全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Rolando Montero-Canela , Ernesto Zambrano-Serrano , Edna I. Tamariz-Flores ...
来源:[J].Ad Hoc Networks(IF 1.456), 2020, Vol.97
摘要:...4 frame is encrypted using a fractional-order encryption key and four iterative steps. It is worth to note that the chaotic key is based on a fractional-order chaotic system, which is derived from the fractional calculus theory. Fractional-order chaotic dynamics are demonstrat...
作者:Aymen Ghilen , Mostafa Azizi , Ridha Bouallegue
来源:[J].Wireless Personal Communications(IF 0.428), 2017, Vol.95 (2), pp.1655-1675
摘要:According to the principles of quantum mechanics, quantum cryptography provides the necessary means to establish a secret and perfectly random key material between two parties. However, classical cryptography suffers from several vulnerabilities that make it unsecure against impe...
作者:Yong Up Lee
来源:[J].IETE Technical Review(IF 0.705), 2015, Vol.32 (6), pp.454-461
摘要:ABSTRACT(#br)In order to overcome the inconvenient problems of the conventional visible light (VL) positioning technique, which has the signal distortion due to fading, the co-channel interference by the neighbour VL transmitters, or the data interception, the stream encryption key
作者:G. Uma , Dr. L. Jayasimman
来源:[J].Journal of Physics: Conference Series, 2018, Vol.1142 (1)
摘要:... Deduplication is possible in cloud only with the use of convergent encryption (CE) technique. This technique is used to generate convergent encryption key from the user data which is to be uploaded to the cloud and the user’s data are encrypted with this convergent encryption key....
作者:A.P. Bondareva , P.A. Cheremkhin , N.N. Evtikhiev ...
来源:[J].Physics Procedia, 2015, Vol.73, pp.320-327
摘要:Abstract(#br)Scheme of optical image encryption with digital information input and dynamic encryption key based on two liquid crystal spatial light modulators and operating with spatially-incoherent monochromatic illumination is experimentally implemented. Results of experim...
作者:Kisun Park , Minji Park , Ho Seong Jang ...
来源:[J].Advanced Functional Materials(IF 9.765), 2018, Vol.28 (21), pp.n/a-n/a
摘要:Abstract(#br)This study proposes a novel and highly secure encryption technology based on plasmonic‐enhanced upconversion luminescence (UCL). The technology can be realized by a disordered plasmonic nanostructure composed of a transferred metal nanoparticle–UC nanocrystals ...
作者:Anatoly Beletsky
来源:[J].Ìnformacìjnì Tehnologìï v Osvìtì, 2016, (26), pp.7-24
摘要:The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is ba...
作者:M.M. Emmanuel , M.N. Ibrahim , A.E. Roger
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (1)
摘要:... The difficulty then resides in the usage and backup of the encryption key so as to guarantee data security. To do this, current approaches are either to hide the encryption key in the application source code or somewhere on disk, it’s safety then being compromised; or to...
作者:Yufeng Xie , Wenxiang Jian , Xiaoyong Xue ...
来源:[J].IEICE Electronics Express(IF 0.268), 2012, Vol.9 (12), pp.1051-1056
摘要:Japan's largest platform for academic e-journals: J-STAGE is a full text database for reviewed academic papers published by Japanese societies

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×