咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 7 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 17 篇 计算机科学与技术...
    • 8 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 3 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 系统科学

主题

  • 25 篇 security algorit...
  • 4 篇 encryption
  • 3 篇 privacy
  • 2 篇 database securit...
  • 2 篇 intrusion preven...
  • 2 篇 wireless communi...
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 rsa
  • 2 篇 information secu...
  • 2 篇 aes
  • 2 篇 database
  • 2 篇 cloud computing
  • 1 篇 encryption and k...
  • 1 篇 broadcom
  • 1 篇 internet of thin...
  • 1 篇 threat protectio...
  • 1 篇 backfire
  • 1 篇 security strateg...
  • 1 篇 threat isolation

机构

  • 1 篇 facultad de cien...
  • 1 篇 univ teknol mala...
  • 1 篇 natl polytech sc...
  • 1 篇 univ teknol petr...
  • 1 篇 prince sultan un...
  • 1 篇 vasile goldis we...
  • 1 篇 no kentucky univ...
  • 1 篇 jordan univ sci ...
  • 1 篇 ryazan state rad...
  • 1 篇 menoufia univ fa...
  • 1 篇 scse deptt of cs...
  • 1 篇 nbn sinhgad sch ...
  • 1 篇 cbit dept cse hy...
  • 1 篇 nadimpalli satya...
  • 1 篇 miracle educ soc...
  • 1 篇 univ guadalajara...
  • 1 篇 univ surrey dept...
  • 1 篇 univ bourgogne f...
  • 1 篇 sunway univ fac ...
  • 1 篇 rayalaseema univ...

作者

  • 1 篇 pragya tewari
  • 1 篇 rajalakshmi d.
  • 1 篇 ruchkin v. n.
  • 1 篇 chiacchia matteo
  • 1 篇 máximo giovani t...
  • 1 篇 yejarla prathyus...
  • 1 篇 ebrahim mansoor
  • 1 篇 masrom maslin
  • 1 篇 cordova ronald s...
  • 1 篇 al-azawi rula
  • 1 篇 ibrahim m. sohai...
  • 1 篇 gao yue
  • 1 篇 daniel humberto ...
  • 1 篇 gawali dhanashri...
  • 1 篇 paci andrea
  • 1 篇 ramanamurthy m. ...
  • 1 篇 toapanta toapant...
  • 1 篇 carlos ignacio r...
  • 1 篇 eric s. emrick
  • 1 篇 félix gustavo me...

语言

  • 25 篇 英文
检索条件"主题词=security algorithms"
25 条 记 录,以下是11-20 订阅
排序:
High-Availability Encryption-Based Cloud Resource Provisioning System  22
High-Availability Encryption-Based Cloud Resource Provisioni...
收藏 引用
Proceedings of the 4th International Conference on Information Management & Machine Intelligence
作者: Ranjith Singh Koppaiyan Abdul Shareef Pallivalappil Pooja Singh Husna Tabassum Pragya Tewari Ms Sweeti Sarvesh Kumar Department of Computer Science Karpagam Academy of Higher Education India College of Computer Science and Information Science Srinivas University India SCSE Deptt of CSE Galgotias University India Department of CSE HKBK College of Engineering India. CSE Galgotias University Greater Noida India CSE BBDU LUCKNOW India CSE BBD University Lucknow India
Cryptosystems are getting fascination because of numerous regular likenesses between these two-region disorder hypothesis and cryptography. In symmetric cryptosystems, the same key is utilized for both encryption and ... 详细信息
来源: 评论
Methodology to Ensure Information security in a Distributed Architecture for a Public Organization of Ecuador  5
Methodology to Ensure Information Security in a Distributed ...
收藏 引用
5th International Conference on Fuzzy Systems and Data Mining (FSDM)
作者: Toapanta Toapanta, Segundo Moises Mendoza Quimi, Felix Gustavo Ortiz Pazmino, Kevin Eduardo Maciel Arrellano, Rocio Mafla Gallegos, Luis Enrique Salesian Polytech Univ Ecuador UPS Dept Comp Sci Chambers 227 & June 5 Cuenca Ecuador Univ Guadalajara Ctr Univ Ciencias Econ CUCEA Dept Informat Syst Guadalajara Jalisco Mexico Natl Polytech Sch EPN Fac Syst Engn Ladron Guevara E11-253 Quito Ecuador
Elements of risk assessment and information security models that administer the assets were analyzed. The problem is the lack of an information management mechanism in environments distributed in the public sector. Th... 详细信息
来源: 评论
Performance Monitoring, Privacy and security of Cloud Users  3
Performance Monitoring, Privacy and Security of Cloud Users
收藏 引用
3rd International Conference on Smart Grid and Smart Cities (ICSGSC)
作者: Bhaskar, N. Devi, G. R. Rama Ramanamurthy, M., V Reddy, C. R. Kumar Rayalaseema Univ Dept Compute Sci Kurnool Andhra Pradesh India CBIT Dept CSE Hyderabad Telangana India MGIT Dept M&H & CSE Hyderabad Telangana India MGIT Dept CSE Hyderabad Telangana India
The cloud applications are performed with the support of Internet. Internet is the main resource to function applications in cloud environment. The cloud environment provides the application access through wired or wi... 详细信息
来源: 评论
Voter Authentication Using Modified Elliptic Curve Cryptography  1st
Voter Authentication Using Modified Elliptic Curve Cryptogra...
收藏 引用
1st International Conference on Smart Computing and Informatics (SCI)
作者: Sujatha, K. Rao, A. Arjuna Yejarla, Prathyusha Sruthi, K. J. Nadimpalli Satyanarayana Raju Inst Technol Visakhapatnam Andhra Prades India Miracle Educ Soc Grp Inst Vizianagram India
Voter authentication in general election is a very expensive and time-consuming issue. At present, identifying the voter is done through their voter ID cards in the presence of local people and this process leads to m... 详细信息
来源: 评论
Linguistic techniques for cryptographic data sharing algorithms
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2018年 第3期30卷 1-7页
作者: Ogiela, Urszula Ogiela, Lidia AGH Univ Sci & Technol Cryptog & Cognit Informat Res Grp Al Mickiewicza 30 PL-30059 Krakow Poland
This publication presents algorithms for protecting data from unauthorised access to it. A special role among information protection algorithms is played by algorithms of data splitting and sharing which allow the inf... 详细信息
来源: 评论
Internet of Things Data Integrity
Internet of Things Data Integrity
收藏 引用
IST-Africa Week Conference (IST-Africa)
作者: Matsemela, Gift Rimer, Suvendi Ouahada, Khmaies Ndjiongue, Richard Mngomezulu, Zinhle Univ Johannesburg Dept Elect & Elect Engn Sci POB 524Auckland Pk Kingsway Campus ZA-2000 Johannesburg South Africa
Internet of Things is an internetwork where people interact with the environment via sensors and machines to perform physical activities remotely. IoT allows objects to be sensed and controlled remotely via internet s... 详细信息
来源: 评论
FPGA Implementation of 64 bit Secure Force Algorithm using Full Loop-Unroll Architecture  5
FPGA Implementation of 64 bit Secure Force Algorithm using F...
收藏 引用
5th IEEE International Conference on Control System, Computing and Engineering (ICCSCE)
作者: Khan, Shujaat Ibrahim, M. Sohail Ebrahim, Mansoor Amjad, Haseeb Khan, Kafeel Ahmed Iqra Univ Fac Engn Sci & Technol Karachi Pakistan Sunway Univ Fac Sci & Technol Bang Jaya Selangor Malaysia
Field-Programmable Gate Arrays (FPGAs) have turned out to be a well-liked target for implementing cryptographic block ciphers. In this research work, recently proposed 64 bit Secure Force (SF) algorithm is implemented... 详细信息
来源: 评论
Analysis and Implementation of security algorithms for Wireless Communications
Analysis and Implementation of Security Algorithms for Wirel...
收藏 引用
2nd International Conference on Computer and Automation Engineering (ICCAE)
作者: Ali, Abdinasir Hassan Masrom, Maslin Univ Teknol Malaysia Ctr Adv Software Engn Int Campus Kuala Lumpur Malaysia Univ Teknol Malaysia Coll Sci & Technol Kuala Lumpur Malaysia
Wireless communication is the process of communicating information in electromagnetic media over a distance through the free space environment, rather than through traditional wired or other physical conduits The secu... 详细信息
来源: 评论
An Adaptive Anomaly-based Intrusion Prevention System for Databases
An Adaptive Anomaly-based Intrusion Prevention System for Da...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics (SMC)
作者: Emrick, Eric S. Hu, Yi No Kentucky Univ Dept Comp Sci Highland Hts KY 41099 USA
Conventional database security can employ a wide range of access controls including database roles, fine-grained object access and virtual private databases. Access controls are used to protect against malicious attac... 详细信息
来源: 评论
Secure QR Code System  10
Secure QR Code System
收藏 引用
10th International Conference on Innovations in Information Technology (IIT)
作者: Bani-Hani, Raed M. Wahsheh, Yarub A. Al-Sarhan, Mohammad B. Jordan Univ Sci & Technol Dept Network Engn & Secur Irbid Jordan
Quick Response (QR) codes are two dimensional barcodes that can be used to efficiently store small amount of data. They are increasingly used in all life fields, especially with the wide spread of smart phones which a... 详细信息
来源: 评论