咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 24 篇 计算机科学与技术...
    • 11 篇 信息与通信工程
    • 10 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
  • 7 篇 理学
    • 7 篇 数学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 39 篇 digital signatur...
  • 4 篇 elliptic curve c...
  • 4 篇 elliptic curve d...
  • 4 篇 digital signatur...
  • 4 篇 cryptography
  • 3 篇 lll algorithm
  • 3 篇 public key crypt...
  • 3 篇 authentication
  • 3 篇 rsa
  • 3 篇 public key
  • 2 篇 falcon
  • 2 篇 intrusion detect...
  • 2 篇 special characte...
  • 2 篇 jpeg2000
  • 2 篇 discrete logarit...
  • 2 篇 babai's nearest ...
  • 2 篇 distortion reduc...
  • 2 篇 crystals-dilithi...
  • 2 篇 post-quantum cry...
  • 2 篇 dsa

机构

  • 4 篇 aristotle univ t...
  • 3 篇 kookmin univ dep...
  • 1 篇 anhui univ inst ...
  • 1 篇 elect & telecomm...
  • 1 篇 inst informat in...
  • 1 篇 tunghai univ dep...
  • 1 篇 peoples secur ac...
  • 1 篇 anna univ ceg de...
  • 1 篇 jeppiaar engn co...
  • 1 篇 univ s florida d...
  • 1 篇 anna univ dept i...
  • 1 篇 univ missouri de...
  • 1 篇 inst informat se...
  • 1 篇 bml munjal univ ...
  • 1 篇 yeungnam univ de...
  • 1 篇 ho chi minh city...
  • 1 篇 chinese univ hon...
  • 1 篇 siddaganga inst ...
  • 1 篇 univ sci & techn...
  • 1 篇 vietnam natl uni...

作者

  • 4 篇 poulakis dimitri...
  • 3 篇 seo seog chung
  • 2 篇 draziotis konsta...
  • 2 篇 adamoudis marios
  • 1 篇 xue-tao zhang
  • 1 篇 tu phan
  • 1 篇 guo-juan song
  • 1 篇 oyanagi k
  • 1 篇 choi junhyeok
  • 1 篇 bose s.
  • 1 篇 park jong-yeon
  • 1 篇 jung heon hui
  • 1 篇 shaji r. s.
  • 1 篇 al-absi ahmed ab...
  • 1 篇 shiny r.
  • 1 篇 oh hyunyoung
  • 1 篇 shin donghyun
  • 1 篇 poulakis d.
  • 1 篇 chow sherman s. ...
  • 1 篇 chen ts

语言

  • 38 篇 英文
  • 1 篇 其他
检索条件"主题词=Digital Signature Algorithm"
39 条 记 录,以下是21-30 订阅
排序:
Cryptography Survey of DSS and DSA
Cryptography Survey of DSS and DSA
收藏 引用
International Conference on Advances in Materials and Manufacturing Engineering (ICAMME)
作者: Al-Absi, Mohammed Abdulhakim Abdullaev, Azamjon Al-Absi, Ahmed Abdulhakim Sain, Mangal Lee, Hoon Jae Dongseo Univ Div Informat & Commun Engn 47 Jurye Ro Busan 47011 South Korea Kyungdong Univ Dept Smart Comp 46 4-Gil Gosung 24764 Gangwon Do South Korea
digital signatures are the basis for identifying who sends file identities in modern society today. digital signatures are a way to provide integrity and reliability for digital data signatures. signatures use a set o... 详细信息
来源: 评论
signature BASED DATA AUDITING UNDER MOBILE CLOUD SYSTEM
SIGNATURE BASED DATA AUDITING UNDER MOBILE CLOUD SYSTEM
收藏 引用
Global Conference on Communication Technologies (GCCT)
作者: Shiny, R. Shaji, R. S. Jayan, J. P. Noorul Islam Univ Dept Software Engn Kumaracoil Tamil Nadu India Noorul Islam Univ Dept IT Kumaracoil Tamil Nadu India
Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence scenario it is very biter to have mobile devices as an interf... 详细信息
来源: 评论
A Dynamic Two-Level Priority Based Authentication System for Job Scheduling in a Heterogeneous Grid Environment
A Dynamic Two-Level Priority Based Authentication System for...
收藏 引用
SAI Computing Conference (SAI)
作者: Gupta, Sunil Gabrani, Goldie BML Munjal Univ Sch Engn & Technol Gurgaon Haryana India
The Grid environment is highly dynamic in nature where a variety of users from all over the world try to access the resources that are again distributed all over. Both the users and resources are highly varied. The us... 详细信息
来源: 评论
Enhancing an Attack to DSA Schemes  8th
Enhancing an Attack to DSA Schemes
收藏 引用
8th International Conference on Algebraic Informatics (CAI)
作者: Adamoudis, Marios Draziotis, Konstantinos A. Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki Greece Aristotle Univ Thessaloniki Dept Informat Thessaloniki Greece
In this paper, we improve the theoretical background of the attacks on the DSA schemes of a previous paper, and we present some new more practical attacks.
来源: 评论
Enhancing Manet Security Using Hybrid Techniques in Key Generation Mechanism
Enhancing Manet Security Using Hybrid Techniques in Key Gene...
收藏 引用
International Conference on Electronics and Communication Systems (ICECS)
作者: Dhanalakshmi, K. S. Kannapiran, B. Divya, A. Kalasalingam Univ Dept ECE Srivilliputhur India Kalasalingam Univ Dept EIE Dept Srivilliputhur India
Mobile Ad Hoc Network is a infrastructure-less, self-configuring wireless network. These unique characteristics makes it ideal for mission critical applications including Personal Area Networking (PAN), military use, ... 详细信息
来源: 评论
Acknowledgement security for MANET using EAACK  1
Acknowledgement security for MANET using EAACK
收藏 引用
International Conference on Green Computing and Internet of Things (ICGCIoT)
作者: Suvarna, Deore Pallavi, Erande Sumitra, Lahane Chhaya, Dhatrak Korade, Mahesh Savitribai Phule Pune Univ Dept Comp Engn Sandip Inst Technol & Res Ctr Pune Maharashtra India
Assembling of wireless mobile equipments which form a network beyond the existing infrastructure is the Mobile Ad-hoc Network. These nodes contracted to communication one another. As nodes from MANET can be connect wi... 详细信息
来源: 评论
Implementation of elliptic-curve cryptography on mobile healthcare devices
Implementation of elliptic-curve cryptography on mobile heal...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Malhotra, K. Gardner, S. Patz, R. Univ Glamorgan Fac Adv Technol Ctr Elect Prod Engn Pontypridd CF37 1DL M Glam Wales
Over the past few years, much research attention has been afforded to the application of remote patient monitoring using embedded mobile devices. However, relatively little research has been done to investigate the se... 详细信息
来源: 评论
Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4
Efficient and Side-Channel Resistant Design of High-Security...
收藏 引用
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
作者: Anastasova, Mila Bisheh-Niasar, Mojtaba Seo, Hwajeong Azarderakhsh, Reza Kermani, Mehran Mozaffari Florida Atlantic Univ Dept Comp & Elect Engn & Comp Sci Boca Raton FL 33431 USA Florida Atlantic Univ I SENSE Boca Raton FL 33431 USA Hansung Univ Div IT Convergence Engn Seoul 136792 South Korea Univ S Florida Dept Comp Engn & Sci Tampa FL 33620 USA
The demand for classical cryptography schemes continues to increase due to the exhaustive studies on their security. Thus, constant improvement of liming, power consumption, and memory requirements are needed for the ... 详细信息
来源: 评论
A Trusted Multi-hop Broadcasting Protocol for Vehicular Ad Hoc Networks
A Trusted Multi-hop Broadcasting Protocol for Vehicular Ad H...
收藏 引用
1st International Conference on Connected Vehicles and Expo
作者: Tian, Daxin Wang, Yunpeng Liu, He Zhang, Xianghong Beihang Univ Beijing Key Lab Cooperat Vehicle Infrastruct Syst Beijing 100191 Peoples R China CPLA Gen Logist Dept Quartermaster Equipment Inst Beijing 100010 Peoples R China
The vehicular ad hoc networks (VANETs) are characterized by high mobility of nodes, which resulting in frequent and fast changes in the network topologies. To make sure the messages are received efficiently and reliab... 详细信息
来源: 评论
Design and Implementation of Electronic Document Signing and Depositing System Based on Blockchain  24
Design and Implementation of Electronic Document Signing and...
收藏 引用
3rd International Conference on Cryptography, Network Security and Communication Technology (CNSCT)
作者: Ji, Quan Wu, Zhongcheng Xie, Liyang Li, Yong Zhang, Jun Anhui Univ Inst Phys Sci & Informat Technol Hefei Anhui Peoples R China Chinese Acad Sci HFIPS High Field Magnet Lab Hefei 230031 Peoples R China High Magnet Field Lab Anhui Prov Hefei 230031 Peoples R China Univ Sci & Technol China Hefei 230031 Peoples R China
To prevent tampering with documents before they are deposited into the blockchain, a system called Sign Storage Evidence Chain (SSEChain) has been designed and implemented. SSEChain is a blockchain-based electronic do... 详细信息
来源: 评论