咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
  • 2 篇 理学
    • 2 篇 系统科学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 3 篇 image encryption
  • 1 篇 hindmarsh-rose m...
  • 1 篇 ikeda map
  • 1 篇 s-box
  • 1 篇 artificial bee c...
  • 1 篇 chaotic system
  • 1 篇 cryptosystem
  • 1 篇 sha-256
  • 1 篇 parallel computi...
  • 1 篇 medical images
  • 1 篇 jigsaw transform...
  • 1 篇 chaos

机构

  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 1 篇 department of in...
  • 1 篇 department of el...
  • 1 篇 department of el...
  • 1 篇 school of comput...
  • 1 篇 department of in...
  • 1 篇 school of scienc...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 research centre ...

作者

  • 3 篇 mohammed salsheh...
  • 2 篇 sultan almakdi
  • 2 篇 jawad ahmad
  • 2 篇 yazeed yasin gha...
  • 2 篇 mimonah al qathr...
  • 1 篇 anas ibrar
  • 1 篇 mujeeb ur rehman
  • 1 篇 muhammad shahbaz...
  • 1 篇 syed aziz shah
  • 1 篇 fawad masood
  • 1 篇 yousef asiri
  • 1 篇 nazik alturki
  • 1 篇 oumaima saidani

语言

  • 3 篇 英文
检索条件"作者=Mohammed Salshehri"
3 条 记 录,以下是1-10 订阅
排序:
A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map
收藏 引用
Computer Systems Science & Engineering 2023年 第9期46卷 3017-3036页
作者: Sultan Almakdi mohammed salshehri Yousef Asiri Mimonah Al Qathrady Anas Ibrar Jawad Ahmad Department of Computer Science Najran UniversityNajran61441Saudi Arabia Department of Information Systems Najran UniversityNajran61441Saudi Arabia Department of Electrical Engineering Wah Engineering CollegeUniversity of WahWah Cantt47040Pakistan School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image *** picture encryption is a crucial step in many cloud-based and healthcare *** this stud... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 781-797页
作者: Yazeed Yasin Ghadi mohammed salshehri Sultan Almakdi Oumaima Saidani Nazik Alturki Fawad Masood Muhammad Shahbaz Khan Department of Computer Science Al Ain UniversityAbu Dhabi112612United Arab Emirates Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electrical Engineering Institute of Space TechnologyIslamabad4400Pakistan School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK
Securing digital image data is a key concern in today’s information-driven *** encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1325-1341页
作者: Jawad Ahmad Mimonah Al Qathrady mohammed salshehri Yazeed Yasin Ghadi Mujeeb Ur Rehman Syed Aziz Shah School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science Al Ain UniversityAbu Dhabi112612United Arab Emirates School of Science Technology and HealthYork St John UniversityYorkYO317EXUK Research Centre for Intelligent Healthcare Coventry UniversityCoventryCV15FBUK
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论