咨询与建议

限定检索结果

文献类型

  • 285 篇 期刊文献
  • 18 篇 会议

馆藏范围

  • 303 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 254 篇 工学
    • 160 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 66 篇 电子科学与技术(可...
    • 63 篇 信息与通信工程
    • 54 篇 网络空间安全
    • 43 篇 材料科学与工程(可...
    • 30 篇 控制科学与工程
    • 17 篇 软件工程
    • 14 篇 机械工程
    • 9 篇 仪器科学与技术
    • 6 篇 生物医学工程(可授...
    • 5 篇 力学(可授工学、理...
    • 1 篇 土木工程
    • 1 篇 轻工技术与工程
  • 137 篇 理学
    • 92 篇 数学
    • 41 篇 物理学
    • 26 篇 天文学
    • 3 篇 生物学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 化学
  • 10 篇 医学
    • 10 篇 临床医学
  • 8 篇 管理学
    • 6 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 1 篇 教育学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 文学
    • 1 篇 中国语言文学

主题

  • 303 篇 cryptography
  • 32 篇 security
  • 25 篇 quantum
  • 15 篇 key
  • 15 篇 authentication
  • 15 篇 cryptanalysis
  • 15 篇 encryption
  • 11 篇 information secu...
  • 10 篇 digital signatur...
  • 9 篇 data security
  • 8 篇 elliptic curve
  • 8 篇 distribution
  • 8 篇 steganography
  • 8 篇 secret
  • 7 篇 privacy
  • 7 篇 sharing
  • 7 篇 decryption
  • 7 篇 secure
  • 6 篇 image encryption
  • 6 篇 communication

机构

  • 4 篇 state key labora...
  • 4 篇 national laborat...
  • 4 篇 computer school ...
  • 4 篇 school of mathem...
  • 3 篇 college of mathe...
  • 3 篇 college of compu...
  • 3 篇 china
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 school of comput...
  • 3 篇 state key labora...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 school of inform...
  • 2 篇 department of el...
  • 2 篇 institute of low...
  • 2 篇 department of co...
  • 2 篇 department of ap...

作者

  • 7 篇 wen qiaoyan
  • 5 篇 zhang huanguo
  • 4 篇 zhu fuchen
  • 3 篇 du jiao
  • 3 篇 feng rongquan
  • 3 篇 saman riaz
  • 3 篇 muhammad nadeem
  • 3 篇 邓富国
  • 3 篇 houzhen wang
  • 3 篇 pang shanqi
  • 3 篇 ali arshad
  • 3 篇 boris s. verkhov...
  • 3 篇 chen zhixiong
  • 3 篇 周宏余
  • 3 篇 liu jinhui
  • 3 篇 gao fei
  • 3 篇 李春燕
  • 3 篇 syeda wajiha zah...
  • 3 篇 huanguo zhang
  • 3 篇 jia jianwei

语言

  • 279 篇 英文
  • 24 篇 中文
检索条件"主题词=cryptography"
303 条 记 录,以下是251-260 订阅
排序:
A NEW IMAGE ENCRYPTION ALGORITHM BASED ON LIU CHAOTIC SYSTEMS
A NEW IMAGE ENCRYPTION ALGORITHM BASED ON LIU CHAOTIC SYSTEM...
收藏 引用
2007中国宁波国际计算机科学与技术学术大会
作者: Chen Dong School of Computer Science and Information Technology Zhejiang Wanli University
As a novel technology in cryptography,digital chaotic cipher has been attracted researcher dense interest and widely studied.Chaos,as a kind of nonlinear phenomenon.This paper investigates a new method to encrypt imag... 详细信息
来源: cnki会议 评论
Extracting Cryptographic Keys *** Applications
收藏 引用
Semiconductor Science and Information Devices 2021年 第2期3卷 1-11页
作者: Shaun Mc Brearty william Farrelly Kevin Curran Institute of Technology SligoIreland Letterkenny Institute of Technology LetterkennyIreland Ulster University DerryUnited Kingdom
In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievingh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Blind Threshold Proxy Signature Scheme with Revoking Anonymity
收藏 引用
通讯和计算机(中英文版) 2005年 第9期2卷 41-45页
作者: Xiaoming Wang Department of Computer Science Jinan University Guangzhou 510632 China
A blind threshold proxy signature scheme with revoking anonymity is proposed according to the benefit of the original signer and the proxy signer. In the proposed scheme, the actual threshold proxy signer is unidentif... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Time Slices Information Concealed Cryptosystem Model
A Time Slices Information Concealed Cryptosystem Model
收藏 引用
2007年国际电子商务、工程及科学领域的分布式计算和应...
作者: Zhichao Yan Qingping Guo Yifan Huang Department of Computer Science and Technology Wuhan University of Technology Wuhan Hubei 430063.P.R.China
This paper introduces a cryptosystem model that conceals the information of time slices between the password characters. See the time-gap generated through the keystroke as cryptical information, we encrypt and decryp... 详细信息
来源: cnki会议 评论
Modified Harn Authentication Key Exchange Scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2000年 第1期7卷 75-77页
作者: LIZi-chen LIZhong-xian InformationSecurityCenter BeijingUniversityofPostsandTelecommunicationsBeijing100876P.R.China Infor
Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out at first that there is a weakness in Harn's system and then we propose two modified schemes to a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Comparative Study of Different Cryptographic Algorithms
收藏 引用
Journal of Information Security 2020年 第3期11卷 138-148页
作者: Baha Eldin Hamouda Hassan Hamouda Department of Information Technology Gulf Colleges Hafar Al-Batin KSA
With the increasing interconnection of computer networks and sophistication of cyber-attacks, cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm
收藏 引用
Journal of Software Engineering and Applications 2020年 第3期13卷 25-40页
作者: Emmanuel Nwabueze Ekwonwune Victor Chibunna Enyinnaya Department of Computer Science Imo State University Owerri Nigeria Department of Computer Science Abia State College of Health Sciences and Management Technology Aba Abia State Nigeria
The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on M... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
GMW sequences over Galois rings and their linear complexities
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2009年 第2期4卷 141-144页
作者: Nigang SUN Lei HU Department of Computer Science and Engineering East China University of Science and TechnologyShanghai 200237China State Key Laboratory of Information Security Graduate University of Chinese Academy of SciencesBeijing 100049China
A new family of GMW sequences over an arbitrary Galois ring was defined by using the trace functions and permutations.This generalizes the concept of GMW sequences over finite fields.Utilizing the Fourier representati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Modified Harn Authentication Key Exchange Scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2000年 第Z1期 75-77页
作者: LI Zi-chen, LI Zhong-xian, YANG Yi-xian (Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, P.R. China)
Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out at first that there is a weakness in Harn’s system and then we propose two modified schemes to ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Security Framework for Distributed Database System
收藏 引用
Journal of Data Analysis and Information Processing 2019年 第1期7卷 1-13页
作者: Allajabu Dafalla Khamis Saad Subair College of Computer and Information Science Faculty of Graduate Studies Alzaem Alazhari University Khartoum Sudan College of Computer Studies International University of Africa Khartoum Sudan
This research aims to study various Symmetrical Algorithms, while the main objective of this study is to find out a suitable algorithm for the encryption of any specific size of text file where the experiment of each ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论