咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 11 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 统计学(可授理学、...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 16 篇 md5 algorithm
  • 2 篇 time
  • 2 篇 encryption
  • 2 篇 des algorithm
  • 2 篇 decryption
  • 2 篇 module
  • 2 篇 electronic comme...
  • 2 篇 hash function
  • 2 篇 preventing decep...
  • 1 篇 xor operation
  • 1 篇 logical operator...
  • 1 篇 legitimacy
  • 1 篇 abstract
  • 1 篇 data security
  • 1 篇 differential sna...
  • 1 篇 clustering
  • 1 篇 hamming distance
  • 1 篇 healthcare stora...
  • 1 篇 deception
  • 1 篇 analytics

机构

  • 2 篇 school of inform...
  • 1 篇 natl inst astrop...
  • 1 篇 vellore inst tec...
  • 1 篇 state grid shand...
  • 1 篇 cmr tech campus ...
  • 1 篇 wuhan univ state...
  • 1 篇 key laboratory o...
  • 1 篇 gongdong police ...
  • 1 篇 key laboratory o...
  • 1 篇 department of co...
  • 1 篇 qingdao univ sci...
  • 1 篇 emilio aguinaldo...
  • 1 篇 univ comp studie...
  • 1 篇 yanbian univ net...
  • 1 篇 technol inst phi...
  • 1 篇 guangzhou key re...
  • 1 篇 zhejiang ocean u...
  • 1 篇 jinan univ dept ...
  • 1 篇 rvr & jc coll en...
  • 1 篇 technol inst phi...

作者

  • 2 篇 xu guangming
  • 2 篇 lu chang
  • 1 篇 du wei
  • 1 篇 sunil ishan
  • 1 篇 hu zhenggang
  • 1 篇 nyunt thi thi so...
  • 1 篇 wang qing
  • 1 篇 ajith karthik
  • 1 篇 lwin thandar
  • 1 篇 liang guo
  • 1 篇 liu guozhu
  • 1 篇 zhenggang hu
  • 1 篇 lakshmi k. mohan...
  • 1 篇 medina ruji p.
  • 1 篇 shalinie s. merc...
  • 1 篇 parvathy m.
  • 1 篇 lu yueming
  • 1 篇 sison ariel m.
  • 1 篇 du yan
  • 1 篇 joseph jeny

语言

  • 16 篇 英文
检索条件"主题词=MD5 algorithm"
16 条 记 录,以下是1-10 订阅
排序:
Improvement and implementation of the md5 algorithm based on user security
Improvement and implementation of the MD5 algorithm based on...
收藏 引用
International Conference on Information Technology and Computer Application Engineering (ITCAE)
作者: Liu, Guozhu Qi, Huaxin Qingdao Univ Sci & Technol Informat Coll Sci & Technol Qingdao Peoples R China
The md5 algorithm is an algorithm that is able to turn arbitrarily different lengths of messages into a 128-bit digest. Each digest of corresponding to the message is unique, and it is difficult to calculate the messa... 详细信息
来源: 评论
Research on software comparison of electric energy data acquire terminal based on md5 algorithm
Research on software comparison of electric energy data acqu...
收藏 引用
Chinese Automation Congress (CAC)
作者: Wang ZheLong Du Yan Wang Qing Liu XiJian Liang, Guo State Grid Shandong Elect Power Res Inst Jinan Shandong Peoples R China State Grid ShanDong Elect Power Co Jinan Shandong Peoples R China
In order to solve the problems which existing in the software program management and control of the electric energy data acquire terminal. In this paper a method of software comparison based on md5 algorithm is propos... 详细信息
来源: 评论
md5 Secured Cryptographic Hash Value  18
MD5 Secured Cryptographic Hash Value
收藏 引用
International Conference on Machine Learning and Machine Intelligence (MLMI)
作者: de Guzman, Larry B. Sison, Ariel M. Medina, Ruji P. Technol Inst Philippines Quezon City Philippines Emilio Aguinaldo Coll Sch Comp Studies Manila Philippines Technol Inst Philippines Coll Informat Technol Quezon City Philippines
Over the past two decades, significant researches have been done in analyzing the md5 algorithm to address its collision problem. This paper enhanced the original md5 by adding four logical operations to increase the ... 详细信息
来源: 评论
A method based on md5 and time for preventing deception in electronic commerce
A method based on MD5 and time for preventing deception in e...
收藏 引用
International Conference on Cyberspace Technology, CCT 2014
作者: Hu, Zhenggang Lu, Yueming School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing China
Aiming at reducing the risk of data being intercepted and preventing deceptions in the electronic commerce, this paper proposes a method based on md5 and time which can effectively prevent the deception in data transm... 详细信息
来源: 评论
Design and Implementation of a Non-pipelined md5 Hardware Architecture Using a New Functional Description
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2008年 第10期E91D卷 2519-2523页
作者: Algredo-Badillo, Ignacio Feregrino-Uribe, Claudia Cumplido, Rene Morales-Sandoval, Miguel Natl Inst Astrophys Opt & Elect Dept Comp Sci Puebla 72840 Mexico
md5 is a cryptographic algorithm used for authentication. when implemented in hardware, the performance is affected by the data dependency of the iterative compression function. In this paper, a new functional descrip... 详细信息
来源: 评论
An Efficient Duplicate Detection System for XML Documents
An Efficient Duplicate Detection System for XML Documents
收藏 引用
2nd International Conference on Computer Engineering and Applications
作者: Lwin, Thandar Nyunt, Thi Thi Soe Univ Comp Studies Yangon Myanmar
Duplicate detection, which is an important subtask of data cleaning, is the task of identifying multiple representations of a same real-world object and necessary to improve data quality. Numerous approaches both for ... 详细信息
来源: 评论
SKT: A New Approach for Secure Key Transmission Using MGPISXFS  3rd
SKT: A New Approach for Secure Key Transmission Using MGPISX...
收藏 引用
3rd International Conference on Information System Design and Intelligent Applications (INDIA)
作者: Gola, Kamal Kumar Sharma, Vaibhav Rathore, Rahul Teerthanker Mahaveer Univ Dept Comp Sci & Engn Moradabad India
Cryptography is the concept used to enhance secure communication between two parties;these parties can be two persons in same building or two persons in different organizations of the world. Cryptography is said to be... 详细信息
来源: 评论
Performance of Video Authenticity Parameters using Machine Learning algorithms  2
Performance of Video Authenticity Parameters using Machine L...
收藏 引用
2nd IEEE World Conference on Communication and Computing (WCONF)
作者: Kopperundevi, N. Joseph, Jeny Ajith, Karthik Sunil, Ishan Vellore Inst Technol Sch Comp Sci & Engn Vellore Tamil Nadu India
Video counterfeiting has become a major threat in today's digital environment, made worse by the widespread use of social media and sophisticated editing tools. There are dangers to one's mental health and wel... 详细信息
来源: 评论
Differential Snapshot algorithms based on Hadoop MapReduce  12
Differential Snapshot Algorithms based on Hadoop MapReduce
收藏 引用
12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Du, Wei Zou, Xianxia GongDong Police Coll Dept Comp Sci Guangzhou 510232 Guangdong Peoples R China Guangzhou Key Res Ctr Publ Safety Guangzhou 510232 Guangdong Peoples R China Jinan Univ Dept Comp Sci Guangzhou 510632 Guangdong Peoples R China Wuhan Univ State Key Lab Software Engn Wuhan 430072 Peoples R China
Change Data Capture from source system is the first step in the incremental maintenance of data warehouses and business intelligence and is a key component of ETL (Extract, Transform and Load) technique. Methods of CD... 详细信息
来源: 评论
A Novel Telugu Script Recognition and Retrieval Approach Based on Hash Coded Hamming
A Novel Telugu Script Recognition and Retrieval Approach Bas...
收藏 引用
International Conference on Communications and Cyber Physical Engineering (ICCCE)
作者: Lakshmi, K. Mohana Babu, T. Ranga CMR Tech Campus Dept Elect & Commun Engn Hyderabad India RVR & JC Coll Engn Dept Elect & Commun Engn Guntur India
Due to their many applications, optical character recognition (OCR) systems have been developed even for scripts like Telugu. Due to the huge number of symbols utilized, identifying the Telugu words is a very complica... 详细信息
来源: 评论