咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 5 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 1 篇 控制科学与工程

主题

  • 5 篇 key exchange alg...
  • 1 篇 tlsv1
  • 1 篇 firewall
  • 1 篇 secure digital m...
  • 1 篇 tropical cryptog...
  • 1 篇 cipher suites
  • 1 篇 vpn
  • 1 篇 weblogicapis
  • 1 篇 field programmab...
  • 1 篇 hash value
  • 1 篇 preferential alg...
  • 1 篇 wavelet domain i...
  • 1 篇 security infrast...
  • 1 篇 network security...
  • 1 篇 ise14
  • 1 篇 4 suite
  • 1 篇 system index
  • 1 篇 crypto algorithm...
  • 1 篇 lightweight
  • 1 篇 zynq7z020-clg484...

机构

  • 1 篇 natl engn lab di...
  • 1 篇 annamalai univ d...
  • 1 篇 jpiet dept cse m...
  • 1 篇 beijing univ pos...
  • 1 篇 huanggang normal...
  • 1 篇 univ calcutta sc...
  • 1 篇 informat secur c...

作者

  • 1 篇 sikder gitesh
  • 1 篇 paul rourab
  • 1 篇 saminathan r.
  • 1 篇 chen chen
  • 1 篇 yu zhichao
  • 1 篇 singh vinay
  • 1 篇 selvakumar k.
  • 1 篇 aggarwal alok
  • 1 篇 ghosh ranjan
  • 1 篇 he mengwei
  • 1 篇 yang yixian
  • 1 篇 chakrabarti amla...
  • 1 篇 peng haipeng
  • 1 篇 li lixiang

语言

  • 5 篇 英文
检索条件"主题词=Key Exchange Algorithm"
5 条 记 录,以下是1-10 订阅
排序:
Image singular points extraction in wavelet domain based on key exchange algorithm
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2021年 82卷 103804-103804页
作者: Yu, Zhichao Chen, Chen Huanggang Normal Univ Sch Comp Huanggang 438000 Peoples R China
Singularities and irregular mutation areas in wavelet domain images often carry important information and are one of the important features of images. Based on this, this paper proposes a research on image singular po... 详细信息
来源: 评论
A New Lightweight key exchange Protocol Based on T-tensor Product  4
A New Lightweight Key Exchange Protocol Based on T-tensor Pr...
收藏 引用
4th IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)
作者: Peng, Haipeng He, Mengwei Li, Lixiang Yang, Yixian Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Beijing 100876 Peoples R China Natl Engn Lab Disaster Backup & Recovery Beijing Peoples R China
In this paper, we define a new matrix algorithm, T-tensor product, and design a lightweight key exchange protocol using the proposed matrix algorithm. The T-tensor product can break the dimensions restriction of key e... 详细信息
来源: 评论
Hardware variant NSP with security-aware automated preferential algorithm
收藏 引用
IET COMPUTERS AND DIGITAL TECHNIQUES 2018年 第5期12卷 192-205页
作者: Paul, Rourab Sikder, Gitesh Chakrabarti, Amlan Ghosh, Ranjan Univ Calcutta Sch IT Kolkata India
Efficient and cost-effective hardware design of network security processor (NSP) is of vital importance in the present era due to the increasing need of security infrastructure in a wide range of computing application... 详细信息
来源: 评论
TRUCE - An Adaptive Trust Management algorithm Over MANET for Service-Based Mobile Computing Environments
收藏 引用
INFORMATION SECURITY JOURNAL 2011年 第4-5期20卷 173-184页
作者: Saminathan, R. Selvakumar, K. Annamalai Univ Dept Comp Sci & Engn Annamalainagar 608002 Tamil Nadu India
Managing trust in a distributed MANET is challenging when collaboration or cooperation is critical to achieve mission and system goals such as reliability, availability, scalability, or reconfigurability. This paper d... 详细信息
来源: 评论
Performance Analysis of Middleware distributed and clustered Systems (PAMS) concept in Mobile communication devices using Android operating system  3
Performance Analysis of Middleware distributed and clustered...
收藏 引用
International Conference Parallel Distributed Grid Computing
作者: Singh, Vinay Aggarwal, Alok JPIET Dept CSE Meerut Uttar Pradesh India
Recent advances in computational power, memory, display etc. have propelled mobile and hand held devices as a platform to display and execute a variety of applications. Popular platform vendors like Nokia S60, iPhone,... 详细信息
来源: 评论