咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 11 篇 会议

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 16 篇 计算机科学与技术...
    • 10 篇 信息与通信工程
    • 6 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 5 篇 理学
    • 5 篇 数学
    • 2 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 23 篇 symmetric algori...
  • 5 篇 asymmetric algor...
  • 3 篇 aes
  • 3 篇 cryptography
  • 2 篇 internet of thin...
  • 2 篇 rsa
  • 2 篇 encryption algor...
  • 2 篇 wireless sensor ...
  • 2 篇 security
  • 2 篇 key distribution...
  • 2 篇 paillier algorit...
  • 1 篇 node coverage
  • 1 篇 secret sharing
  • 1 篇 interior point m...
  • 1 篇 patient monitori...
  • 1 篇 hardware securit...
  • 1 篇 configuration
  • 1 篇 original documen...
  • 1 篇 communication te...
  • 1 篇 information

机构

  • 2 篇 univ putra malay...
  • 1 篇 zhejiang int stu...
  • 1 篇 aix marseille un...
  • 1 篇 future technolog...
  • 1 篇 southeast univ s...
  • 1 篇 interdisciplinar...
  • 1 篇 hong kong polyte...
  • 1 篇 state grid jiang...
  • 1 篇 anna univ reg ca...
  • 1 篇 sichuan univ sci...
  • 1 篇 shanghai maritim...
  • 1 篇 dept. of comput....
  • 1 篇 state grid jiang...
  • 1 篇 wilhelm-schickar...
  • 1 篇 guru nanak dev u...
  • 1 篇 institute of inf...
  • 1 篇 john von neumann...
  • 1 篇 beijing univ pos...
  • 1 篇 univ waikato dep...
  • 1 篇 airthium sas acc...

作者

  • 2 篇 samsudin khairul...
  • 2 篇 rad habibollah a...
  • 2 篇 tehrani mohamad ...
  • 1 篇 hu chengbo
  • 1 篇 song meina
  • 1 篇 ma minhang
  • 1 篇 tao fengbo
  • 1 篇 zengping cheng
  • 1 篇 taubenfeld gadi
  • 1 篇 liu yang
  • 1 篇 kumar m. guru vi...
  • 1 篇 hyseni dhurate
  • 1 篇 ramli abdul rahm...
  • 1 篇 imbs damien
  • 1 篇 liu ke
  • 1 篇 cico betim
  • 1 篇 ragupathy u. s.
  • 1 篇 prasad kadam
  • 1 篇 hu haifeng
  • 1 篇 raynal michel

语言

  • 23 篇 英文
检索条件"主题词=symmetric algorithm"
23 条 记 录,以下是21-30 订阅
排序:
From Bezout's Identity to Space-Optimal Election in Anonymous Memory Systems  20
From Bezout's Identity to Space-Optimal Election in Anonymou...
收藏 引用
39th Symposium on Principles of Distributed Computing
作者: Godard, Emmanuel Imbs, Damien Raynal, Michel Taubenfeld, Gadi Aix Marseille Univ LIS Marseille France CNRS Marseille France Univ Toulon & Var Marseille France Univ Rennes CNRS INRIA Rennes France Hong Kong Polytech Univ Hong Kong Peoples R China Interdisciplinary Ctr Herzliyya Israel
An anonymous shared memory REG can be seen as an array of atomic registers such that there is no a priori agreement among the processes on the names of the registers. As an example a very same physical register can be... 详细信息
来源: 评论
Data Sharing Security and Privacy Preservation in Cloud Computing
Data Sharing Security and Privacy Preservation in Cloud Comp...
收藏 引用
International Conference on Green Computing and Internet of Things
作者: Kadam Prasad Jadhav Poonam Khupase Gauri N. C. Thoutam Dept. of Comput. Eng. Savitribai Phule Pune Univ. Pune India
Using the same key for both encryption as well as decryption is the key principle in symmetric algorithm. This mechanism involves the existence of centralized Key Distribution Centre also known as KDC, responsible for... 详细信息
来源: 评论
An Overview and Analysis of Hybrid Encryption:The Combination of symmetric Encryption and Asymmetric Encryption
An Overview and Analysis of Hybrid Encryption:The Combinatio...
收藏 引用
作者: Qixin Zhang Computer Science and Engineering NYU Tandon School of Engineering
In the current scenario,various forms of information are spread everywhere,especially through the Internet.A lot of valuable information is contained in the dissemination,so security issues have always attracted *** t... 详细信息
来源: 评论