期刊文献+
共找到1,830篇文章
< 1 2 92 >
每页显示 20 50 100
MAVP-FE:Multi-Authority Vector Policy Functional Encryption with Efficient Encryption and Decryption 被引量:1
1
作者 WANG Jing HUANG Chuanhe +3 位作者 YANG Kan WANG Jinhai WANG Xiaomao CHEN Xi 《China Communications》 SCIE CSCD 2015年第6期126-140,共15页
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte... In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice. 展开更多
关键词 cloud storage data access control functional encryption hidden access policy efficiency
下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
2
作者 ZENG Jianhua ZHAN Yanlin YANG Jianrong 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image encryption decryption single channel RGB component image disrupting
下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
3
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
下载PDF
Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption 被引量:8
4
作者 Tao Feng Hongmei Pei +2 位作者 Rong Ma Youliang Tian Xiaoqin Feng 《Computers, Materials & Continua》 SCIE EI 2021年第1期871-884,共14页
Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent char... Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model. 展开更多
关键词 Blockchain privacy protection attribute encryption access control searchable-encryption
下载PDF
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
5
作者 Yongxia Shi Ehsan Nekouei 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期946-955,共10页
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-trigger... This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results. 展开更多
关键词 Cyber-security encrypted control event-triggered control(ETC) networked control systems(NCSs) semi-homomorphic encryption
下载PDF
Consensus of networked control multi-agent systems using a double-layer encryption scheme 被引量:2
6
作者 Yamin Yan Zhiyong Chen Vijay Varadharajan 《Journal of Automation and Intelligence》 2023年第4期218-226,共9页
This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging ... This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging scenario where partial dynamic entities or remote control units are vulnerable to disclosure attacks,making them potentially malicious.To tackle this issue,we propose a secure decentralized control design approach employing a double-layer cryptographic strategy.This approach not only ensures that the input and output information of the benign entities remains protected from the malicious entities but also practically achieves consensus performance.The paper provides an explicit design,supported by theoretical proof and numerical verification,covering stability,steady-state error,and the prevention of computation overflow or underflow. 展开更多
关键词 Multi-agent systems Networked control Cyberphysical security encryption CONSENSUS
下载PDF
Searchable Encryption with Access Control on Keywords in Multi-User Setting 被引量:2
7
作者 Lei Li Chungen Xu +2 位作者 Xiaoling Yu Bennian Dou Cong Zuo 《Journal of Cyber Security》 2020年第1期9-23,共15页
Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a ... Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a fine-grained and flexible access control mechanism.The main idea of this paper is to let the owner classify his data and then authorizes others according to categories.The cloud server maintains a permission matrix,which will be used to verify whether a trapdoor is valid or not.In this way we can achieve access control and narrow the search range at the same time.We prove that our scheme can achieve index and trapdoor indistinguishability under chosen keywords attack security in the random oracles. 展开更多
关键词 Searchable encryption access control cloud computing permission assignment
下载PDF
OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING
8
作者 Xu Lingling Zhang Fangguo Wen Yamin 《Journal of Electronics(China)》 2011年第4期571-579,共9页
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ... In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow. 展开更多
关键词 Oblivious Transfer(OT) Access control(AC) Identity-Based encryption(IBE) Anonymous Key Issuing(AKI)
下载PDF
Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
9
作者 Xi Lin Yiliang Han 《国际计算机前沿大会会议论文集》 2017年第1期54-55,共2页
To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access c... To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access control scheme of private data based on attribute encryption.First,we construct a new algorithm based on attribute encryption,which divides encryption into two phases,and we can design two types of attributes encryption strategy to make sure that different users could get their own decryption keys corresponding to their permissions.We encrypt the private data hierarchically with our algorithm to realize“precise”,“more accurate”,“fuzzy”and“private”four management modes,then users with higher permissions can access the private data inferior to their permissions.And we outsource some complex operations of decryption to DSP to ensure high efficiency on the premise of privacy protection.Finally,we analyze the efficiency and the security of our scheme. 展开更多
关键词 Data SHARING HIERARCHICAL access control ATTRIBUTE encryption OUTSOURCING decryption
下载PDF
Digital image encryption with chaotic map lattices 被引量:8
10
作者 孙福艳 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期132-138,共7页
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o... This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency. 展开更多
关键词 image encryption image decryption chaotic map lattice CRYPTOGRAPHY spatiotemporal chaotic system
下载PDF
Substring-searchable attribute-based encryption and its application for IoT devices 被引量:3
11
作者 Xi Sun Hao Wang +4 位作者 Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei 《Digital Communications and Networks》 SCIE CSCD 2021年第2期277-283,共7页
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices. 展开更多
关键词 Attribute-based encryption Searchable encryption Outsourcing decryption IoT divices
下载PDF
Decryption of pure-position permutation algorithms 被引量:3
12
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 decryption Image encryption FUZZY Position permutation
下载PDF
Optical encryption with cascaded fractional wavelet transforms 被引量:1
13
作者 BAO Liang-hua CHEN Lin-fei ZHAO Dao-mu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第8期1431-1435,共5页
On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractiona... On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information se-curity. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical reali-zation of encryption and decryption is proposed. Computer simulations confirmed its possibility. 展开更多
关键词 Wavelet transform (WT) Cascaded fractional wavelet transform (CFWT) encryption decryption
下载PDF
Implementing Broadcast Encryption Scheme Using Bilinear Map and Group Characteristic
14
作者 ZHANG Yichun LIU Jianbo JIN Libiao LI Jianzeng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1554-1558,共5页
This paper introduced a novel method for implementing broadcast encryption. Our scheme takes advantages of bilinear map and group characteristic, and shifts most of the storage overhead to the public device instead of... This paper introduced a novel method for implementing broadcast encryption. Our scheme takes advantages of bilinear map and group characteristic, and shifts most of the storage overhead to the public device instead of storing in the tamper-proof device which is a major problem on current implementation. Furthermore, the broadcast keys in our scheme could be reused periodically resulting in more operational efficiency. 展开更多
关键词 broadcast encryption bilinear map access control
下载PDF
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance
15
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2022年第11期3827-3845,共19页
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of images.Since the work is done offshore,these agreements or images must be shared through the Internet or stored over the cloud.The breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of danger.This article proposes a novel algorithm for securing the NDAs in the form of images.As an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the Internet.As the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of time.The confusion effects have been realized through an XOR operation between the confused image,and chaotic data.Besides,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it has.The machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images. 展开更多
关键词 Non-disclosure agreement encryption decryption secret key chaoticmap CONFUSION diffusion
下载PDF
Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
16
作者 S.Saravanakumar S.Chitra 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期985-996,共12页
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti... Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files. 展开更多
关键词 Cloud computing storage identification based revocation attribute based access control encryption decryption
下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
17
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption decryption cloud security matrix cipher
下载PDF
Chaos-Based Encryption of ECG Signals: Experimental Results
18
作者 Gutenbert Kenfack Alain Tiedeu 《Journal of Biomedical Science and Engineering》 2014年第6期368-379,共12页
In this work, we suggest a system for chaos-based encryption of electrocardiographic signals. It uses simple electronics organized around a colpitts chaotic oscillator. The system has been designed, implemented and te... In this work, we suggest a system for chaos-based encryption of electrocardiographic signals. It uses simple electronics organized around a colpitts chaotic oscillator. The system has been designed, implemented and tested. The encrypted signal has been decrypted and compared to the original ECG signal. Experimental results were analysed and proved encouraging. 展开更多
关键词 ECG COLPITTS OSCILLATOR CHAOS encryption decryption
下载PDF
ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
19
作者 龙宇 陈克非 刘胜利 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期127-133,共7页
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext... B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively. 展开更多
关键词 threshold decryption identity-based cryptology publicly checkable encryption
下载PDF
VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption
20
作者 M.Sundar Prakash Balaji V.R.Vijaykumar +2 位作者 Kamalraj Subramaniam M.Kannan V.Ayyem Pillai 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3155-3168,共14页
The current research work proposed a novel optimization-based 2D-SIMM(Two-Dimensional Sine Iterative chaotic map with infinite collapse Mod-ulation Map)model for image encryption.The proposed 2D-SIMM model is derived o... The current research work proposed a novel optimization-based 2D-SIMM(Two-Dimensional Sine Iterative chaotic map with infinite collapse Mod-ulation Map)model for image encryption.The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse(ICMIC).In this technique,scrambling effect is achieved with the help of Chaotic Shift Transform(CST).Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model.These chaotic sequences,generated using 2D-SIMM model,are sensitive to initial conditions.In the proposed algorithm,these initial conditions are optimized using JAYA optimization algorithm.Correlation coefficient and entropy are considered asfitness functions in this study to evaluate the best solution for initial conditions.The simulation results clearly shows that the proposed algorithm achieved a better performance over existing algorithms.In addition,the VLSI implementation of the proposed algorithm was also carried out using Xilinx system generator.With optimization,the correlation coefficient was-0.014096 and without optimization,it was 0.002585. 展开更多
关键词 Chaotic mapping 2D-SIMM encryption decryption jaya optimization
下载PDF
上一页 1 2 92 下一页 到第
使用帮助 返回顶部