ENCRYPTION

作品数:505被引量:970H指数:11
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:秦静韩斐杨洋王于丁凌晓更多>>
相关机构:清华大学南京航空航天大学西北工业大学上海交通大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划中国博士后科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Joint Watermarking and Encryption for Social Image Sharing
《Computers, Materials & Continua》2025年第5期2927-2946,共20页Conghuan Ye Shenglong Tan Shi Li Jun Wang Qiankun Zuo Bing Xiong 
funded by NSFC Grants 61502154,61972136,the NSF of Hubei Province(2023AFB004,2024AFB544);Hubei Provincial Department of Education Project(No.Q20232206);Project of Hubei University of Economics(No.T201410).
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social...
关键词:Multimedia security digital watermarking image encryption image sharing privacy protection 
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
《Journal of Electronic Research and Application》2025年第2期159-165,共7页Zhihong Jin 
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i...
关键词:Data encryption Data decryption Communication security Data storage encryption Key management 
Analysis and image encryption of memristive chaotic system with coexistence bubble
《Chinese Physics B》2025年第4期250-260,共11页Da Qiu Bo Zhang Tingting Zhang Song Liu Peiyu He 
Project supported by the Natural Science Foundation of Hubei Province(Grant No.2024AFD068).
In recent years,the phenomenon of multistability has attracted wide attention.In this paper,a memristive chaotic system with extreme multistability is constructed by using a memristor.The dynamic behavior of the syste...
关键词:coexistence bubble extreme multistability clustered oscillation anti-monotonicity 
IDCE:Integrated Data Compression and Encryption for Enhanced Security and Efficiency
《Computer Modeling in Engineering & Sciences》2025年第4期1029-1048,共20页Muhammad Usama Arshad Aziz Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev 
the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive da...
关键词:Chaotic maps SECURITY data compression data encryption integrated compression and encryption 
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
《Computers, Materials & Continua》2025年第3期5387-5405,共19页Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang 
supported by Natural Science Foundation of China(Nos.62303126,62362008,author Z.Z,https://www.nsfc.gov.cn/,accessed on 20 December 2024);Major Scientific and Technological Special Project of Guizhou Province([2024]014);Guizhou Provincial Science and Technology Projects(No.ZK[2022]General149) ,author Z.Z,https://kjt.guizhou.gov.cn/,accessed on 20 December 2024);The Open Project of the Key Laboratory of Computing Power Network and Information Security,Ministry of Education under Grant 2023ZD037,author Z.Z,https://www.gzu.edu.cn/,accessed on 20 December 2024);Open Research Project of the State Key Laboratory of Industrial Control Technology,Zhejiang University,China(No.ICT2024B25),author Z.Z,https://www.gzu.edu.cn/,accessed on 20 December 2024).
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model training.However,dishonest clouds may infer user data,resulting in user data leakage.P...
关键词:Functional encryption multi-sourced heterogeneous data privacy preservation neural networks 
Witness encryption with updatable ciphertexts
《Science China(Information Sciences)》2025年第3期177-192,共16页Yuzhu WANG Mingwu ZHANG 
supported in part by National Natural Science Foundation of China(Grant Nos.62072134,62472150,U2001205);Major Research Plan of Hubei Province(Grant No.2023BAA027);Key Research and Development Program of Hubei Province(Grant No.2021BEA163)。
Witness encryption(WE)is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance.Anyone who possesses a solution to this instance(i.e.,a witness)can then recover the message f...
关键词:witness encryption NP relation updatable ciphertext access control indistinguishable obfuscation 
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
《密码学报(中英文)》2025年第1期227-246,共20页WAN Ming WANG Geng GU Da-Wu 
National Key Research and Development Program of China(2021YFB3101402);National Natural Science Foundation of China(62202294)。
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth...
关键词:predicate encryption function privacy inner product generic group model 
Unevenly distributed pixel-based camouflage metasurface hiding multiwavelength holograms in color printing
《Advanced Photonics》2025年第1期23-30,共8页Yaqin Zheng Yuan Liao Yulong Fan Lei Zhang Zhang-Kai Zhou Dangyuan Lei 
supported by the Innovation and Technology Commission of Hong Kong(Grant No.GHP/026/19GD);the Research Grants Council of Hong Kong(Grant No.Ao E/P-502/20);the National Key R&D Program of China(Grant No.2021YFA1400804);the National Natural Science Foundation of China(Grant No.12222415);the Guangdong Natural Science Fund(Grant Nos.2024B1515040013 and 2020A0505140004);the Guangdong Provincial Quantum Science Strategic Initiative(Grant No.GDZX2305005)。
Ultracompact metasurfaces have gained a high reputation for manipulating light fields precisely within a subwavelength scale,bringing great development to the fields of nanophotonics,integrated optics,and quantum tech...
关键词:metasurface HOLOGRAM CAMOUFLAGE ENCRYPTION 
Oversampling-Enhanced Feature Fusion-Based Hybrid ViT-1DCNN Model for Ransomware Cyber Attack Detection
《Computer Modeling in Engineering & Sciences》2025年第2期1667-1695,共29页Muhammad Armghan Latif Zohaib Mushtaq Saifur Rahman Saad Arif Salim Nasar Faraj Mursal Muhammad Irfan Haris Aziz 
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection mechanisms.This study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutiona...
关键词:Ransomware attacks CYBERSECURITY vision transformer convolutional neural network feature fusion ENCRYPTION threat detection 
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
《Computers, Materials & Continua》2025年第2期2637-2664,共28页Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 
funded by Princess Nourah bint Abdulrahman UniversityResearchers Supporting Project number (PNURSP2024R408), Princess Nourah bint AbdulrahmanUniversity, Riyadh, Saudi Arabia.
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built...
关键词:CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption 
检索报告 对象比较 聚类工具 使用帮助 返回顶部