咨询与建议

限定检索结果

文献类型

  • 282 篇 会议
  • 100 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 283 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 105 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 50 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 133 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 60 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 387 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna
  • 2 篇 yarmilko andrii

语言

  • 307 篇 英文
  • 77 篇 其他
  • 7 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
387 条 记 录,以下是371-380 订阅
Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
Deployment of Application on Cloud and Enhanced Data Securit...
收藏 引用
International Conference on Advanced Communication Control and Computing Technologies*
作者: Puri, Neha A. Karare, Ajay R. Dharmik, Rajesh. C. YCCE Dept IT Nagpur Maharashtra India JDCOEM Dept CSE Nagpur Maharashtra India
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computin... 详细信息
来源: 评论
A STUDY ON encryption algorithms AND MODES FOR DISK encryption
A STUDY ON ENCRYPTION ALGORITHMS AND MODES FOR DISK ENCRYPTI...
收藏 引用
International Conference on Signal Processing Systems (ICSPS 2009)
作者: Alomari, Mohammad Ahmed Samsudin, Khairulmizam Ramli, Abdul Rahman Univ Putra Malaysia Fac Engn Comp Syst Res Grp Serdang 43400 Malaysia Univ Putra Malaysia Inst Syst & Robot Lab Serdang 43400 Malaysia
Data storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now widely used in everyday appliances. Data breaches have grown rapidly in the recent years due to compromised confi... 详细信息
来源: 评论
Enhancing Protection Techniques of E-Banking Security Services Using Open Source Cryptographic algorithms
Enhancing Protection Techniques of E-Banking Security Servic...
收藏 引用
14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
作者: Khelifi, Adel Aburrous, Maher Abu Talib, Manar Shastry, P. V. S. ALHOSN Univ Software Engn Dept Abu Dhabi U Arab Emirates Zayed Univ Coll Technol Innovat Abu Dhabi U Arab Emirates Coll Engn Elect & Telecomm Dept Pune 411052 Maharashtra India
security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long ti... 详细信息
来源: 评论
The Evaluation of Security algorithms on Mobile Platform
The Evaluation of Security Algorithms on Mobile Platform
收藏 引用
IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
作者: Yao, Hong Lian, Lu Fan, Yuanyuan Liang, Qingzhong Yan, Xuesong China Univ Geosci Sch Comp Sci Wuhan 430074 Peoples R China
The rapid development of mobile platform leads to growing demand for network communications, which suffer from increasingly severe security threats as well. Considering the urgent security demand and the limitation of... 详细信息
来源: 评论
Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm
Deployment of Application on Cloud and Enhanced Data Securit...
收藏 引用
International Conference on Advanced Communication Control and Computing Technologies
作者: Neha A Puri Ajay R Karare Rajesh. C. Dharmik Department of IT YCCE Nagpur Maharshtra India Department of CSE JDCOEM Nagpur Maharashtra India
Cloud Computing is the impending need of computing which is used for the IT Industries It is one of the hottest topic in research areas. Scalibility and Flexibility increases for the computing services. Cloud Computin... 详细信息
来源: 评论
Multilevel Authentication for Vehicular Ad-Hoc Networks with Cryptography Hash Functions
Multilevel Authentication for Vehicular Ad-Hoc Networks with...
收藏 引用
International Conference on Radar, Communication and Computing (ICRCC)
作者: Malathi, M. Divya, P. S. Anusha, M. Rajalakshmi, K. Adhiparasakthi Engg Coll IT Melmaruvathur Tamil Nadu India
Vehicular Ad-Hoc networks (VANET'S) represent a rapidly emerging research field and are considered essential for cooperative driving among vehicles on the road. It is a kind of special wireless ad hoc networks whi... 详细信息
来源: 评论
CRYPTANALYSIS OF CIKS-128 AND CIKS-128H SUITABLE FOR INTELLIGENT MULTIMEDIA AND UBIQUITOUS COMPUTING SYSTEMS
收藏 引用
COMPUTING AND INFORMATICS 2011年 第3期30卷 447-466页
作者: Lee, Changhoon Kim, Jongsung Sung, Jaechul Lee, Yang-Sun Lee, Chang Hoon Kyungnam Univ Div E Business Kyungnam South Korea Hanshin Univ Sch Comp Engn Hanshin South Korea Univ Seoul Dept Math Seoul South Korea Chosun Univ Dept Informat & Commun Engn Kwangju South Korea Hankyong Natl Univ Dept Comp Engn Ausung City South Korea
Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption sy... 详细信息
来源: 评论
Ender Wiggin Played Mafia Wars Too
收藏 引用
IT PROFESSIONAL 2011年 第4期13卷 6-8页
作者: Laplante, Phillip A. Penn State Univ University Pk PA 16802 USA
Games hosted in social networks, gaming servers or mobile phones can be used as massively parallel, but surreptitious processing networks. These grids, and the activities of the unwitting players, can be used for good... 详细信息
来源: 评论
Self-adaptability in Secure Embedded Systems: an Energy-Performance Trade-off
Self-adaptability in Secure Embedded Systems: an Energy-Perf...
收藏 引用
World Congress on Engineering (WCE 2011)
作者: Botezatu, N. Manta, V. Stan, A. Gh Asachi Tech Univ Iasi Fac Automat Control & Comp Engn Iasi Romania
Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem o... 详细信息
来源: 评论
Improved Security Mechanism of Management Information System
Improved Security Mechanism of Management Information System
收藏 引用
The 2010 IEEE International Conference on Progress in Informatics and Computing
作者: Shewei Wang,Min Song School of Information Science and Engineering Henan University of Technology Zheng Zhou,P.R.China
To deal with database security of Management Information System(MIS),a database encryption solution is designed and *** the relation of database openness and security in the traditional model of MIS,the paper construc... 详细信息
来源: 评论