咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message Authentication Code"
152 条 记 录,以下是11-20 订阅
排序:
When and How to Aggregate message authentication codes on Lossy Channels?  2nd
When and How to Aggregate Message Authentication Codes on Lo...
收藏 引用
22nd International Conference on Applied Cryptography and Network Security (ACNS)
作者: Wagner, Eric Serror, Martin Wehrle, Klaus Henze, Martin Fraunhofer FKIE Cyber Anal & Def Wachtberg Germany Rhein Westfal TH Aachen Commun & Distributed Syst Aachen Germany Rhein Westfal TH Aachen Secur & Privacy Ind Cooperat Aachen Germany
Aggregation of message authentication codes (MACs) is a proven and efficient method to preserve valuable bandwidth in resource-constrained environments: Instead of appending a long authentication tag to each message, ... 详细信息
来源: 评论
Integrity coded databases- protecting data integrity for outsourced databases
收藏 引用
COMPUTERS & SECURITY 2024年 136卷
作者: Yeh, Jyh-haw Arifin, Md Mashrur Shen, Ning Karki, Ujwal Xie, Yi Nanjundarao, Archana Boise State Univ Dept Comp Sci Boise ID 83725 USA Boise State Univ Comp Sci Boise ID USA Kathmandu Univ Comp Sci & Engn Dhulikhel Nepal
In recent years, cloud storage has become a viable option for businesses to store and retrieve information. This storage service allows its clients releasing from financial burden of hiring professionals to maintain l... 详细信息
来源: 评论
Payload Processor: message authentication for in-vehicle CAN bus using data compression and tag filling
收藏 引用
COMPUTER NETWORKS 2025年 259卷
作者: Zhang, Guiqi Shen, Jun Li, Jiangtao Qin, Wutao Li, Yufeng Shanghai Univ Shanghai Peoples R China Purple Mt Labs Nanjing Jiangsu Peoples R China
The Controller Area Network (CAN) is the dominant in-vehicle communication protocol, facilitating information exchange between electronic control units (ECUs). However, its inherent lack of security mechanisms makes i... 详细信息
来源: 评论
Leveraging quantum uncertainty: Quantum randomness through the lens of classical communication networks
收藏 引用
COMPUTER NETWORKS 2024年 254卷
作者: Das, Siddharth Krause, Stefan Giering, Kay-Uwe Pousa, Ricardo J. B. Bassoli, Riccardo Fitzek, Frank H. P. Tech Univ Dresden Deutsch Telekom Chair Commun Networks Dresden Saxony Germany Tech Univ Dresden Ctr Tactile Internet CeTi Dresden Saxony Germany Tech Univ Dresden Quantum Commun Networks Res Grp Dresden Saxony Germany Fraunhofer IIS Inst Steil Entwicklung Adaptiver Syst EAS Dresden Saxony Germany
The generation of random numbers and the study of its properties have been an elusive field for a fair portion of the century. The application of random numbers is employed in many use cases such as cryptography, neur... 详细信息
来源: 评论
An Effective Metaheuristic Based Dynamic Fine Grained Data Security Framework for Big Data
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2024年 第4期137卷 2441-2468页
作者: Gupta, Lalit Mohan Samad, Abdus Garg, Hitendra Shah, Kaushal Aligarh Coll Engn & Technol Dept Comp Sci & Engn Aligarh Uttar Pradesh India Aligarh Muslim Univ Dept Comp Engn ZHCET Aligarh Uttar Pradesh India GLA Univ Dept Comp Sci Mathura Uttar Pradesh India Pandit Deendayal Energy Univ Dept Comp Sci & Engn Gandhinagar India
Medical records are transmitted between medical institutions using cloud-based Electronic health record (EHR) systems, which are intended to improve various medical services. Due to the potential of data breaches and ... 详细信息
来源: 评论
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2024年 第12期92卷 4423-4451页
作者: Minematsu, Kazuhiko Sato, Shingo Shikata, Junji Yokohama Natl Univ Inst Adv Sci Yokohama Japan Yokohama Natl Univ Grad Sch Environm & Informat Sci Yokohama Japan
In this paper, we propose a formal security model and a construction methodology of interactive aggregate message authentication codes with detecting functionality (IAMDs). The IAMD is an interactive aggregate MAC pro... 详细信息
来源: 评论
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 2024年 第1期32卷 253-267页
作者: Hayashi, Masahito Koshiba, Takeshi Southern Univ Sci & Technol Shenzhen Inst Quantum Sci & Engn Shenzhen 518055 Peoples R China Chinese Univ Hong Kong Sch Data Sci Shenzhen 518172 Longgang Peoples R China Int Quantum Acad SIQA Shenzhen 518048 Peoples R China Nagoya Univ Grad Sch Math Chikusa ku Nagoya 4648602 Japan Waseda Univ Fac Educ & Integrated Arts & Sci Shinju ku Tokyo 1698050 Japan
Secret sharing is a useful method for secure distributed data storage. Such a distributed data storage can avoid the information leakage under an attack to a limited number of distributed servers. While such distribut... 详细信息
来源: 评论
Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin Board
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2024年 第4期17卷 1698-1711页
作者: Li, Xiaotong Wang, Hao Li, Zhi Wu, Lei Wei, Xiaochao Su, Ye Lu, Rongxing Shandong Normal Univ Sch Informat Sci & Engn Jinan 250061 Peoples R China Univ New Brunswick Fac Comp Sci Fredericton NB Canada
Although secure multi-party computation breaks down data barriers, its utility is reduced when participants have limited computation and communication resources. To make secure multi-party computation more practical, ... 详细信息
来源: 评论
Toward Full n-bit Security and Nonce Misuse Resistance of Block Cipher-Based MACs  30th
Toward Full n-bit Security and Nonce Misuse Resistance of Bl...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Choi, Wonseok Lee, Jooyoung Lee, Yeongmin Purdue Univ W Lafayette IN 47907 USA Georgia Inst Technol Atlanta GA 30332 USA Korea Adv Inst Sci & Technol Daejeon South Korea DESILO Inc Seoul South Korea
In this paper, we study the security of MAC constructions among those classified by Chen et al. in ASIACRYPT '21. Precisely, F-B2(EDM) (or EWCDM as named by Cogliati and Seurin in CRYPTO '16), F-B3(EDM), F-B2(... 详细信息
来源: 评论
Security Analysis of CMAC in the Multi-user Model  27th
Security Analysis of CMAC in the Multi-user Model
收藏 引用
27th International Conference on Information Security
作者: Zhang, Xiangyang Shen, Yaobin Wang, Lei Shanghai Jiao Tong Univ Shanghai 200240 Peoples R China Xiamen Univ Xiamen 361005 Peoples R China
CMAC, also known as OMAC1, is an efficient message authentication code (MAC) and has been standardized by NIST and other organizations. It has been widely applied in IPSec, IKE and many wireless networks. Multi-user s... 详细信息
来源: 评论