咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=HASH algorithm"
107 条 记 录,以下是41-50 订阅
排序:
An efficient dual-layer cross-coupled chaotic map security-based multi-image encryption system
收藏 引用
NONLINEAR DYNAMICS 2021年 第3期104卷 2759-2805页
作者: Patro, K. Abhimanyu Kumar Acharya, Bibhudendra Natl Inst Technol Raipur Dept Elect & Commun Engn Raipur 492010 Chhattisgarh India
This paper proposes an effective image encryption method to encrypt several images in one encryption process. The proposed encryption scheme differs from the current multiple image encryption schemes because of their ... 详细信息
来源: 评论
Vitality evaluation of the waterfront space in the ancient city of Suzhou
收藏 引用
Frontiers of Architectural Research 2021年 第4期10卷 729-740页
作者: Yingxiang Niu Xiaoyan Mi Zhao Wang School of Architecture Tianjin UniversityTianjin300072China School of Information Technology and Electrical Engineering The University of QueenslandBrisbaneQld4072Australia
With a history spanning thousands of years,the water system of Suzhou is an indispensable carrier of urban space and civil *** model analysis of the waterfront in the ancient city of Suzhou has significant implication... 详细信息
来源: 评论
Implementation of TRNG with SHA-3 for hardware security
收藏 引用
MICROELECTRONICS JOURNAL 2022年 123卷 105410-105410页
作者: Kamadi, Annapurna Abbas, Zia Int Inst Informat Technol IIIT CVEST Hyderabad India
Random Number Generators (RNGs) are the solution for cryptographic applications to enhance hardware security. These RNGs ought to have three specific properties unpredictability, aperiodic, and good statistical criter... 详细信息
来源: 评论
An improved smart key frame extraction algorithm for vehicle target recognition
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2022年 97卷 107540-107540页
作者: Wang, Jianguo Zeng, Cheng Wang, Zhongsheng Jiang, Kun Xian Technol Univ Sch Comp Sci & Engn Xian Shaanxi Peoples R China Novel Network & Detect Control Engn Lab Natl & Lo Xian Peoples R China
The smart extraction of key frames is one of the critical technologies for vehicle target recognition in the video streaming environment. Currently, the common algorithms are scale-invariant feature transform (SIFT) o... 详细信息
来源: 评论
Optimized data storage algorithm of IoT based on cloud computing in distributed system
收藏 引用
COMPUTER COMMUNICATIONS 2020年 157卷 124-131页
作者: Wang, Mingzhe Zhang, Qiuliang China Acad Railway Sci Beijing 100081 Peoples R China
The existing Internet of Things(IoT) uses cloud computing data access storage algorithms, that is, the hash algorithm has defects of low data processing efficiency and low fault tolerance rate. Therefore, HDFS is intr... 详细信息
来源: 评论
Secure, Lossless, and Noise-resistive Image Encryption using Chaos, Hyper-chaos, and DNA Sequence Operation
收藏 引用
IETE TECHNICAL REVIEW 2020年 第3期37卷 223-245页
作者: Patro, K. Abhimanyu Kumar Acharya, Bibhudendra Nath, Vijay Natl Inst Technol Raipur Elect & Telecommun Engn Dept Raipur Chhattisgarh India Birla Inst Technol Mesra Elect & Commun Engn Dept Ranchi Bihar India
This paper proposes an image encryption scheme using the combination of chaos, hyper-chaos, and DNA sequence operation. The proposed scheme performs three stages of encryption operations. Those are selection-level hyp... 详细信息
来源: 评论
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19
收藏 引用
Computers, Materials & Continua 2020年 第9期64卷 1435-1452页
作者: Xiaorui Zhang Wenfang Zhang Wei Sun Tong Xu Sunil Kumar Jha Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow100031Poland
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical ***,the safety of digital medical imaging in remote consultati... 详细信息
来源: 评论
Dynamical analysis and image encryption application of a novel memristive hyperchaotic system
收藏 引用
OPTICS AND LASER TECHNOLOGY 2021年 133卷 106553-106553页
作者: Yang, Yang Wang, Lidan Duan, Shukai Luo, Li Southwest Univ Coll Elect & Informat Engn Chongqing 400715 Peoples R China Southwest Univ Coll Artificial Intelligence Chongqing 400715 Peoples R China Brain Inspired Comp & Intelligent Control Chongqi Chongqing 400715 Peoples R China Natl & Local Joint Engn Lab Intelligent Transmiss Chongqing 400715 Peoples R China Chongqing Brain Sci Collaborat Innovat Ctr Chongqing 400715 Peoples R China
In this paper, a new four-dimensional memristive hyperchaotic system is constructed based on Liu chaotic system by introducing a flux-controlled memristor model. Then the dynamic characteristics of the new system such... 详细信息
来源: 评论
High Throughput Pipelined Implementation of the SHA-3 Cryptoprocessor  32
High Throughput Pipelined Implementation of the SHA-3 Crypto...
收藏 引用
32nd International Conference on Microelectronics (ICM)
作者: Sideris, Argyrios Sanida, Theodora Dasygenis, Minas Univ Western Macedonia Dept Elect & Comp Engn Kozani 50131 Greece
Today, in the modern world of digital communications, sensitive information is transmitted via public networks. It is essential to ensure the privacy of their transmission with confidentiality, security and integrity ... 详细信息
来源: 评论
Depersonalization of Personal Data in Information Systems
Depersonalization of Personal Data in Information Systems
收藏 引用
International Russian Automation Conference (RusAutoCon)
作者: Primenko, D., V Spevakov, A. G. Spevakova, S., V Southwest State Univ 94 Pyatdesyat Let Oktyabrya St Kursk 305040 Russia
The analysis of the methods of anonymization of personal data processed by automated information systems was carried out, their shortcomings were revealed. To eliminate the shortcomings, a method of anonymization of p... 详细信息
来源: 评论