咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=HASH algorithm"
107 条 记 录,以下是81-90 订阅
排序:
Security and Performance Analysis of Identity Based Schemes in Sensor Networks  2
Security and Performance Analysis of Identity Based Schemes ...
收藏 引用
2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
作者: Ragini, K. Sivasankar, S. Anand Inst Higher Technol Chennai Tamil Nadu India Anand Inst Higher Technol Elect & Commun Engn Chennai Tamil Nadu India
Security and efficient data transmission without any hurdles caused by external Attackers is an issue in sensor networks. This paper deals with the provision of an assured efficient data transmission in the sensor net... 详细信息
来源: 评论
A Secure Communication Suite for Cluster-based Underwater Surveillance Networks  1
A Secure Communication Suite for Cluster-based Underwater Su...
收藏 引用
1st International Conference on Electrical Engineering and Information and Communication Technology (ICEEICT)
作者: Islam, Md. Rafiqul Azad, Saiful Morshed, Md. Monzur Amer Int Univ Bangladesh Dept Comp Sci Dhaka Bangladesh TigerHATS Dhaka Bangladesh
Surveilling the water territory of a country by installing an Underwater Surveillance Network (USN) is one of the prominent applications developed for underwater communication. The primary responsibility of a USN is t... 详细信息
来源: 评论
Changes in Federal Information Processing Standard (FIPS) 180-4, Secure hash Standard
收藏 引用
CRYPTOLOGIA 2013年 第1期37卷 69-73页
作者: Dang, Quynh NIST Comp Secur Div 773 Informat Technol Lab Gaithersburg MD 20899 USA
This article describes the changes between Federal Information Processing Standards FIPS 180-3 and FIPS 180-4. FIPS 180-4 specifies two new secure cryptographic hash algorithms: secure hashing algorithms SHA-512/224 a... 详细信息
来源: 评论
Research on Data Synchronization Based on HF/SMDS Model
Research on Data Synchronization Based on HF/SMDS Model
收藏 引用
2014年国际计算机科学与软件工程学术会议
作者: Xiao-Zhu CHEN An-Xin LIU Jin QIN Hai-Yan NIU School of Information Guizhou University of Finance and EconomicsGuiyang 550025China
This paper is motivated by the practical application of Guizhou Tobacco Benchmarking management *** on characteristics of occasional connections of mobile database systems,a new type of HF /SMDS data synchronization m... 详细信息
来源: 评论
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2013年 第5期17卷 921-932页
作者: Kim, Mooseop Lee, Deok Gyu Ryou, Jaecheol ETRI Cyber Secur Convergence Res Dept Taejon South Korea Chungnam Natl Univ Div Comp Sci & Engn Taejon South Korea
This paper presents a compact and unified hardware architecture implementing SHA-1 and SHA-256 algorithms that is suitable for the mobile trusted module (MTM), which should satisfy small area and low-power condition. ... 详细信息
来源: 评论
Preventing ARP Spoofing in WLAN using SHA-512
Preventing ARP Spoofing in WLAN using SHA-512
收藏 引用
IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
作者: Agrawal, Neha Pradeepkumar, Bhale Tapaswi, Shashikala ABV IIITM Gwalior MP India
In most of the organizations, the use of Wireless Local Area Network (WLAN) is increasing promisingly. WLAN security is mainly affected by two internal attacks: Rogue Access Point (RAP) and Rogue Dynamic Host Configur... 详细信息
来源: 评论
Research OnSecurity Analysis of RFID Based on Multiple Readers
Research OnSecurity Analysis of RFID Based on Multiple Reade...
收藏 引用
International Conference on Sensors, Measurement and Intelligent Materials (ICSMIM 2012)
作者: Hou, Yi Ma, Linjia 7 Shisiwei Rd Shenyang Peoples R China
The specialties and limitation of RFID system and device will incur lots of security problems especially when the system contains a lot of tags and many readers, the traditional methods become helpless. Here we presen... 详细信息
来源: 评论
Analysis and improvement of a hash-based image encryption algorithm
收藏 引用
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION 2011年 第8期16卷 3269-3278页
作者: Deng, Shaojiang Zhan, Yanping Xiao, Di Li, Yantao Chongqing Univ Coll Comp Sci & Engn Chongqing 400044 Peoples R China
The security of digital image attracts much attention recently. A hash-based digital image encryption algorithm has been proposed in Ref. [1]. But both the theoretical analysis and computer simulation show the charact... 详细信息
来源: 评论
Differential Fault Analysis on Grostl
Differential Fault Analysis on Grostl
收藏 引用
9th International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
作者: Fischer, Wieland Reuter, Christian A. Infineon Technol AG Campeon 1-12 D-85579 Neubiberg Germany Justus Liebig Univ D-35390 Giessen Germany
This paper presents a DFA on Grostl-256, a hash algorithm that imitates the main structures of AES. Although our attack is inspired by the classical fault attacks on AES these could not be adapted directly. The attack... 详细信息
来源: 评论
On the High-Throughput Implementation of RIPEMD-160 hash algorithm
On the High-Throughput Implementation of RIPEMD-160 Hash Alg...
收藏 引用
19th IEEE International Conference on Application-Specific Systems, Architectures and Processors
作者: Knezevic, M. Sakiyama, K. Lee, Y. K. Verbauwhede, I. Katholieke Univ Leuven ESAT COSIC Kasteelpk Arenberg 10 B-3001 Louvain Belgium Univ Calif Los Angeles Elect Engn Los Angeles CA 90095 USA
In this paper we present two new architectures of the RIPEMD-160 hash algorithm for high throughput implementations. The first architecture achieves the iteration bound of RIPEMD-160, i.e. it achieves a theoretical up... 详细信息
来源: 评论