ENCRYPTION相关论文
In this paper, we have proposed a novel encryption scheme with chaotic process based on Enigma. The encryption scheme ta......
Virtual machine in the migration process is inevitable attack or cracked,so the virtual machine migration,in order to sa......
With the development of the Internet and mobile terminals, more and more pirate digital music resources are easily disse......
在计算全息和双随机相位编码技术的基础上,提出了一种虚拟光学加解密算法。该算法采用两路随机相位函数相同但是空间参数不同的双......
在输入面和频谱面上分别放置随机相位加密模板对图像数据进行加密是一种高密级的有效数据加密技术。在研究双随机相位数据加密技术......
Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques.Pr......
The image\s least significant bit(LSB) covers lots of the details that have been commonly used in image encryption anal......
Secure orthogonal time-frequency multiplexing with two-dimensional encryption for optical-wireless c
This paper firstly,to the best of our knowledge,proposed two-dimensional(2D)encryption based on the Arnold transformatio......
Light-Weight White-Box Encryption Scheme with Random Padding for Wearable Consumer Electronic Device
Wearable devices can be potentially captured or accessed in an unauthorized manner because of their physical nature.......
With the rapid developments of information technology,various industries become much more dependent on networks.Driven b......
As a popular real-time service on the Internet,Voice over Internet Protocol(VoIP)communication attracts more and more at......
Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the mul......
每个电脑爱好者都有一些对自己来说非常重要的文件,你可能不喜欢让别人看到你的文件内容。直接备份到CD-R上、锁到抽屉里,并不是什......
The widespread use of mobile devices in digital community has promoted the variety of data collecting methods.However,th......
Vol.13 No.1Jun.2003Influenee of Lithologieal Charaeters of Coal Bearing Formation on Stability of Roof of Coal Seams .........
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption sch......
Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theor......
In this paper,an embedded Video Transmission System based on H.264 is proposed.In this system,the latest video compressi......
Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the probl......
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure i......
A low-power and low-cost advanced encryption standard(AES) coprocessor is proposed for Zigbee system-on-a-chip(SoC) desi......
随着无线技术的发展,无线局域网已经成为IT行业的一个新的热点,渐渐成为计算机网络的一个重要的组成部分。本文从分析无线局域网的......
Design and Implementation of the Motion Compensation Module for HDTV Video Decoder……………………………WANG Tao(王 涛),......
早期的智能卡普遍采用DES(DataEncryptionStandard)来进行数据的加/解密,但其安全性已无法满足网上交易和其它一些需要高加密强度......
1.Encryption 加密 2.Dial-up 拔号 3.Bandwidth 带宽 4.IP(Internet Protocol) 网间协议 5.Router 路由器 6.LAN(Local Area Net......
A reconfigurable cipher chip for accelerating DES is described, 3DES and AES computations that demand high performance a......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
The reconfigurable cryptographic chip is an integrated circuit that is designed by means of the method of reconfigurable......
It is crucial to design energy-efficient advanced encryption standard (AES) cryptography for low power embedded systems ......
Smart Card PrimerA smart card is a device that includes an embedded integrated circuit chip (ICC) that can be either a s......
This paper describes a high security data transmission system over X-band microwave frequency. The paper has two parts. ......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
This paper presents an AES(advanced encryption standard) chip that combats differential power analysis (DPA) side-channe......
功耗分析是一种有效的密码芯片侧信道攻击方法,攻击者不需要清楚芯片的内部信息,仅通过监测芯片的功耗曲线就可以分析出卡片内的密......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
A reforming dynamic system based on the single-ring erbium-doped fiber laser is proposed in this paper.The reforming sys......
High-speed all-optical logic circuits have attracted much attention because of their important roles in signal processin......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
Internet traffic classification is vital to the areas of network operation and management. Traditionalclassification me......
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR N
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without fi......
请下载后查看,本文暂不支持在线获取查看简介。
Please download to view, this article does not support online access to view......
User authentication plays very role in computing system.In this thesis,firstly we studied Smart Card and user authentica......
Biometrics has been incorporated by several organizations as a security authentication feature,with its uniqueness to an......
分析无线局域网近年来的发展特点及其在安全方面存在的不足.针对802.11中安全协议的不足,自主设计开发了嵌入MAC层的802.11自主安......
以广东电网公司2013年费控电能表试点建设为对象,主要介绍了项目组成概况和各子系统结构。重点讲解了项目的安全体系和安全机制,对密......