咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 100 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 283 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 50 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 133 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 387 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 77 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
387 条 记 录,以下是361-370 订阅
排序:
Construction of Asymmetric Cryptosystems Using Finite Non-commutative Algebraic Groups
Construction of Asymmetric Cryptosystems Using Finite Non-co...
收藏 引用
International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)
作者: Zakasovskaya, E. Glushchenko, A. Tarasov, V Far Eastern Fed Univ Vladivostok Russia
This article considers the work done to find a suitable group implementation for the creation of new cryptosystems which work is based on the use of finite non-commutative algebraic groups. In particular, some subgrou... 详细信息
来源: 评论
Xerox :: Parc :: Techreports :: Csl-78-4 Using encryption for Authentication in Large Networks of Computers
收藏 引用
2016年
Xerox :: Parc :: Techreports :: Csl-78-4 Using encryption for Authentication in Large Networks of Computers by published by
来源: 评论
Memristor-Based Chaotic Circuit Design on Image En/Decryption  31
Memristor-Based Chaotic Circuit Design on Image En/Decryptio...
收藏 引用
31st Youth Academic Annual Conference of Chinese-Association-of-Automation (YAC)
作者: Hu, Qingqing Yu, Yongbin Men, Lefei Lei, Fei Zhang, Huan Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Sichuan Peoples R China
Two kinds of image encryption algorithms based on a three-dimensional chaotic system is presented in this paper. Firstly, a new three-dimensional chaotic circuit based on memristor is designed, and the characteristics... 详细信息
来源: 评论
Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第17期8卷 2973-2980页
作者: DelBello, Chris Raihan, Kazi Zhang, Tao Loyola Univ Maryland Baltimore MD 21210 USA New York Inst Technol Old Westbury NY 11568 USA
Wireless body area networks (WBANs) are an exciting technology that will revolutionize physiological monitoring in the coming years. However, the widespread deployment of WBANs is restricted by steep energy limitation... 详细信息
来源: 评论
The Power Consumption Cost of Data encryption in Smartphones
The Power Consumption Cost of Data Encryption in Smartphones
收藏 引用
International Conference on Open Source Software Computing (OSSCOM)
作者: Masoud, Mohammad Jannoud, Ismael Ahmad, Amal Al-Shobaky, Haithm Al Zaytoonah Univ Jordan Fac Engn & Technol Comp & Commun Engn Dept Amman 11733 Jordan
this paper provides a performance evaluation of four different symmetric encryption algorithms in Android mobile platform. DES, Bluefish, RC6 and AES algorithms have been written and implemented in JAVA for Android pl... 详细信息
来源: 评论
A review of Mobile Banking Security
A review of Mobile Banking Security
收藏 引用
IEEE Canadian Conference on Electrical and Computer Engineering
作者: Leili Nosrati Amir Massoud Bidgoli Islamic Azad University-Tehran North Branch Tehran Iran Islamic Azad University-Tehran North Branch MIEEE Manchester University Tehran Iran
Nowadays, IT has an important role in people's life. Bank is one of the example of institute which using IT in its daily tasks. Customer's personal information which has stored by the bank is considered as pri... 详细信息
来源: 评论
Enhanced Security for Cloud Storage using Linear Block Cipher Algorithm  1
Enhanced Security for Cloud Storage using Linear Block Ciphe...
收藏 引用
International Conference on Cloud Computing (ICCC)
作者: Kuppuswamy, Prakash Rekha, S. Nithya Jazan Univ Dept Comp Engn & Networks Jazan Saudi Arabia Qassim Private Coll Dept Comp Sci & Engn Buraydah Saudi Arabia
Cloud Computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing. Cloud computing is most interesting and enticing technology ... 详细信息
来源: 评论
Time delay measurements of key generation process on smart cards
Time delay measurements of key generation process on smart c...
收藏 引用
作者: Seawell, Christy A. Naval Postgraduate School
学位级别:硕士
Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to ensure security increases. This is a potential problem for the Department of Defense, which requires smar... 详细信息
来源: 评论
Medical Image Integrity Control Using Joint encryption and Watermarking Techniques
Medical Image Integrity Control Using Joint Encryption and W...
收藏 引用
International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE)
作者: Suganya, G. Amudha, K. KS Rangasamy Coll Technol Dept ECE Tiruchengode India
A joint encryption and watermarking technique is an efficient method for verifying the reliability of medical images. The medical image integrity control is achieved by the combined watermarking algorithm, QIM (Quanti... 详细信息
来源: 评论
Cryptographic Cloud Computing Environment as a More Trusted Communication Environment
收藏 引用
INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING 2014年 第2期6卷 38-51页
作者: Jasim, Omer K. Abbas, Safia El-Horbaty, El-Sayed M. Salem, Abdel-Badeeh M. Almaarif Univ Coll Dept Comp Sci Anbar Iraq Ain Shams Univ Cairo Egypt Ain Shams Univ Fac Comp & Informat Sci Dept Comp Sci Cairo Egypt Ajman Univ Fac IT Ajman U Arab Emirates Ain Shams Univ Fac Comp & Informat Sci Ctr Comp Sci Comp Sci Cairo Egypt
Cloud Communication Environment is an internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources ... 详细信息
来源: 评论