咨询与建议

限定检索结果

文献类型

  • 231 篇 期刊文献
  • 18 篇 会议

馆藏范围

  • 249 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 204 篇 工学
    • 127 篇 计算机科学与技术...
    • 72 篇 电气工程
    • 61 篇 电子科学与技术(可...
    • 49 篇 信息与通信工程
    • 39 篇 网络空间安全
    • 23 篇 材料科学与工程(可...
    • 17 篇 控制科学与工程
    • 9 篇 机械工程
    • 9 篇 软件工程
    • 6 篇 仪器科学与技术
    • 6 篇 生物医学工程(可授...
    • 5 篇 力学(可授工学、理...
    • 1 篇 土木工程
    • 1 篇 环境科学与工程(可...
  • 112 篇 理学
    • 84 篇 数学
    • 25 篇 物理学
    • 13 篇 天文学
    • 4 篇 生物学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 化学
  • 11 篇 医学
    • 10 篇 临床医学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 1 篇 教育学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 文学
    • 1 篇 中国语言文学

主题

  • 249 篇 cryptography
  • 29 篇 security
  • 26 篇 quantum
  • 16 篇 key
  • 16 篇 data security
  • 15 篇 encryption
  • 14 篇 authentication
  • 11 篇 cryptanalysis
  • 8 篇 distribution
  • 8 篇 steganography
  • 8 篇 secret
  • 8 篇 decryption
  • 7 篇 curve
  • 7 篇 privacy
  • 7 篇 sharing
  • 7 篇 elliptic
  • 7 篇 secure
  • 6 篇 communication
  • 6 篇 rsa
  • 6 篇 visual

机构

  • 4 篇 state key labora...
  • 4 篇 national laborat...
  • 4 篇 computer school ...
  • 4 篇 school of mathem...
  • 4 篇 state key labora...
  • 3 篇 state key labora...
  • 3 篇 university of ch...
  • 3 篇 state key labora...
  • 3 篇 college of mathe...
  • 3 篇 college of compu...
  • 3 篇 trusted computin...
  • 3 篇 key laboratory o...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 luoyang normal u...
  • 2 篇 school of inform...
  • 2 篇 department of co...
  • 2 篇 school of mathem...
  • 2 篇 school of mathem...
  • 2 篇 department of ap...

作者

  • 7 篇 wen qiaoyan
  • 5 篇 zhang huanguo
  • 4 篇 zhu fuchen
  • 4 篇 chen zhixiong
  • 3 篇 du jiao
  • 3 篇 saman riaz
  • 3 篇 muhammad nadeem
  • 3 篇 pang shanqi
  • 3 篇 ali arshad
  • 3 篇 boris s. verkhov...
  • 3 篇 liu jinhui
  • 3 篇 li chao
  • 3 篇 gao fei
  • 3 篇 syeda wajiha zah...
  • 3 篇 jia jianwei
  • 2 篇 k.sudharson
  • 2 篇 ma jianfeng
  • 2 篇 huangyi qin
  • 2 篇 song wan
  • 2 篇 3 state key labo...

语言

  • 226 篇 英文
  • 23 篇 中文
检索条件"主题词=cryptography"
249 条 记 录,以下是1-10 订阅
排序:
Trusted Certified Auditor Using cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 3089-3110页
作者: Nagaraju Pacharla K.Srinivasa Reddy School of Computer Science and Engineering VIT-AP UniversityAmaravatiAndhra Pradesh522237India
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
High-Throughput Area-Efficient Processor for cryptography
收藏 引用
Chinese Journal of Electronics 2017年 第3期26卷 514-521页
作者: HUO Yuanhong LIU Dake School of Computer Science and Technology Beijing Institute of Technology School of Information and Electronics Beijing Institute of Technology
cryptography circuits for portable electronic devices provide user authentication and secure data communication.These circuits should,achieve high performance,occupy small chip area,and handle several cryptographic al... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quantum cryptography for Internet of Things Security
收藏 引用
Journal of Electronic Science and Technology 2019年 第3期17卷 213-220页
作者: Alekha Parimal Bhatt Anand Sharma the Department of Computer Science and Engineering Mody University of Science and Technology
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security thr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Discussion on the theoretical results of white-box cryptography
收藏 引用
Science China(Information Sciences) 2016年 第11期59卷 5-15页
作者: Tingting LIN Xuejia LAI Weijia XUE Geshi HUANG cryptography and Information Security Lab Department of Computer ScienceShanghai Jiao Tong University
White-box cryptography(WBC) aims to resist attacks from attackers who can control all the implementation details of cryptographic schemes. In 2009, Saxena et al. proposed a fundamental of white-box cryptography via th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Two Layer Symmetric cryptography Algorithm for Protecting Data from Attacks
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John Von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancement of IoT device security using an Improved Elliptic Curve cryptography algorithm and malware detection utilizing deep LSTM
高置信计算(英文)
收藏 引用
高置信计算(英文) 2023年 第2期3卷 18-31页
作者: R.Aiyshwariya Devi A.R.Arunachalam Department of Computer Science and Engineering Dr.M.G.R.Educational and Research InstituteChennai 600095India
Internet of things(IoT)has become more popular due to the development and potential of smart technology aspects.Security concerns against IoT infrastructure,applications,and devices have grown along with the need for ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Data Mining with Privacy Protection Using Precise Elliptical Curve cryptography
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 839-851页
作者: B.Murugeshwari D.Selvaraj K.Sudharson S.Radhika Department of Computer Science and Engineering Velammal Engineering CollegeChennai600066India Department of Electronics and Communication Engineering Panimalar Engineering CollegeChennai600123India Department of Information Technology Velammal Insitutue of TechnologyChennai601204India Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai600124India
Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using cryptography
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 2029-2042页
作者: K.Saranya K.Premalatha Department of Computer Science and Engineering Bannari Amman Institute of TechnologySathyamangalam638401India
Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum cryptography via Satellite
收藏 引用
Engineering 2019年 第3期5卷 353-354页
作者: Mitch Leslie Senior Technology Writer
As it circled the Earth one night in 2017, the Chinese satellite Mozi, also called Micius, aimed a laser at a ground station in northeastern China (Fig. 1). Then, as it traveled toward Europe and into range, it direct... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
How to Integrate Abstract Algebra and Number Theory in the Teaching of Public Key cryptography Elegantly
收藏 引用
计算机教育 2018年 第12期 136-137页
作者: Hu Xiong Ting Zhong Guobin Zhu Zhiguang Qin School of Information and Software Engineering University of Electronic Science and Technology of China
Different from traditional symmetric cryptography, public key cryptography allows each user to own a pair of public/private key pair. Given the public key of one user and the data to be encrypted, a ciphertext can be ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论