咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=Hash Algorithm"
107 条 记 录,以下是101-110 订阅
排序:
URL assignment algorithm of crawler in distributed system based on hash
URL assignment algorithm of crawler in distributed system ba...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Wan, Yuan Tong, Hengqing Wuhan Univ Technol Dept Math Wuhan Peoples R China
Web crawlers are the key component of services running on Internet and providing searching and indexing support for the entire Web, for corporate Intranets and large portal sites. More recently, crawlers have also bee... 详细信息
来源: 评论
Analysis and detection of errors in implementation of SHA-512 algorithms on FPGAs
收藏 引用
COMPUTER JOURNAL 2007年 第6期50卷 728-738页
作者: Ahmad, Imtiaz Das, A. Shoba Kuwait Univ Dept Comp Engn Safat 13060 Kuwait
The Secure hash algorithm SHA-512 is a dedicated cryptographic hash function widely considered for use in data integrity assurance and data origin authentication security services. Reconfigurable hardware devices such... 详细信息
来源: 评论
An efficient implementation of electronic election system
An efficient implementation of electronic election system
收藏 引用
10th International Conference on Computer and Information Technology
作者: Fauzia, Naznin Dey, Tanima Bhuiyan, Inaba Rahman, Md. Saidur Bangladesh Univ Engn & Technol CSE Dhaka Bangladesh
Voting is usually recognized as one of the main characteristics of Democracy. Electronic election is a very recent idea regarding voting. Voter, once given his vote, has to rely upon the election system's honesty ... 详细信息
来源: 评论
Hybrid open hash tables for network processors
Hybrid open hash tables for network processors
收藏 引用
IEEE Workshop on High Performance Switching and Routing (HPSR 2005)
作者: Ye, Q Parson, D Cheng, L Lehigh Univ Dept Comp Sci & Engn Lab Networking Grp LONGLAB Bethlehem PA 18015 USA
Packet classification by analyzing the traffic header information is an essential task of network processors. To efficiently store, retrieve and update information, key-based data accessing algorithms such as hashing ... 详细信息
来源: 评论
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
收藏 引用
PHYSICS LETTERS A 2004年 第3-4期326卷 211-218页
作者: Alvarez, G Montoya, F Romera, M Pastor, G Consejo Super Invest Cient Inst Fis Aplicada Madrid 28006 Spain
In recent years many chaotic cryptosystems based on Baptista's seminal work have been proposed. We analyze the security of two of the newest and most interesting ones, which use a dynamically updated look-up table... 详细信息
来源: 评论
A combined chaotic cryptographic and hashing scheme
收藏 引用
PHYSICS LETTERS A 2003年 第5-6期307卷 292-298页
作者: Wong, KW City Univ Hong Kong Dept Comp Engn & Informat Technol Kowloon Hong Kong Peoples R China
Recently, we have proposed a fast chaotic cryptographic scheme based on iterating a logistic map with the look-up table updated dynamically. We found that after the whole encryption process, the final look-up table st... 详细信息
来源: 评论
A new multicast-based architecture to support host mobility in IPv6  9
A new multicast-based architecture to support host mobility ...
收藏 引用
9th Asia-Pacific Conference on Communications held in conjunction with the 6th Malaysia International Conference on Communications (MICC 2003)
作者: Ali, BM Habaebi, MH Al-Talib, S Univ Putra Malaysia Fac Engn Dept Comp & Commun Syst Engn Serdang 43400 Selangor Darul Malaysia
A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for ... 详细信息
来源: 评论