×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [12]
中国科学院大学 [4]
兰州理工大学 [3]
数学与系统科学研究院 [2]
湖南大学 [2]
清华大学 [1]
更多...
内容类型
期刊论文 [22]
会议论文 [7]
学位论文 [2]
发表日期
2022 [2]
2021 [1]
2020 [1]
2019 [3]
2018 [1]
2017 [2]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共31条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A novel hyperchaotic image encryption algorithm with simultaneous shuffling and diffusion
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 15, 页码: 21975-21994
作者:
Gui, Xiangquan
;
Huang, Jun
;
Li, Li
;
Li, Shouliang
;
Cao, Jie
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/04/21
Hyperchaotic map
Image encryption
Simultaneous shuffling and diffusion
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks
期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 页码: 16
作者:
Zheng, Wenbo
;
Yan, Lan
;
Gou, Chao
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2022/01/27
Encryption
DNA
Color
Resists
Computational modeling
Image coding
Complex systems
Artificial image and parallel execution (ACP) method
color image encryption
computational experiment
image division block
parallel computing
Federated Tensor Mining for Secure Industrial Internet of Things
期刊论文
IEEE Transactions on Industrial Informatics, 2020, 卷号: 16, 期号: 3, 页码: 2144-2153
作者:
Kong LH(孔令和)
;
Liu, Xiao-Yang
;
Sheng H(盛浩)
;
Zeng P(曾鹏)
;
Chen, Guihai
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/02/17
Industrial internet of things
security
tensor-based data mining
A digital image encryption algorithm based on chaotic mapping
期刊论文
JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2019, 卷号: 13
作者:
Deng, Zhijuan
;
Zhong, Shaojun
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/08/22
Information security
digital image
chaos sequence
algorithm
encryption
decryption
Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 74070-74080
作者:
Yu Liu
;
Zheng Qin
;
Jiahui Wu
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/13
Encryption
Logistics
Random sequences
Digital images
Data mining
Image encryption
plaintext attacks
security analysis
dynamic diffusion
chaotic cryptanalysis
Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 74070-74080
作者:
Liu, Y
;
Qin, Z
;
Wu, JH
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
Image encryption
plaintext attacks
security analysis
dynamic diffusion
chaotic cryptanalysis
A based on blinded CP-ABE searchable encryption cloud storage service scheme
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 卷号: 31, 期号: 10
作者:
Cao, Laicheng
;
Zhang, Jinbo
;
Dong, Xiaoye
;
Xi, Chengzhe
;
Wang, Yafei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/15
blinded attribute
cloud storage
multiple data owners
users
pre-decryption
searchable encryption
Encryption algorithm based on Hadoop and non-degenerate high-dimensional discrete hyperchaotic system
期刊论文
ACTA PHYSICA SINICA, 2017, 卷号: 66, 期号: 23, 页码: 14
作者:
Wen He-Ping
;
Yu Si-Min
;
Lu Jin-Hu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2018/07/30
chaotic system
chaotic cipher
Hadoop
A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map
期刊论文
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2017, 卷号: 27, 期号: 7, 页码: 14
作者:
Lin, Zhuosheng
;
Yu, Simin
;
Lu, Jinhu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2018/07/30
8D hyperchaotic map
constant and variable nominal matrix
matrix elements switching control
chaotic hash function
©版权所有 ©2017 CSpace - Powered by
CSpace