咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 电气工程
    • 4 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...

主题

  • 6 篇 hash-based messa...
  • 1 篇 rivest-shamir-ad...
  • 1 篇 one time passwor...
  • 1 篇 cryptographicall...
  • 1 篇 identity-based c...
  • 1 篇 public key crypt...
  • 1 篇 random key pre-d...
  • 1 篇 sac (strict aval...
  • 1 篇 elliptic curve c...
  • 1 篇 passwords
  • 1 篇 avalanche effect
  • 1 篇 message authenti...
  • 1 篇 insider threat d...
  • 1 篇 implantable medi...
  • 1 篇 resistance
  • 1 篇 bic (bit indepen...
  • 1 篇 authentication
  • 1 篇 elliptic curve d...
  • 1 篇 secure hash algo...
  • 1 篇 collision attack

机构

  • 1 篇 natl sun yat sen...
  • 1 篇 cheng shiu univ ...
  • 1 篇 shu te univ dept...
  • 1 篇 cistel technol i...
  • 1 篇 shu te univ dept...
  • 1 篇 cryptog method p...
  • 1 篇 anna univ coll e...
  • 1 篇 apj abdul kalam ...
  • 1 篇 firat univ bilgi...
  • 1 篇 coll engn trivan...
  • 1 篇 dalhousie univ f...
  • 1 篇 coll engn trivan...

作者

  • 1 篇 vareed jucy
  • 1 篇 zaman marzia
  • 1 篇 gaikwad nupur
  • 1 篇 lawrence linju
  • 1 篇 shreelekshmi r.
  • 1 篇 lin chih-hsueh
  • 1 篇 hsieh wen-shyong
  • 1 篇 huang yu-hsiu
  • 1 篇 ozer a. bedri
  • 1 篇 lee chung-nan
  • 1 篇 upadhyay darshan...
  • 1 篇 uma e.
  • 1 篇 kamatchi k.
  • 1 篇 vishnupriya t. h...
  • 1 篇 yein alan dahgwo
  • 1 篇 yakut selman
  • 1 篇 kuo pin-chun
  • 1 篇 sampalli sriniva...

语言

  • 5 篇 英文
  • 1 篇 土耳其文
检索条件"主题词=Hash-based message authentication code"
6 条 记 录,以下是1-10 订阅
排序:
Securing the edge: privacy-preserving federated learning for insider threats in IoT networks
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-49页
作者: Kamatchi, K. Uma, E. Anna Univ Coll Engn Guindy Dept Informat Sci & Technol Chennai 600025 India
Insider threats in Internet of Things (IoT) networks pose significant risks, as compromised devices can misuse their privileges to cause substantial harm. Centralized methods for insider threat detection in IoT device... 详细信息
来源: 评论
Double salted HMAC signature with blockchain for faster and secure video integrity verification
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第4期81卷 1-26页
作者: Lawrence, Linju Shreelekshmi, R. Coll Engn Trivandrum Dept Comp Sci & Engn Thiruvananthapuram 695016 Kerala India APJ Abdul Kalam Technol Univ Thiruvananthapuram 695016 Kerala India Coll Engn Trivandrum Dept Comp Applicat Thiruvananthapuram 695016 Kerala India
Digital technology advancements have increased the use of video surveillance for ongoing observation, aiding in forensic investigations and crime prevention. Recent developments in video editing and manipulation softw... 详细信息
来源: 评论
Investigating the Avalanche Effect of Various Cryptographically Secure hash Functions and hash-based Applications
收藏 引用
IEEE ACCESS 2022年 10卷 112472-112486页
作者: Upadhyay, Darshana Gaikwad, Nupur Zaman, Marzia Sampalli, Srinivas Dalhousie Univ Fac Comp Sci Halifax NS B3H 1W5 Canada Cistel Technol Inc Res & Dev Dept Ottawa ON K2E 7V7 Canada
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of ... 详细信息
来源: 评论
Cryptographic Method to Provide Confidentiality and Integrity in Implantable Medical Devices  2
Cryptographic Method to Provide Confidentiality and Integrit...
收藏 引用
International Conference on Inventive Communication and Computational Technologies (ICICCT)
作者: Vishnupriya, T. H. Vareed, Jucy Cryptog Method Provide Confidential & Integr Impl Comp Sci & Engn Thalakottukara PO Trichur 680501 Kerala India
This paper presents various cryptographic mechanisms used to bring confidentiality and integrity to Implantable Medical Devices(IMDs) that are wirelessly connected. An IMD is described as any operating medical device ... 详细信息
来源: 评论
HMAC based ONE TIME PASSWORD GENERATOR
HMAC BASED ONE TIME PASSWORD GENERATOR
收藏 引用
22nd IEEE Signal Processing and Communications Applications Conference (SIU)
作者: Yakut, Selman Ozer, A. Bedri Firat Univ Bilgisayar Muhendisligi Bolumu Elazig Turkey
One Time Password which is fixed length strings to perform authentication in electronic media is used as a one-time. In this paper, One Time Password production methods which based on hash functions were investigated.... 详细信息
来源: 评论
Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution
收藏 引用
ADVANCES IN MECHANICAL ENGINEERING 2016年 第4期8卷 1687814016642385-1687814016642385页
作者: Lin, Chih-Hsueh Huang, Yu-Hsiu Yein, Alan Dahgwo Hsieh, Wen-Shyong Lee, Chung-Nan Kuo, Pin-Chun Shu Te Univ Dept Comp & Commun 59 Hengshan Rd Kaohsiung 82445 Taiwan Cheng Shiu Univ Dept Comp Sci & Informat Engn Kaohsiung Taiwan Natl Sun Yat Sen Univ Dept Comp Sci & Engn Kaohsiung 80424 Taiwan Shu Te Univ Dept Informat Management Kaohsiung 82445 Taiwan
In wireless sensor networks, sensing information must be transmitted from sensor nodes to the base station by multiple hopping. Every sensor node is a sender and a relay node that forwards the sensing information that... 详细信息
来源: 评论