咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 11 篇 会议

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 16 篇 计算机科学与技术...
    • 10 篇 信息与通信工程
    • 6 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 5 篇 理学
    • 5 篇 数学
    • 2 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 23 篇 symmetric algori...
  • 5 篇 asymmetric algor...
  • 3 篇 aes
  • 3 篇 cryptography
  • 2 篇 internet of thin...
  • 2 篇 rsa
  • 2 篇 encryption algor...
  • 2 篇 wireless sensor ...
  • 2 篇 security
  • 2 篇 key distribution...
  • 2 篇 paillier algorit...
  • 1 篇 node coverage
  • 1 篇 secret sharing
  • 1 篇 interior point m...
  • 1 篇 patient monitori...
  • 1 篇 hardware securit...
  • 1 篇 configuration
  • 1 篇 original documen...
  • 1 篇 communication te...
  • 1 篇 information

机构

  • 2 篇 univ putra malay...
  • 1 篇 zhejiang int stu...
  • 1 篇 aix marseille un...
  • 1 篇 future technolog...
  • 1 篇 southeast univ s...
  • 1 篇 interdisciplinar...
  • 1 篇 hong kong polyte...
  • 1 篇 state grid jiang...
  • 1 篇 anna univ reg ca...
  • 1 篇 sichuan univ sci...
  • 1 篇 shanghai maritim...
  • 1 篇 dept. of comput....
  • 1 篇 state grid jiang...
  • 1 篇 wilhelm-schickar...
  • 1 篇 guru nanak dev u...
  • 1 篇 institute of inf...
  • 1 篇 john von neumann...
  • 1 篇 beijing univ pos...
  • 1 篇 univ waikato dep...
  • 1 篇 airthium sas acc...

作者

  • 2 篇 samsudin khairul...
  • 2 篇 rad habibollah a...
  • 2 篇 tehrani mohamad ...
  • 1 篇 hu chengbo
  • 1 篇 song meina
  • 1 篇 ma minhang
  • 1 篇 tao fengbo
  • 1 篇 zengping cheng
  • 1 篇 taubenfeld gadi
  • 1 篇 liu yang
  • 1 篇 kumar m. guru vi...
  • 1 篇 hyseni dhurate
  • 1 篇 ramli abdul rahm...
  • 1 篇 imbs damien
  • 1 篇 liu ke
  • 1 篇 cico betim
  • 1 篇 ragupathy u. s.
  • 1 篇 prasad kadam
  • 1 篇 hu haifeng
  • 1 篇 raynal michel

语言

  • 23 篇 英文
检索条件"主题词=symmetric algorithm"
23 条 记 录,以下是11-20 订阅
排序:
Application of symmetry algorithm in energy optimal allocation of wireless sensor networks
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020年 第6期38卷 7715-7724页
作者: Song, Yu Sichuan Univ Sci & Engn Dept Network Informat Management Ctr Zigong 643000 Peoples R China
. Aiming at the problem that the current algorithm cannot effectively complete the optimal energy allocation in wireless sensor networks, a method of optimal energy allocation in wireless sensor networks based on a sy... 详细信息
来源: 评论
Secured remote health monitoring system
收藏 引用
HEALTHCARE TECHNOLOGY LETTERS 2017年 第6期4卷 228-232页
作者: Sathya, Duraisamy Kumar, Pugalendhi Ganesh Kumaraguru Coll Technol Dept Comp Sci & Engn Coimbatore Tamil Nadu India Anna Univ Reg Campus Dept Informat Technol Coimbatore Tamil Nadu India
Wireless medical sensor network is used in healthcare applications that have the collections of biosensors connected to a human body or emergency care unit to monitor the patient's physiological vital status. The ... 详细信息
来源: 评论
A Simple and Highly Secure Protocol for POS Terminal
A Simple and Highly Secure Protocol for POS Terminal
收藏 引用
2nd International Conference on Environmental and Computer Science
作者: Rad, Habibollah Arasteh Tehrani, Mohamad Bagher Samsudin, Khairulmizam Ramli, Abdul Rahman Univ Putra Malaysia Dept Comp & Commun Syst Engn Serdang 43400 Selangor Malaysia
As we know, the communication networks were first designed for voice communication purposes. Further developments within the communication networks made it possible to send or transmit data as well. When the public ne... 详细信息
来源: 评论
An Novel Encryption Protocol for Mobile Data Synchronization Based on SyncML
An Novel Encryption Protocol for Mobile Data Synchronization...
收藏 引用
International Conference on Information Computing and Applications
作者: Jiang, Chao Song, Meina Liu, Ke Xu, Ke Beijing Univ Posts & Telecommun Dept Elect Engn Beijing 100088 Peoples R China Beijing Univ Posts & Telecommun Dept Comp Sci Beijing 100088 Peoples R China
SyncML provides identity authentication service for the security of the data synchronization protocol at the server layer and database layer,. But the data is transmitted in cleartext XML after the authentication. The... 详细信息
来源: 评论
The Strategy of Cryptography for the Proposed Model of Security in Cloud Computing
The Strategy of Cryptography for the Proposed Model of Secur...
收藏 引用
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (IEEE ICPCSI)
作者: Hyseni, Dhurate Selimi, Besnik Luma, Artan Cico, Betim SEEU Fac Contemporary Sci & Technol Tetovo Macedonia Epoka Univ Dept Comp Engn Tirana Albania
In many research results today, the encryption of data at rest is considered to be one of the main issues related to security in cloud computing and especially cloud storage. Based on result from survey and the need f... 详细信息
来源: 评论
Data Sharing Security and Privacy Preservation in Cloud Computing  1
Data Sharing Security and Privacy Preservation in Cloud Comp...
收藏 引用
International Conference on Green Computing and Internet of Things (ICGCIoT)
作者: Prasad, Kadam Poonam, Jadhav Gauri, Khupase Thoutam, N. C. Savitribai Phule Pune Univ Sandip Inst Technol & Res Ctr Dept Comp Engn Pune Maharashtra India
Using the same key for both encryption as well as decryption is the key principle in symmetric algorithm. This mechanism involves the existence of centralized Key Distribution Centre also known as KDC, responsible for... 详细信息
来源: 评论
A secure Protocol for Traffic Police Mobile Communication System
A secure Protocol for Traffic Police Mobile Communication Sy...
收藏 引用
International Conference on Future Computer and Communications (ICFCC 2009)
作者: Rad, Habibollah Arasteh Samsudin, Khairulmizam Ramli, Abdul Rahman B. Tehrani, Mohamad Bagher Tavalai, Mohamad Ali Univ Putra Malaysia Dept Comp & Commun Syst Engn Serdang 43400 Selangor Malaysia
The advance of wireless networking, communication, and mobile technology is making a big impact to daily life. Mobile devices, such as cell phones, and PDAs are becoming more popular each day. The large number of mobi... 详细信息
来源: 评论
A Survey on Current Key Issues and Status in Cryptography
A Survey on Current Key Issues and Status in Cryptography
收藏 引用
IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
作者: Kumar, M. Guru Vimal Ragupathy, U. S. Kongu Engn Coll Dept EIE Perundurai Erode India
Internet applications are increased and growing at very fast. Owing towards the technological development, secured way of data transmission over the internet is becoming a questioning task. Intruders hack the data and... 详细信息
来源: 评论
Research of cryptographic algorithms applied in electronic commerce
收藏 引用
Research Journal of Applied Sciences, Engineering and Technology 2014年 第5期7卷 908-915页
作者: Zengping, Cheng Hubei, Chen Yanshou University of Automotive Technology ShiYan City Hubei Province 442000 China
With the developments of network communication, electronic commerce plays a more and more role in the trade business and industry structure. The requirement for the electronic commerce turns to be higher. In this stud... 详细信息
来源: 评论
A Novel Scheme for Data Security in Cloud Computing using Quantum Cryptography  16
A Novel Scheme for Data Security in Cloud Computing using Qu...
收藏 引用
International Conference on Advances in Information Communication Technology and Computing
作者: Sharma, Geeta Kalra, Sheetal Guru Nanak Dev Univ Dept Comp Sci & Engn Reg Campus Jalandhar Punjab India
Cloud computing manifests exceptional capacity to facilitate easy to manage, cost effective, flexible and powerful resources across the internet. Due to maximum and shared utilization of utilization of resources, clou... 详细信息
来源: 评论