咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 287 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 107 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 86 篇 电气工程
    • 52 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 24 篇 交通运输工程
    • 24 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 137 篇 理学
    • 90 篇 数学
    • 42 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
  • 61 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 391 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 data security
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=encryption algorithms"
391 条 记 录,以下是31-40 订阅
Research on Image encryption Algorithm Based on Four-Dimensional Hyperchaotic System and Mandelbrot Set
Research on Image Encryption Algorithm Based on Four-Dimensi...
收藏 引用
作者: Sun, Yanling Jiang, Tianjiao Liu, Baoxing Li, Yingqi Xiao, Mingkun Su, Qun Faculty of Science Shenyang Jianzhu University Shenyang China School of Computer Science and Engineering Shenyang Jianzhu University Shenyang China
In view of the problems of small key space and poor key sensitivity in classical image encryption algorithm, the characteristics of chaotic system and M set are analyzed, and a new image encryption algorithm is propos... 详细信息
来源: 评论
Quantum Key-Revocable Dual-Regev encryption, Revisited  22nd
Quantum Key-Revocable Dual-Regev Encryption, Revisited
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Ananth, Prabhanjan Hu, Zihan Huang, Zikuan UCSB Santa Barbara United States EPFL Lausanne Switzerland Tsinghua University Beijing China
Quantum information can be used to achieve novel cryptographic primitives that are impossible to achieve classically. A recent work by Ananth, Poremba, Vaikuntanathan (TCC 2023) focuses on equipping the dual-Regev enc... 详细信息
来源: 评论
Chaotic Resilience: Enhancing IoT Security Through Dynamic Data encryption  8th
Chaotic Resilience: Enhancing IoT Security Through Dynamic D...
收藏 引用
8th International Symposium on Intelligent Informatics, ISI 2023
作者: Francis, E. Geo Sheeja, S. Depertment of Computer Science Karpagam Academy of Higher Education Coimbatore India Department of Data Science Sri Krishna Adithya College of Arts and Science Coimbatore India
In the ever-expanding landscape of the Internet of Things (IoT), safeguarding the security and privacy of data transmissions among IoT devices has become increasingly critical. This research introduces an innovative a... 详细信息
来源: 评论
Secure Communication via PUF-Enabled Hardware and encryption Techniques
Secure Communication via PUF-Enabled Hardware and Encrypti...
收藏 引用
International Conference on Computing and Machine Learning, CML 2024
作者: Purohit, Yash Viradiya, Yash Savani, Vijay Department of Electronics and Communications Institute of Technology Nirma University Gujarat Ahmedabad India
This paper presents a technique for ensuring secure communication between interconnected devices using the Serial Peripheral Interface (SPI) protocol. The method combines the strengths of the Physical Unclonable Funct... 详细信息
来源: 评论
Enhancing the Security of Real-World Applications through the Implementation of the RSA Algorithm
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第9期49卷 1-8页
作者: Ghrib, Toufik Ghali, Ahmed Benbrahim, Fouzi Abusal, Yusef Awad University of Kasdi Merbah Ouargla Algeria École Normale Supérieure de Ouargla Algeria Ufa State Petroleum Technological University Russia
In the recent times, during COVID-19 statics tell, cyber-attacks have increased by up to 37%. While the lockdown all the companies are leveraging technologies accessible via internet to conduct their day to today work... 详细信息
来源: 评论
Secure sensing and computing techniques based on fuzzy in 5G
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2025年 第3期17卷 379-390页
作者: Balasubramani, Ramesh Sengottaiyan, Kumarganesh Rangasamy, Thillaikkarasi Muthusamy, Susaritha Sellamuthu, Elango Shaik, Mahaboob Basha Annapoorana Engn Coll Dept ECE Salem Tamil Nadu India Knowledge Inst Technol Dept ECE Salem Tamil Nadu India Salem Coll Engn & Technol Dept ECE Salem Tamil Nadu India Sona Coll Technol Dept ECE Salem Tamil Nadu India Madanapalle Inst Technol & Sci Dept CSE Annamayya Andhra Pradesh India GITAM Univ Sch Technol Dept CSE Hyderabad Telangana India
The new technology that is employed in 5G applications presents potential security vulnerabilities. In this study, the security needs for 5G applications are analysed, and hierarchical solutions for securing 5G apps a... 详细信息
来源: 评论
Converting Fixed-Length Binary Strings Into Constant Weight Words: Application on Post-Quantum Cryptography
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 3063-3074页
作者: López-García, Mariano Farouk-Marei, David G. Cantó-Navarro, Enrique Universitat Politècnica de Catalunya Department of Electronic Engineering Vilanova i la Geltrú08800 Spain Universitat Rovira i Virgili Department of Electrical and Automatic Electronic Engineering Tarragona43007 Spain
This paper presents a new algorithm for encoding binary strings of fixed-length into a word of constant Hamming weight and constant length. The primary difference compared to previous publications is that the proposed... 详细信息
来源: 评论
Use of Russian standardized crypto algorithms in QUIC
收藏 引用
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2025年 第1期21卷 1-7页
作者: Smyslov, Valery JSC ELVIS PLUS Moscow Russia
This article evaluates the possibility of using Russian Standardized Crypto algorithms (also known as GOST algorithms) in the QUIC transport protocol. The conclusion is that it is generally feasible to use these algor... 详细信息
来源: 评论
THE INCOME ALLOCATION MECHANISM OF TRUSTED "DUAL CONTRIBUTION" DATA ASSETS BASED ON BLOCKCHAIN TECHNOLOGY
收藏 引用
Scalable Computing 2025年 第2期26卷 757-765页
作者: CHEN, QIANHUI DING, WEIBIN SHEN, HUAQIANG State Grid Zhejiang Electric Power Investment & Operation Co. Ltd. ZheJiang HangZhou310007 China State Grid ZheJiang Electric Power Co. Ltd. ZheJiang HangZhou310007 China State Grid ZheJiang Electric Power Co. Ltd. JiaXing Electric Power Supply Company ZheJiang JiaXing314033 China
In order to solve the problem of researching the distribution of returns on trustworthy "dual contribution" data assets, the authors propose a research on the distribution mechanism of returns on trustworthy... 详细信息
来源: 评论
An Interpolated Quantized Guard Band Algorithm for Physical Layer Key Generation
收藏 引用
Intelligent and Converged Networks 2025年 第1期6卷 102-114页
作者: An, Yongli Zha, Kun Song, Wenfeng Ji, Zhanlin College of Artificial Intelligence North China University of Science and Technology Tangshan063210 China
With the continuous progress of communication technology, traditional encryption algorithms cannot meet the demands of modern wireless communication security. Secure communication based on physical layer encryption em... 详细信息
来源: 评论