咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 21 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 14 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 化学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...

主题

  • 21 篇 diffie-hellman a...
  • 3 篇 one-way function...
  • 3 篇 cellular automat...
  • 2 篇 built-in process...
  • 2 篇 merkel tree
  • 2 篇 cloud storage
  • 2 篇 integrity verifi...
  • 1 篇 rivest-shamir-ad...
  • 1 篇 xor operation
  • 1 篇 partial sum
  • 1 篇 ecc (elliptic cu...
  • 1 篇 data security
  • 1 篇 multi-hop transa...
  • 1 篇 bilinear pairing
  • 1 篇 project-based le...
  • 1 篇 security concern
  • 1 篇 microarchitectur...
  • 1 篇 data privacy
  • 1 篇 diffie-hellman p...
  • 1 篇 the shared secre...

机构

  • 2 篇 natl acad sci uk...
  • 2 篇 taras shevchenko...
  • 2 篇 national enginee...
  • 1 篇 program system a...
  • 1 篇 maharashtra pune
  • 1 篇 british univ egy...
  • 1 篇 inst space techn...
  • 1 篇 beijing universi...
  • 1 篇 guangxi expt ctr...
  • 1 篇 beijing universi...
  • 1 篇 shanghai maritim...
  • 1 篇 shanghai dev ctr...
  • 1 篇 sri sai ram inst...
  • 1 篇 school of comput...
  • 1 篇 harokopio univ a...
  • 1 篇 univ waterloo de...
  • 1 篇 parul university...
  • 1 篇 research automat...
  • 1 篇 symbiosis instit...
  • 1 篇 tianjin univ tec...

作者

  • 2 篇 berestov denis
  • 2 篇 shevchenko volod...
  • 2 篇 liu jianyi
  • 2 篇 shevchenko vikto...
  • 2 篇 li jiaqi
  • 2 篇 zhang ru
  • 1 篇 lin xiaodong
  • 1 篇 kumar vishnu
  • 1 篇 adhvaryu rachit
  • 1 篇 waseem hafiz muh...
  • 1 篇 borodzhieva adri...
  • 1 篇 wang xunjun
  • 1 篇 burek elzbieta
  • 1 篇 huang fuhua
  • 1 篇 volodymyr shevch...
  • 1 篇 sinitsyn igor
  • 1 篇 nirmala e.
  • 1 篇 dai bingrong
  • 1 篇 srinivasan c.
  • 1 篇 du yun-yun

语言

  • 19 篇 英文
  • 2 篇 其他
检索条件"主题词=Diffie-Hellman Algorithm"
21 条 记 录,以下是1-10 订阅
排序:
A simple deniable authentication protocol based on the diffie-hellman algorithm
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 2008年 第9期85卷 1315-1323页
作者: Lu, Rongxing Lin, Xiaodong Cao, Zhenfu Qin, Liuquan Liang, Xiaohui Shanghai Jiao Tong Univ 800 Dept Comp Sci & Engn Shanghai Peoples R China Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada
Deniable authentication protocol is a new authentication mechanism in secure computer communication, that not only enables an intended receiver to identify the source of a received message but also prevents a third pa... 详细信息
来源: 评论
Project-Based Learning for Teaching "diffie-hellman algorithm, Elgamal Variant"  29
Project-Based Learning for Teaching "Diffie-Hellman Algorith...
收藏 引用
29th International Conference on Systems, Signals and Image Processing (IWSSIP)
作者: Borodzhieva, Adriana Univ Ruse Angel Kanchev Dept Telecommun Ruse Bulgaria
The paper presents the application of the flipped classroom and project-based learning approaches used in the course "Telecommunication Security" intended for students from the specialty "Internet and M... 详细信息
来源: 评论
Automated Design of the Structure of One-Way Functions for the Modified diffie-hellman algorithm  16
Automated Design of the Structure of One-Way Functions for t...
收藏 引用
IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)
作者: Shevchenko, Volodymyr Berestov, Denis Sinitsyn, Igor Shevchenko, Viktor Dimitrov, Georgi Taras Shevchenko Natl Univ Kyiv Program Syst & Technol Dept Kiev Ukraine Natl Acad Sci Ukraine Inst Software Syst Res Automat Software Dept Kiev Ukraine Univ Lib Studies & Informat Technol Informat Syst & Technol Dept Sofia Bulgaria
In this paper we proposed a system for automated search of cellular automata that can be used as a one-way function in the diffie-hellman algorithm. In the paper a new type of cellular automata with modified behavior ... 详细信息
来源: 评论
Secure-EEDR: Dynamic key exchange protocol based on diffie-hellman algorithm with NOVSF code-hopping technique for wireless sensor networks
Secure-EEDR: Dynamic key exchange protocol based on Diffie-H...
收藏 引用
International Conference on Innovative Computing and Communication/Asia-Pacific Conference on Information Technology and Ocean Engineering
作者: Kumar, Vishnu Park, Yunjung Min, Dugki Choi, Eunmi Konkuk Univ Sch Informat & Commun Engn Seoul South Korea Kookmin Univ Sch Business IT Seoul South Korea
Secure data transmission and data routing are critical in designing cluster based sensor network. This paper presents a secure energy efficient dynamic routing scheme (SEEDR) for wireless sensor networks. SEEDR uses a... 详细信息
来源: 评论
Scheme to Improve Integrity Verification of Cloud Storage Based on diffie-hellman algorithm
Scheme to Improve Integrity Verification of Cloud Storage Ba...
收藏 引用
第十届中国通信学会学术年会
作者: Li Jiaqi Liu Jianyi Zhang Ru National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunication Key Laboratory of Trustworthy Distributed Computing and Service
Focusing on current communication overspending in the integrity verification scheme based on the Merkel Tree,using the difficulty of factoring large integers,an integrity verification scheme based on diffie-hellman al... 详细信息
来源: 评论
Scheme to Improve Integrity Verification of Cloud Storage Based on diffie-hellman algorithm
Scheme to Improve Integrity Verification of Cloud Storage Ba...
收藏 引用
第十届中国通信学会学术年会
作者: Li Jiaqi Liu Jianyi Zhang Ru National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Tel National Engineering Laboratory for Disaster Backup and Recovery Key Laboratory of Trustworthy Distr
Focusing on current communication overspending in the integrity verification scheme based on the Merkel Tree, using the difficulty of factoring large integers, an integrity verification scheme based on diffie-hellman ... 详细信息
来源: 评论
A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks
收藏 引用
CHINESE JOURNAL OF ELECTRONICS 2013年 第3期22卷 577-582页
作者: Shang Tao Huang Fuhua Chen Jie Liu Jianwei Beihang Univ Coll Elect & Informat Engn Beijing 100191 Peoples R China
ZigBee network is a kind of flexible wireless network technology for control and monitoring applications and new techniques of security measures are essential for high-survivability network. Based on the effectiveness... 详细信息
来源: 评论
diffie-hellman process and its use in secure and authenticated VC networks
收藏 引用
IET INTELLIGENT TRANSPORT SYSTEMS 2018年 第9期12卷 1082-1087页
作者: Panagiotopoulos, Ilias Dimitrakopoulos, George Harokopio Univ Athens Dept Telemat & Informat 9 Omirou St Athens 17778 Greece
The automotive companies nowadays are working on the development and deployment of the future intelligent transportation systems and connected-autonomous driving addressing any security and privacy concerns of users. ... 详细信息
来源: 评论
A novel image encryption scheme based on Arnold scrambling and Lucas series
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2019年 第19期78卷 27611-27637页
作者: Batool, Syeda Iram Waseem, Hafiz Muhammad Inst Space Technol CISL Islamabad Pakistan Inst Space Technol Dept Avion Engn Islamabad Pakistan Inst Space Technol Dept Elect Engn Islamabad Pakistan
Secure data transmission over the public channels have high impact and increasingly important due to theft and manipulation in contents. The requirement of public/ private organizations to develop an efficient scheme ... 详细信息
来源: 评论
SIDH Hybrid Schemes with Classical Component Based on the Discrete Logarithm Problem over Finite Field Extension
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS 2020年 第3期66卷 431-441页
作者: Wronski, Michal Burek, Elzbieta Dzierzkowski, Lukasz Mil Univ Technol Fac Cybernet Inst Math & Cryptol Warsaw Poland
The concept of a hybrid scheme with connection of SIDH and ECDH is nowadays very popular. In hardware implementations it is convenient to use a classical key exchange algorithm, which is based on the same finite field... 详细信息
来源: 评论