咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=Hash Algorithm"
107 条 记 录,以下是31-40 订阅
排序:
Fragile watermarking scheme in spatial domain based on prime number distribution theory
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2022年 第5期81卷 6477-6496页
作者: Xia, Ziyun Zhang, Wenyin Duan, Huichuan Wang, Jiuru Wei, Xiuyuan Shandong Normal Univ Sch Informat Sci & Engn Jinan 250358 Shandong Peoples R China Linyi Univ Sch Informat Sci & Engn Linyi 276000 Shandong Peoples R China Linyi Univ Inst Biochem Anal Linyi 276000 Shandong Peoples R China
Fragile digital watermarking is mainly used for digital content authentication, which is of great significance for protecting information security. A novel fragile spatial watermarking scheme based on prime number dis... 详细信息
来源: 评论
National Cryptographic algorithms based Personalized Federated Learning with Flight Data  6
National Cryptographic Algorithms based Personalized Federat...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Sun, Aohan Lu, Yanrong Liu, Xinyu School of Computer Science and Technology Civil Aviation University of China Tianjin China College of Safety Science and Engineering Civil Aviation University of China Tianjin China
This paper designed FedPDA (Federated Learning Personalized Data Authentication) a new architecture that combines personalized federated learning and domestic encryption algorithms. The FedPDA enhanced the adaptabilit... 详细信息
来源: 评论
Evaluation of Multimedia Learning Resource Classification Retrieval Based on Decision Tree hashing algorithm
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2022年 第2期27卷 598-606页
作者: Zhong, Yin-Zhen Jiang, Wu-Xue Dongguan Polytech Dept Finance & Econ Dongguan 523808 Peoples R China Jose Rizal Univ Grad Sch Mandaluyong 1552 Philippines Dongguan Polytech Dept Comp Engn Dongguan 523808 Peoples R China Educ Univ Hong Kong Dept Math & Info Tech Hong Kong 999077 Peoples R China
Current classification and retrieval methods are affected by the amount of data in the classification of multimedia learning resources, and there are problems such as low classification accuracy, low retrieval rate, a... 详细信息
来源: 评论
Implementation of Efficient SHA-256 hash algorithm for Secure Vehicle Communication using FPGA  11
Implementation of Efficient SHA-256 Hash Algorithm for Secur...
收藏 引用
International SoC Design Conference (ISOCC)]
作者: Jeong, Chanbok Kim, Youngmin UNIST Sch Elect & Comp Engn UNIST Gil 50 Ulsan 689798 South Korea
In this paper, we implement the SHA-256 FPGA hardware module for the security protocol of the IEEE 1609.2 vehicle communication (VC). VC requires high-throughput and low-latency hardware architectures. For fast and ef... 详细信息
来源: 评论
A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2022年 第1期16卷 1-24页
作者: Dash, Sachikanta Padhy, Sasmita Parija, Bodhisatwa Rojashree, T. Patro, K. Abhimanyu Kumar GIET Univ Dept Comp Sci & Engn Gunupur Odisha India VIT Bhopal Univ Bhopal India DRIEMS Cuttack Cuttack India Manipal Acad Higher Educ Manipal Inst Technol Manipal 576104 Karnataka India
Medical images such as brain MRIs, ultrasounds, and X-ray images are currently used by doctors to treat many serious diseases in most hospitals and clinics. These images play a major role in medical diagnosis. Diagnos... 详细信息
来源: 评论
A Dynamic Weights Consistent hashing Load Balancing Method Based on Heuristic Optimization  3
A Dynamic Weights Consistent Hashing Load Balancing Method B...
收藏 引用
3rd International Conference on Electronic Information Engineering and Computer Science, EIECS 2023
作者: Wang, Chen Chen, Yingzheng Wang, Jingfeng Wang, Baocheng North China University of Technology Beijing China East China University of Science and Technology Shanghai China Datang Microelectronics Technology Co. Ltd Beijing China
With the increasing scale of distributed systems, Load balancing becomes a key issue to ensure system performance and scalability. However, load balancing has some limitations in dynamic environment, and it is difficu... 详细信息
来源: 评论
A cognitive brain model for multimodal sentiment analysis based on attention neural networks
收藏 引用
NEUROCOMPUTING 2021年 430卷 159-173页
作者: Li, Yuanqing Zhang, Ke Wang, Jingyu Gao, Xinbo Northwestern Polytech Univ Xian 710072 Shaanxi Peoples R China Chongqing Univ Posts & Telecommun Chongqing Key Lab Image Cognit Chongqing 400065 Peoples R China
Multimodal sentiment analysis is one of the most attractive interdisciplinary research topics in artificial intelligence (AI). Different from other classification issues, multimodal sentiment analysis of human is a mu... 详细信息
来源: 评论
Irregular-Program-Based hash algorithms  1
Irregular-Program-Based Hash Algorithms
收藏 引用
1st IEEE International Conference on Decentralized Applications and Infrastructures (IEEE DAPPCON)
作者: Zhou, Qi QuarkChain Fdn Ltd Singapore Singapore
Because of their energy efficiency over general-purpose central processing unit (CPU), application-specific integrated circuit (ASIC) and field-programmable gate array (FPGA) have been used to accelerate blockchain mi... 详细信息
来源: 评论
A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
收藏 引用
IEEE ACCESS 2021年 9卷 85947-85955页
作者: An, Yongli Zhang, Shikang Ji, Zhanlin North China Univ Sci & Technol Coll Informat Engn Tangshan 063210 Peoples R China
Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authenti... 详细信息
来源: 评论
Reconfigurable and High-Efficiency Password Recovery algorithms Based on HRCA
收藏 引用
IEEE ACCESS 2021年 9卷 18085-18111页
作者: Li, Bin Feng, Feng Chen, Xiaojie Cao, Yan Zhengzhou Univ Sch Informat Engn Zhengzhou 450001 Peoples R China PLA Strateg Support Force Informat & Engn Univ State Key Lab Math Engn & Adv Comp Zhengzhou 450001 Peoples R China
Cryptographic algorithms are widely used in information security fields such as network protocol authentication and commercial encryption software. Password recovery based on the hash algorithm is an important means o... 详细信息
来源: 评论