategy is designed to ensure that only users with corresponding attributes can access data of specific sensitivity. Therefore, a d... 详细信息
来源: 评论
The Quantum Resistant Cryptographic Algorithm Based on OTP Cipher and Hash Function
The Quantum Resistant Cryptographic Algorithm Based on OTP C...
收藏 引用
2024 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2024
作者: Dung, Luu Hong Duc, Tong Minh Kim, Tuan Nguyen Trang, Nong Phuong Military Technical Academy Faculty of Informationn Technology Ha Noi Viet Nam School of Computer Science Duy Tan University Da Nang Viet Nam
The article proposes a new quantum-resistant cryptographic algorithm constructed based on the OTP (One-Time Pad) cipher and a hash function. By inheriting the property of 'perfect secrecy' from the OTP cipher,... 详细信息
来源: 评论
Mathematical Insights into Cryptographic algorithms: Recent Analysis and Future Directions  3
Mathematical Insights into Cryptographic Algorithms: Recent ...
收藏 引用
3rd IEEE North Karnataka Subsection Flagship International Conference, NKCon 2024
作者: Sharma, Kapil Dev Saini, Hemraj Johari, Suchi Dit University School of Computing Dehradun248009 India
Particularly, in the last two decades, digital technologies have rapidly grown in a walk of life such as education, finance, information technology, e-vehicles, smart-homes, health care, etc. Therefore, the involved d... 详细信息
来源: 评论
Quantum security analysis of SM4 algorithm  6
Quantum security analysis of SM4 algorithm
收藏 引用
6th International Conference on Wireless Communications and Smart Grid, ICWCSG 2024
作者: Yang, Hao Wang, Chunhong Tang, Xueming Cui, Yongquan Lu, Songfeng Cai, Dunbo Qian, Ling Zhang, Runqing Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Maritime Communication Research Institute Wuhan430010 China Software Technology Co. Ltd. Suzhou215153 China
The security of commercial encryption algorithms has always been a focus of attention. The SM4 algorithm, a commercial cryptographic standard, has been recognized by ISO/IEC as an international standard and has shown ... 详细信息
来源: 评论
A Methodology Survey of Neural Cryptography using Convolutional Neural Network, Quantization and Key Exchange  8
A Methodology Survey of Neural Cryptography using Convolutio...
收藏 引用
8th IEEE International Conference on Information and Communication Technology, CICT 2024
作者: Kaillash Kumar, S. Dhalia Sweetlin, J. Horsley Solomon, P. Anna University Department of Information Technology Chennai India Srm Arts and Science College Department of Electronics&Commn Science Chennai India
The proposed study explores the use of convolutional neural networks (CNNs) in the field of neural cryptography, aiming to improve secure communication protocols with more adaptive, data-driven models. Moving away fro... 详细信息
来源: 评论
Application and Research of National Security Algorithm in Primary School Student Custody System  24
Application and Research of National Security Algorithm in P...
收藏 引用
3rd International Conference on Computer, Artificial Intelligence and Control Engineering, CAICE 2024
作者: Zhang, Jun Zeng, Qingqing Chen, Yihua Guangzhou Xinhua University Guangzhou China
This article explores the application and research of National encryption Algorithm in the primary school student supervision system's function of binding and picking up personnel. Firstly, the basic principles of... 详细信息
来源: 评论
A Method for Anomaly Detection of Encrypted Traffic in Power IoT Base on Security Baseline Learning  4
A Method for Anomaly Detection of Encrypted Traffic in Power...
收藏 引用
4th International Conference on Digital Data Processing, DDP 2024
作者: Peng, Zhou Qiang, Xu Lizhi, Hu Menglin, Li State Grid Zhejiang Co. Ltd. Information and Communication Branch Hangzhou China China Electric Power Research Institute Information and Communication Branch Beijing China
As numerous power IoT terminals require secure access to the power grid, how to detect the encrypted malicious traffic in power IoT becomes a challenge. Following an in-depth investigation of potential security risks ... 详细信息
来源: 评论
Shifted Multiplicative Cipher System Based on the Algebraic Graph Theory for Generating Automorphic Graph Used for Image encryption
SSRN
收藏 引用
SSRN 2024年
作者: Aithal, Ganesh Kumar, Ranjan H.S. Shetty, Ganesh Vasanth, M.H. Karthik, K. Shri Madhwa Vadiraja Institute of Technology and Management Bantakal Karnataka Udupi India Vellore Institute of Technology Tamilnadu Vellore India National Institute of Technology Goa India Shriram Institute of Management and Technology India
The broad spectrum of cryptography provides secure protocols for communication and data security. These protocols are based on structures of mathematics such as groups, rings and fields. In particular, cyclic groups a... 详细信息
来源: 评论
Defending against Power Analysis Attacks: A Novel Approach with Factorial Expansions in Elliptic Curve Cryptography  24
Defending against Power Analysis Attacks: A Novel Approach w...
收藏 引用
9th International Conference on Cyber Security and Information Engineering, ICCSIE 2024
作者: Guo, Bin Xuzhou College of Industrial Technology China
Power analysis attacks have emerged as a significant threat to the security of elliptic curve cryptography (ECC), necessitating the development of countermeasures that can safeguard against such attacks without compro... 详细信息
来源: 评论
High-Speed Parity Number Detection Algorithm in RNS Based on Akushsky Core Function  6th
High-Speed Parity Number Detection Algorithm in RNS Based o...
收藏 引用
6th International conference on communication and computational technologies, ICCCT 2024
作者: Lutsenko, Vladislav Geryugova, Aisanat Babenko, Mikhail Lapina, Maria Mary Anita, E.A. North-Caucasus Federal University Stavropol Russia Christ University Bangalore India
The Residue Number System is widely used in cryptography, digital signal processing, image processing systems and other areas where high-performance computation is required. One of the computationally expensive operat... 详细信息
来源: 评论