咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 24 篇 计算机科学与技术...
    • 11 篇 信息与通信工程
    • 10 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
  • 7 篇 理学
    • 7 篇 数学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 美术学

主题

  • 39 篇 digital signatur...
  • 4 篇 elliptic curve c...
  • 4 篇 elliptic curve d...
  • 4 篇 digital signatur...
  • 4 篇 cryptography
  • 3 篇 lll algorithm
  • 3 篇 public key crypt...
  • 3 篇 authentication
  • 3 篇 rsa
  • 3 篇 public key
  • 2 篇 falcon
  • 2 篇 intrusion detect...
  • 2 篇 special characte...
  • 2 篇 jpeg2000
  • 2 篇 discrete logarit...
  • 2 篇 babai's nearest ...
  • 2 篇 distortion reduc...
  • 2 篇 crystals-dilithi...
  • 2 篇 post-quantum cry...
  • 2 篇 dsa

机构

  • 4 篇 aristotle univ t...
  • 3 篇 kookmin univ dep...
  • 1 篇 anhui univ inst ...
  • 1 篇 elect & telecomm...
  • 1 篇 inst informat in...
  • 1 篇 tunghai univ dep...
  • 1 篇 peoples secur ac...
  • 1 篇 anna univ ceg de...
  • 1 篇 jeppiaar engn co...
  • 1 篇 univ s florida d...
  • 1 篇 anna univ dept i...
  • 1 篇 univ missouri de...
  • 1 篇 inst informat se...
  • 1 篇 bml munjal univ ...
  • 1 篇 yeungnam univ de...
  • 1 篇 ho chi minh city...
  • 1 篇 chinese univ hon...
  • 1 篇 siddaganga inst ...
  • 1 篇 univ sci & techn...
  • 1 篇 vietnam natl uni...

作者

  • 4 篇 poulakis dimitri...
  • 3 篇 seo seog chung
  • 2 篇 draziotis konsta...
  • 2 篇 adamoudis marios
  • 1 篇 xue-tao zhang
  • 1 篇 tu phan
  • 1 篇 guo-juan song
  • 1 篇 oyanagi k
  • 1 篇 choi junhyeok
  • 1 篇 bose s.
  • 1 篇 park jong-yeon
  • 1 篇 jung heon hui
  • 1 篇 shaji r. s.
  • 1 篇 al-absi ahmed ab...
  • 1 篇 shiny r.
  • 1 篇 oh hyunyoung
  • 1 篇 shin donghyun
  • 1 篇 poulakis d.
  • 1 篇 chow sherman s. ...
  • 1 篇 chen ts

语言

  • 38 篇 英文
  • 1 篇 其他
检索条件"主题词=Digital signature algorithm"
39 条 记 录,以下是21-30 订阅
排序:
A Dynamic Two-Level Priority Based Authentication System for Job Scheduling in a Heterogeneous Grid Environment
A Dynamic Two-Level Priority Based Authentication System for...
收藏 引用
SAI Computing Conference (SAI)
作者: Gupta, Sunil Gabrani, Goldie BML Munjal Univ Sch Engn & Technol Gurgaon Haryana India
The Grid environment is highly dynamic in nature where a variety of users from all over the world try to access the resources that are again distributed all over. Both the users and resources are highly varied. The us... 详细信息
来源: 评论
signature BASED DATA AUDITING UNDER MOBILE CLOUD SYSTEM
SIGNATURE BASED DATA AUDITING UNDER MOBILE CLOUD SYSTEM
收藏 引用
Global Conference on Communication Technologies (GCCT)
作者: Shiny, R. Shaji, R. S. Jayan, J. P. Noorul Islam Univ Dept Software Engn Kumaracoil Tamil Nadu India Noorul Islam Univ Dept IT Kumaracoil Tamil Nadu India
Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence scenario it is very biter to have mobile devices as an interf... 详细信息
来源: 评论
Acknowledgement security for MANET using EAACK  1
Acknowledgement security for MANET using EAACK
收藏 引用
International Conference on Green Computing and Internet of Things (ICGCIoT)
作者: Suvarna, Deore Pallavi, Erande Sumitra, Lahane Chhaya, Dhatrak Korade, Mahesh Savitribai Phule Pune Univ Dept Comp Engn Sandip Inst Technol & Res Ctr Pune Maharashtra India
Assembling of wireless mobile equipments which form a network beyond the existing infrastructure is the Mobile Ad-hoc Network. These nodes contracted to communication one another. As nodes from MANET can be connect wi... 详细信息
来源: 评论
A variant of digital signature algorithm
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2009年 第1期51卷 99-104页
作者: Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki 54124 Greece
In this paper we present a variant of the digital signature algorithm based on a factorization problem and two discrete logarithm problems. We prove that our signature scheme is at least as secure as the original Digi... 详细信息
来源: 评论
Enhancing Manet Security Using Hybrid Techniques in Key Generation Mechanism
Enhancing Manet Security Using Hybrid Techniques in Key Gene...
收藏 引用
International Conference on Electronics and Communication Systems (ICECS)
作者: Dhanalakshmi, K. S. Kannapiran, B. Divya, A. Kalasalingam Univ Dept ECE Srivilliputhur India Kalasalingam Univ Dept EIE Dept Srivilliputhur India
Mobile Ad Hoc Network is a infrastructure-less, self-configuring wireless network. These unique characteristics makes it ideal for mission critical applications including Personal Area Networking (PAN), military use, ... 详细信息
来源: 评论
A User-friendly Authentication Solution using NFC Card Emulation on Android
A User-friendly Authentication Solution using NFC Card Emula...
收藏 引用
IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA)
作者: Lee, Haw Hong, Wei-Chih Kao, Chia-Hung Cheng, Chen-Mou Natl Taiwan Univ Dept Elect Engn Taipei 10764 Taiwan Feng Chia Univ Dept Comp Sci & Informat Engn Taichung 40724 Taiwan Inst Informat Ind Cloud Syst Software Inst Taipei Taiwan Acad Sinica Res Ctr Informat Technol Innovat Taipei 115 Taiwan
The security of the authentication scheme plays a more and more important role in today's web service systems as people's daily are increasingly depending on these services and user credentials are collected a... 详细信息
来源: 评论
ASIA: Accelerated Secure In-network Aggregation in Vehicular Sensing Networks
ASIA: Accelerated Secure In-network Aggregation in Vehicular...
收藏 引用
Annual IEEE Communications Society Conference on Sensing and Communication in Wireless Networks
作者: Xiao Wang Patrick Tague Carnegie Mellon University
Vehicular Ad-Hoc Networks (VANETs) can potentially become a sensing platform. In-network aggregation, a fundamental primitive for querying sensory data, has been shown to reduce overall communication overhead at large... 详细信息
来源: 评论
A Trusted Multi-hop Broadcasting Protocol for Vehicular Ad Hoc Networks
A Trusted Multi-hop Broadcasting Protocol for Vehicular Ad H...
收藏 引用
1st International Conference on Connected Vehicles and Expo
作者: Tian, Daxin Wang, Yunpeng Liu, He Zhang, Xianghong Beihang Univ Beijing Key Lab Cooperat Vehicle Infrastruct Syst Beijing 100191 Peoples R China CPLA Gen Logist Dept Quartermaster Equipment Inst Beijing 100010 Peoples R China
The vehicular ad hoc networks (VANETs) are characterized by high mobility of nodes, which resulting in frequent and fast changes in the network topologies. To make sure the messages are received efficiently and reliab... 详细信息
来源: 评论
Effective generalized equations of secure hyperelliptic curve digital signature algorithms
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第2期17卷 100-108,115页
作者: YOU Lin ,SANG Yong-xuan College of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China [a] College of Communication Engineering Hangzhou Dianzi University Hangzhou 310018 China
A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic... 详细信息
来源: 评论
Some lattice attacks on DSA and ECDSA
收藏 引用
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING 2011年 第5-6期22卷 347-358页
作者: Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki 54124 Greece
In this paper, using the LLL reduction method and computing the integral points of two classes of conics, we develop attacks on DSA and ECDSA in case where the secret and the ephemeral key of a signed message or their... 详细信息
来源: 评论