咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=Hash Algorithm"
107 条 记 录,以下是91-100 订阅
排序:
High-Speed FPGA Implementation of the SHA-1 hash Function
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2011年 第9期E94A卷 1873-1876页
作者: Lee, Je-Hoon Kim, Sang-Choon Song, Young-Jun Kangwon Natl Univ Div Elect & Informat Commun Engn Gangwon 245711 South Korea Chungbuk Natl Univ BITRC Cheongju 361763 Chungbuk South Korea
This paper presents a high-speed SHA-1 implementation. Unlike the conventional unfolding transformation, the proposed unfolding transformation technique makes the combined hash operation blocks to have almost the same... 详细信息
来源: 评论
Security Analysis of RFID based on Multiple Readers
Security Analysis of RFID based on Multiple Readers
收藏 引用
International Conference on Advanced in Control Engineering and Information Science (CEIS)
作者: Jin, Bo Jin, Hongyu Taiyuan Univ Sci & Technol Taiyuan 030024 Peoples R China
RFID systems and equipments have many particularities and limitations which will bring a wide range of security issues, especially when the system contains a large number of tags and multiple readers, some of the trad... 详细信息
来源: 评论
A Secure Private Instant Messenger
A Secure Private Instant Messenger
收藏 引用
17th Asia-Pacific Conference on Communications (APCC)
作者: Yusof, Mohd Kamir Abidin, Ahmad Faisal Amri Univ Sultan Zainal Abidin Fak Informat Kuala Terengganu 21300 Terengganu Malaysia
Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure I... 详细信息
来源: 评论
De-duplication in File Sharing Network
De-duplication in File Sharing Network
收藏 引用
4th International Conference on Contemporary Computing
作者: Yadav, Divakar Dani, Deepali Kumari, Preeti Jaypee Inst Informat Technol Noida India
Redundant data transfer over a network is one of the important reasons of traffic congestion today. In this paper, we proposed an efficient and secure file sharing model using de-duplication technology to resolve it. ... 详细信息
来源: 评论
Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2007年 第4期30卷 1445-1454页
作者: Al-Talib, S. A. Ali, B. M. Khatun, S. Subramaniam, S. Univ Putra Malaysia Dept Comp & Commun Syst Serdang 43400 Malaysia Univ Putra Malaysia Dept Commun Technol & Networks Serdang 43400 Malaysia
In this article, a new protocol called REhash has been devised that gracefully integrates the idea of recursive unicast with hash algorithm to achieve scalable multicast for improved performance. In this model, data p... 详细信息
来源: 评论
Security Analysis of RFID based on Multiple Readers
收藏 引用
Procedia Engineering 2011年 15卷 2598-2602页
作者: Bo Jin Hongyu Jin Taiyuan University of Science and Technology Taiyuan030024China Camp Subdistrict Taiyuan030012China
RFID systems and equipments have many particularities and limitations which will bring a wide range of security issues, especially when the system contains a large number of tags and multiple readers, some of the trad... 详细信息
来源: 评论
A Hierarchical Source Address Validation Technique Based on Cryptographically Generated Address
A Hierarchical Source Address Validation Technique Based on ...
收藏 引用
2011 IEEE International Conference on Computer Science and Automation Engineering(CSAE 2011)
作者: Pengxu Tan Zhengzhou Institute of Information Science and Technology Zhengzhou China Yue Chen Zhengzhou Institute of Information Science and Technology Zhengzhou China Hongyong Jia Zhengzhou Institute of Information Science and Technology Zhengzhou China Jiangdong Mao Zhengzhou Institute of Information Science and Technology Zhengzhou China
In order to prevent malicious attacks using spoofed source addresses,a hierarchical source address validation (HSAV) technique based on cryptographically generated address is *** HSAV,the IP addresses are generated ... 详细信息
来源: 评论
A Secure Private Instant Messenger
A Secure Private Instant Messenger
收藏 引用
Asia-Pacific Conference on Communications
作者: Mohd Kamir Yusof Ahmad Faisal Amri Abidin Fakulti Informatik Universiti Sultan Zainal Abidin
Instant messenger is an IM application that allows communication in a secured manner. A secured private IM is needed to ensure data transmission between sender and recipient more secure. This paper presents a secure I... 详细信息
来源: 评论
A Mesh-Structured Scalable IPsec Processor
收藏 引用
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 2010年 第5期18卷 725-731页
作者: Wang, Mao-Yin Wu, Cheng-Wen Natl Tsing Hua Univ Lab Reliable Comp EE Hsinchu 30013 Taiwan
IP security (IPsec) protocols are widely used to protect sensitive data over the Internet. For equipment linked by high-bandwidth optical fibers, the throughput requirement usually results in the adoption of high-perf... 详细信息
来源: 评论
A NOVEL RESEARCH OF CONFIDENTIAL COMMUNICATION BASED ON THE ELLIPTIC CURVE AND THE COMBINED CHAOTIC MAPPING
收藏 引用
Journal of Electronics(China) 2009年 第5期26卷 706-710页
作者: Gao Chao Liang Dongying Zhou Shanxue Shenzhen Institute of Information Technology Shenzhen 518029 China Shenzhen Polytechnic Shenzhen 518055 China
This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for ... 详细信息
来源: 评论