咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 11 篇 会议

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 16 篇 计算机科学与技术...
    • 10 篇 信息与通信工程
    • 6 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 5 篇 理学
    • 5 篇 数学
    • 2 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 23 篇 symmetric algori...
  • 5 篇 asymmetric algor...
  • 3 篇 aes
  • 3 篇 cryptography
  • 2 篇 internet of thin...
  • 2 篇 rsa
  • 2 篇 encryption algor...
  • 2 篇 wireless sensor ...
  • 2 篇 security
  • 2 篇 key distribution...
  • 2 篇 paillier algorit...
  • 1 篇 node coverage
  • 1 篇 secret sharing
  • 1 篇 interior point m...
  • 1 篇 patient monitori...
  • 1 篇 hardware securit...
  • 1 篇 configuration
  • 1 篇 original documen...
  • 1 篇 communication te...
  • 1 篇 information

机构

  • 2 篇 univ putra malay...
  • 1 篇 zhejiang int stu...
  • 1 篇 aix marseille un...
  • 1 篇 future technolog...
  • 1 篇 southeast univ s...
  • 1 篇 interdisciplinar...
  • 1 篇 hong kong polyte...
  • 1 篇 state grid jiang...
  • 1 篇 anna univ reg ca...
  • 1 篇 sichuan univ sci...
  • 1 篇 shanghai maritim...
  • 1 篇 dept. of comput....
  • 1 篇 state grid jiang...
  • 1 篇 wilhelm-schickar...
  • 1 篇 guru nanak dev u...
  • 1 篇 institute of inf...
  • 1 篇 john von neumann...
  • 1 篇 beijing univ pos...
  • 1 篇 univ waikato dep...
  • 1 篇 airthium sas acc...

作者

  • 2 篇 samsudin khairul...
  • 2 篇 rad habibollah a...
  • 2 篇 tehrani mohamad ...
  • 1 篇 hu chengbo
  • 1 篇 song meina
  • 1 篇 ma minhang
  • 1 篇 tao fengbo
  • 1 篇 zengping cheng
  • 1 篇 taubenfeld gadi
  • 1 篇 liu yang
  • 1 篇 kumar m. guru vi...
  • 1 篇 hyseni dhurate
  • 1 篇 ramli abdul rahm...
  • 1 篇 imbs damien
  • 1 篇 liu ke
  • 1 篇 cico betim
  • 1 篇 ragupathy u. s.
  • 1 篇 prasad kadam
  • 1 篇 hu haifeng
  • 1 篇 raynal michel

语言

  • 23 篇 英文
检索条件"主题词=symmetric algorithm"
23 条 记 录,以下是1-10 订阅
排序:
symmetric algorithm for Detection of Coverage Hole in Wireless Sensor Network
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2022年 第1期127卷 141-158页
作者: Wang, Feifei Hu, Haifeng Pingdingshan Univ Informat Engn Coll Pingdingshan 467000 Peoples R China
For the problems of traditional overburden hole detection methods, such as overtime, low accuracy and high running cost, etc. A multi factor reliable coverage hole detection method based on LEACH algorithm is proposed... 详细信息
来源: 评论
Hip-hop action image recognition based on symmetric algorithm and iterative weighting of dense sampling
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2020年 1-11页
作者: Han, Zhen Ma, Minhang Zhejiang Int Studies Univ Minist Phys Educ & Res Hangzhou Peoples R China
With the rapid increase of hip-hop video data, facing a large number of rapidly updated data, automatic, accurate and fast analysis and recognition of relevant information in hip-hop video has become an urgent problem... 详细信息
来源: 评论
Minimum transmission delay algorithm for multi-hop nodes in Internet of Things based on symmetric algorithm
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2020年 1-10页
作者: Hu, Chengbo Liu, Yang Tao, Fengbo Lu, Yongling Wang, Zhen State Grid Jiangsu Elect Power Co Ltd Res Inst Nanjing Peoples R China Southeast Univ Sch Elect Engn Nanjing Peoples R China State Grid Jiangsu Elect Power Co Ltd Dept Technol Nanjing Peoples R China
In view of the increase of network information transmission times, the transmission delay of multi hop nodes in the Internet of Things increases, resulting in the decline of network information transmission performanc... 详细信息
来源: 评论
Automatic Encryption Method of Sensor Network Capture Data Based on symmetric algorithm
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2022年 第1期127卷 353-367页
作者: Li, Ming Mudanjiang Normal Univ Sch Comp & Informat Technol Mudanjiang 157011 Peoples R China
Due to overlapping coverage areas of nodes, traditional data encryption methods for sensor networks fail to consider the logical correlation between common nodes and transmission paths, resulting in low data capture e... 详细信息
来源: 评论
Information Iterative Retrieval of Internet of Things Communication Terminal Based on symmetric algorithm
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2021年 第4期117卷 3469-3485页
作者: Zhao, Min Tianjin Univ Sci & Technol Sch Elect & Informat Engn Tianjin 300202 Peoples R China
Through improved similarity analysis algorithm and hybrid local sensitivity hashing method, information is summarized and retrieved by information retrieval method based on EPC network architecture. This method does n... 详细信息
来源: 评论
Discussion of one new symmetric algorithm
Discussion of one new symmetric algorithm
收藏 引用
International Multiconference of Engineers and Computer Scientists
作者: Chan, Xiaorui Liu, Guangzhong Shanghai Maritime Univ Coll Informat Engn Shanghai Peoples R China
We have devised one now kind of 160 bits symmetric encryption algorithms, basing on a kernel encryption function called S. By incising 160 bits data block into eight pieces, S function produces one brand-new 160 bits ... 详细信息
来源: 评论
Two Layer symmetric Cryptography algorithm for Protecting Data from Attacks
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John Von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a... 详细信息
来源: 评论
symmetric recursive algorithms for surfaces: B-patches and the de boor algorithm for polynomials over triangles
收藏 引用
Constructive Approximation 1991年 第1期7卷 257-279页
作者: Seidel, Hans-Peter Wilhelm-Schickard-Institut für Informatik Universität Tübingen Tübingen D-7400 Auf der Morgenstelle 10 C9 Germany
Using the concept of a symmetric recursive algorithm, we construct a new patch representation for bivariate polynomials: the B-patch. B-patches share many properties with B-spline segments: they are characterized by t... 详细信息
来源: 评论
Regularized frictional contact problems with the interior point method
收藏 引用
JAPAN JOURNAL OF INDUSTRIAL AND APPLIED MATHEMATICS 2023年 第2期40卷 775-807页
作者: Houssein, Houssam Garnotel, Simon Hecht, Frederic Sorbonne Univ Lab Jacques Louis Lions JLL L F-75005 Paris France Airthium SAS Accelair 1 Chemin Porte des Loges F-78350 Les Loges En Josas France
The aim of this paper is to present an algorithm to solve frictional contact problems by considering the Coulomb's criterion. As it is known, the frictional contact problem using Coulomb's criterion has no min... 详细信息
来源: 评论
DISPLAYING 3D IMAGES - algorithmS FOR SINGLE-IMAGE RANDOM-DOT STEREOGRAMS
收藏 引用
COMPUTER 1994年 第10期27卷 38-&页
作者: THIMBLEBY, HT INGLIS, S WITTEN, IH UNIV WAIKATO DEPT COMP SCIHAMILTONNEW ZEALAND
Stereopsis, the fusing of two separate images, one for each eye, to produce the effect of depth is natural when viewing solid objects. The effect can also be produced with two-dimensional pictures if each eye receives... 详细信息
来源: 评论