咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=HASH algorithm"
107 条 记 录,以下是51-60 订阅
排序:
Research On The Method Of Combining Educational Resources Under The Background Of Internet  5
Research On The Method Of Combining Educational Resources Un...
收藏 引用
5th International Conference on Smart Grid and Electrical Automation (ICSGEA)
作者: Zhao, Shuqiao Zhang, Kezhu Lanzhou Vocat Tech Coll Lanzhou 730070 Peoples R China
The traditional educational reform resource merging method directly mines relevant resources based on keywords and then further processes the resources, resulting in excessively high repetition rate and incomplete rat... 详细信息
来源: 评论
The hash algorithm of the Network Equipment Performance Evaluation
收藏 引用
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING 2013年 第2期6卷 117-126页
作者: Zou, Xin Zhou, Li Gong, Liangyi Natl Comp network Emergency Response Tech Team Co Beijing Peoples R China Harbin Engn Univ Comp Sci & Technol Dept Harbin Peoples R China Harbin Inst Technol Dept Sci & Technol Harbin Peoples R China Harbin Inst Technol Harbin Peoples R China Beihang Univ Beijing Peoples R China
At present the hash algorithm analysis is mostly confined to the randomness of the hash values. Researchers have not analyzed the effect of hash algorithm in the network equipment. We propose three evaluation measures... 详细信息
来源: 评论
Research on Collision-free High-efficiency Pseudo-random Sequence Generation algorithm  11
Research on Collision-free High-efficiency Pseudo-random Seq...
收藏 引用
11th IEEE International Conference on Software Engineering and Service Science (IEEE ICSESS)
作者: Liu, Hanyue Zhang, Chunsheng Inner Mongolia Univ Nationalities Coll Comp Sci & Technol Tongliao 028043 Inner Mongolia Peoples R China
To overcome the shortcomings of the current popular conflict-free generation algorithm for pseudo-random sequences, a new conflict-free and efficient random permutation generation algorithm is presented. At the same t... 详细信息
来源: 评论
An Optimization Method for Encrypting CAN Messages  39
An Optimization Method for Encrypting CAN Messages
收藏 引用
39th Chinese Control Conference (CCC)
作者: Yao, Xinyu Sun, Hui Jin, Xiangdong Ding, Yifan Zhejiang Univ Coll Elect Engn Hangzhou 310027 Peoples R China Zhejiang Univ Coll Informat Sci & Elect Engn Hangzhou 310027 Peoples R China
The electric vehicles nowadays arc managed by networked controllers. Because of the advantages of fast, reliable, simple wiring, and light weight, CAN bus has become one of the most widely used field buses in the worl... 详细信息
来源: 评论
Design of an Automatic Testing System for Camera UI Test  39
Design of an Automatic Testing System for Camera UI Test
收藏 引用
39th Chinese Control Conference (CCC)
作者: Ji, Pengfei Qi, Yiwen Zhang, Chi Xing, Ning Shenyang Aerosp Univ Sch Automat Shenyang 110136 Peoples R China
In view of the current tedious camera inspection process, limited test cycle and complex test content, in order to reduce the work intensity of testers, the automatic test is designed for functional test with high rep... 详细信息
来源: 评论
HTIME: A hash-Based Terminal Identification Method in Cloud Environment  12
HTIME: A Hash-Based Terminal Identification Method in Cloud ...
收藏 引用
IEEE Int Congr on Cybermat / 12th IEEE Int Conf on Cyber, Phys and Social Comp (CPSCom) / 15th IEEE Int Conf on Green Computing and Communications (GreenCom) / 12th IEEE Int Conf on Internet of Things (iThings) / 5th IEEE Int Conf on Smart Data
作者: Liu, Bowen Jiang, Xutong Song, Zhang Liu, Jiabang Dou, Wanchun Northeastern Univ Dept Software Shenyang Peoples R China Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China
In mobile computing environment, it is a key issue to ensure the security of a user when he/she visits a cloud service by his/her smart terminal. Generally speaking, the existing techniques, e.g. biometric technique, ... 详细信息
来源: 评论
New One Way hash algorithm Using Non-Invertible Matrix
New One Way Hash algorithm Using Non-Invertible Matrix
收藏 引用
International Conference on Computer Medical Applications (ICCMA)
作者: Abutaha, Mohammed Hamamreh, Rushdi Palestine Polytech Univ Comp & Informat Technol Dept Hebron Israel
hash functions are widely used in encryption schemes and security layers of communication protocols for data integrity, digital signature and message authentication codes[18]. hash function is a well-defined procedure... 详细信息
来源: 评论
A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map
收藏 引用
OPTIK 2019年 184卷 205-213页
作者: hasheminejad, A. Rostami, M. J. Islamic Azad Univ Kerman Branch Dept Informat Technol Engn Kerman Iran Shahid Bahonar Univ Kerman Dept Comp Engn Kerman Iran
In recent years, various algorithms have been proposed to provide security to send multimedia content over insecure data channels. In this paper, an algorithm for image encryption is proposed based on PWLCM chaotic ma... 详细信息
来源: 评论
Fast and robust map-matching algorithm based on a global measure and dynamic programming for sparse probe data
收藏 引用
IET INTELLIGENT TRANSPORT SYSTEMS 2019年 第11期13卷 1613-1623页
作者: Yokota, Takayoshi Okude, Mariko Sakamoto, Toshiyuki Kitahara, Reiji Tottori Univ Fac Engn Cross Informat Res Ctr CiRC 4-101 Koyamacho Minami Tottori Tottori 6808552 Japan Hitachi Ltd Smart Syst Res Dept Res & Dev Grp 7-1-1 Omika Hitachi Ibaraki 3191292 Japan Hitachi Ltd Social Infrastruct Solut Operat Govt Intelligent Transport Syst Business Promot Ctr Social Infrastruct Solut Operat GovtKoto Ku Shinsuna Plaza 6-27Shinsuna 1 Chome Tokyo 1368632 Japan Hitachi Ltd Social Innovat Business Div Smart Soc Serv Dept Minato Ku JR Shinagawa East Bldg 2-18-1 Tokyo 1088250 Japan
The location data from positioning devices such as those utilising global navigation satellite system (GNSS) provides vital information for the probe-car systems aiming at solving road-traffic problems. In the case of... 详细信息
来源: 评论
Investor attention and the pricing of cryptocurrency market
收藏 引用
EVOLUTIONARY AND INSTITUTIONAL ECONOMICS REVIEW 2020年 第2期17卷 445-468页
作者: Zhang, Wei Wang, Pengfei Tianjin Univ Coll Management & Econ 92 Weijin Rd Tianjin 300072 Peoples R China
This paper examines the underlying relationship between investor attention measured by Google Trends and the top twenty cryptocurrencies from April 2013 to April 2018. We show the bi-directional Granger causality betw... 详细信息
来源: 评论