咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 7 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 17 篇 计算机科学与技术...
    • 8 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 3 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 系统科学

主题

  • 25 篇 security algorit...
  • 4 篇 encryption
  • 3 篇 privacy
  • 2 篇 database securit...
  • 2 篇 intrusion preven...
  • 2 篇 wireless communi...
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 rsa
  • 2 篇 information secu...
  • 2 篇 aes
  • 2 篇 database
  • 2 篇 cloud computing
  • 1 篇 encryption and k...
  • 1 篇 broadcom
  • 1 篇 internet of thin...
  • 1 篇 threat protectio...
  • 1 篇 backfire
  • 1 篇 security strateg...
  • 1 篇 threat isolation

机构

  • 1 篇 facultad de cien...
  • 1 篇 univ teknol mala...
  • 1 篇 natl polytech sc...
  • 1 篇 univ teknol petr...
  • 1 篇 prince sultan un...
  • 1 篇 vasile goldis we...
  • 1 篇 no kentucky univ...
  • 1 篇 jordan univ sci ...
  • 1 篇 ryazan state rad...
  • 1 篇 menoufia univ fa...
  • 1 篇 scse deptt of cs...
  • 1 篇 nbn sinhgad sch ...
  • 1 篇 cbit dept cse hy...
  • 1 篇 nadimpalli satya...
  • 1 篇 miracle educ soc...
  • 1 篇 univ guadalajara...
  • 1 篇 univ surrey dept...
  • 1 篇 univ bourgogne f...
  • 1 篇 sunway univ fac ...
  • 1 篇 rayalaseema univ...

作者

  • 1 篇 pragya tewari
  • 1 篇 rajalakshmi d.
  • 1 篇 ruchkin v. n.
  • 1 篇 chiacchia matteo
  • 1 篇 máximo giovani t...
  • 1 篇 yejarla prathyus...
  • 1 篇 ebrahim mansoor
  • 1 篇 masrom maslin
  • 1 篇 cordova ronald s...
  • 1 篇 al-azawi rula
  • 1 篇 ibrahim m. sohai...
  • 1 篇 gao yue
  • 1 篇 daniel humberto ...
  • 1 篇 gawali dhanashri...
  • 1 篇 paci andrea
  • 1 篇 ramanamurthy m. ...
  • 1 篇 toapanta toapant...
  • 1 篇 carlos ignacio r...
  • 1 篇 eric s. emrick
  • 1 篇 félix gustavo me...

语言

  • 25 篇 英文
检索条件"主题词=security algorithms"
25 条 记 录,以下是1-10 订阅
排序:
security algorithms for Wireless Medical Data
Security Algorithms for Wireless Medical Data
收藏 引用
Online International Conference on Green Engineering and Technologies (IC-GET)
作者: Kondawar, Snehal S. Gawali, Dhanashri H. NBN Sinhgad Sch Engn Elect & Telecommun Pune Maharashtra India
In wireless medical devices, the patient's medical data are collected and wirelessly sent to the doctor. Nowadays, there is an increase in the online attackers on the wirelessly sent patient's data to exploit ... 详细信息
来源: 评论
Comparative Analysis on the Performance of Selected security algorithms in Cloud Computing
Comparative Analysis on the Performance of Selected Security...
收藏 引用
International Conference on Electrical and Computing Technologies and Applications (ICECTA)
作者: Cordova, Ronald S. Maata, Rolou Lyn R. Halibas, Alrence S. Al-Azawi, Rula Gulf Coll Seeb Oman
Computer systems security plays a critical role in ensuring the confidentiality, integrity and data protection of electronic resources in a workplace. However, most web information system developers employ algorithms ... 详细信息
来源: 评论
Analysis and Implementation of security algorithms for Wireless Communications
Analysis and Implementation of Security Algorithms for Wirel...
收藏 引用
2nd International Conference on Computer and Automation Engineering (ICCAE)
作者: Ali, Abdinasir Hassan Masrom, Maslin Univ Teknol Malaysia Ctr Adv Software Engn Int Campus Kuala Lumpur Malaysia Univ Teknol Malaysia Coll Sci & Technol Kuala Lumpur Malaysia
Wireless communication is the process of communicating information in electromagnetic media over a distance through the free space environment, rather than through traditional wired or other physical conduits The secu... 详细信息
来源: 评论
A Review on the Verification Approaches and Tools used to Verify the Correctness of security algorithms and Protocols
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第6期10卷 146-152页
作者: Al-humaikani, Mohammed Abdulqawi Saleh Bin Ab, Lukman Rahim Univ Teknol Petronas Bandar Seri Iskandar Dept Comp & Informat Sci Seri Iskandar Malaysia
security algorithms and protocols are typical essential upgrades that must be involved within systems and their structures to provide the best performance. The protocols and systems should go through verification and ... 详细信息
来源: 评论
Analysis of security algorithms for a Distributed Database
Analysis of Security Algorithms for a Distributed Database
收藏 引用
2018 3rd International Conference on Computer Science and Information Engineering(ICCSIE 2018)
作者: Segundo Moisés Toapanta Toapanta Félix Gustavo Mendoza Qumí Daniel Humberto Plúa Moran Máximo Giovani Tandazo Espinoza Luis Enrique Mafla Gallegos María del Rocío Maciel Arellano Department of Computer Science Universidad Politécnica Salesiana Faculty of Systems Engineering Escuela Politécnica Nacional CUCEA-UDG Universidad de Guadalajara
This paper analyzed the security of a database considering the environment of distributed *** are several security mechanisms that are applied to the different types of data that are saved;this research identifies sev... 详细信息
来源: 评论
5GMap: Enabling external audits of access security and attach procedures in real-world cellular deployments
收藏 引用
COMPUTER COMMUNICATIONS 2025年 234卷
作者: Paci, Andrea Chiacchia, Matteo Bianchi, Giuseppe CNIT Natl Network Assurance & Monitoring LAB Rome Italy
In cellular networks, security vulnerabilities often arise from misconfigurations and improper implementations of protection mechanisms. Typically, ensuring proper security configurations is the responsibility of netw... 详细信息
来源: 评论
PROLISEAN: A New security Protocol for Programmable Matter
收藏 引用
ACM TRANSACTIONS ON INTERNET TECHNOLOGY 2021年 第1期21卷 1–29页
作者: Hourany, Edy Habib, Bachir Fountaine, Camille Makhoul, Abdallah Piranda, Benoit Bourgeois, Julien Holy Spirit Univ Kaslik POB 446 Kaslik Jounieh Lebanon Ecole Speciale Mil St Cyr Coetquidan POB 56380 Guer France Univ Bourgogne Franche Comte CNRS FEMTO ST Inst 1 Cours Leprince Ringuet Montbeliard France
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of in... 详细信息
来源: 评论
Efficient security Algorithm for Power-Constrained IoT Devices
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2021年 第7期8卷 5498-5509页
作者: Mamvong, Joseph N. Goteng, Gokop L. Zhou, Bo Gao, Yue Queen Mary Univ London Dept Elect Engn & Comp Sci London E1 4NS England Liverpool John Moores Univ Sch Comp Sci & Math Liverpool L3 3AF Merseyside England Univ Surrey Dept Elect & Elect Engn Guildford GU2 7XH Surrey England
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities do not exactly fit into the provision of existing security techniques due to their constrained nature. Classical security alg... 详细信息
来源: 评论
Intelligent security Strategy Based on the Selection of the Computer and Neural Network Architecture
收藏 引用
AUTOMATIC CONTROL AND COMPUTER SCIENCES 2022年 第8期56卷 970-980页
作者: Ruchkin, V. N. Kostrov, B. V. Fulin, V. A. Ryazan State Univ Ryazan Russia Ryazan State Radio Engn Univ Ryazan Russia
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort ... 详细信息
来源: 评论
Methodology to Ensure Information security in a Distributed Architecture for a Public Organization of Ecuador  5
Methodology to Ensure Information Security in a Distributed ...
收藏 引用
5th International Conference on Fuzzy Systems and Data Mining (FSDM)
作者: Toapanta Toapanta, Segundo Moises Mendoza Quimi, Felix Gustavo Ortiz Pazmino, Kevin Eduardo Maciel Arrellano, Rocio Mafla Gallegos, Luis Enrique Salesian Polytech Univ Ecuador UPS Dept Comp Sci Chambers 227 & June 5 Cuenca Ecuador Univ Guadalajara Ctr Univ Ciencias Econ CUCEA Dept Informat Syst Guadalajara Jalisco Mexico Natl Polytech Sch EPN Fac Syst Engn Ladron Guevara E11-253 Quito Ecuador
Elements of risk assessment and information security models that administer the assets were analyzed. The problem is the lack of an information management mechanism in environments distributed in the public sector. Th... 详细信息
来源: 评论