咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 75 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 18 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 2 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 153 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 148 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message Authentication Code"
153 条 记 录,以下是31-40 订阅
排序:
BEC Defender: QR code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
收藏 引用
SENSORS 2024年 第5期24卷 1676页
作者: Papathanasiou, Anastasios Liontos, George Paparis, Georgios Liagkou, Vasiliki Glavas, Euripides Hellen Police Cyber Crime Div 173 Alexandras Ave Athens 11522 Greece Univ Ioannina Dept Informat & Telecommun Arta 47150 Greece Univ Ioannina Dept Mat Sci & Engn Ioannina 45110 Greece
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and... 详细信息
来源: 评论
Crypto-Aided MAP Test for Low-Latency Detection of False Data in Short Packets
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021年 16卷 4939-4949页
作者: Kim, Sang Wu Liu, Xudong Iowa State Univ Dept Elect & Comp Engn Ames IA 50011 USA Zhengzhou Univ Dept Elect Engn Zhengzhou 450001 Peoples R China
Cryptography has been used as the first line of defense to ensure data integrity. However, it incurs a significant overhead for short packets which represent the most common form of traffic in emerging applications, s... 详细信息
来源: 评论
Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2021年 第3期12卷 472-481页
作者: Chaudhari, Smita Swain, Gandharba Koneru Lakshmaiah Educ Fdn Dept Comp Sci & Engn Guntur 522502 Andhra Pradesh India
Tremendous changes have been seen in the arena of cloud computing from previous years. Many organizations share their data or files on cloud servers to avoid infrastructure and maintenance costs. Employees from differ... 详细信息
来源: 评论
A Solution to Support Integrity in the Lawful Interception Ecosystem  10th
A Solution to Support Integrity in the Lawful Interception E...
收藏 引用
10th International Conference on Electronic Government and the Information Systems Perspective (EGOVIS)
作者: Buccafurri, Francesco Consoli, Angelo Labrini, Cecilia Nesurini, Alice Mariotti Univ Reggio Calabria Via Univ 25 Reggio Di Calabria Italy Univ Appl Sci & Arts Southern Switzerland SUPSI Lugano Switzerland
In this paper, we present an innovative solution to support integrity in a lawful interception ecosystem. The problem arises from the fact that whatever the interception system is organized, external (potentially untr... 详细信息
来源: 评论
Partial message verification in fog-based industrial Internet of things
收藏 引用
COMPUTERS & SECURITY 2023年 135卷
作者: Yan, Haotian Hu, Haibo Ye, Qingqing Hong Kong Polytech Univ Dept Elect Engn Hong Kong Peoples R China
Due to the emergence of fog computing, the computational resources can be deployed close to the data source and conduct data-driven tasks. A typical scenario is integrity assurance in Industrial Internet of Things (II... 详细信息
来源: 评论
Analysis of One Verifiable Multiparty Quantum Key Agreement Based on Bivariate Polynomial
International Journal of Electronics and Information Enginee...
收藏 引用
International Journal of Electronics and Information Engineering 2023年 第1期15卷 12-18页
作者: Lihua Liu Yingqing Qia
We show that the multiparty quantum key agreement [Inf. Sci., 2020 (521), 343-349] is flawed, because: (1) the specified conditions are insufficient for bivariate interpolation; (2) it fails to keep the trust consiste... 详细信息
来源: 评论
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes  11th
Single-Trace Side-Channel Analysis on Polynomial-Based MAC S...
收藏 引用
11th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE)
作者: Ueno, Rei Fukushima, Kazuhide Nakano, Yuto Kiyomoto, Shinsaku Homma, Naofumi Tohoku Univ Res Inst Elect Commun Aoba Ku 2-1-1 Katahira Sendai Miyagi 9808577 Japan KDDI Res Inc Ohara 2-1-15 Fujumino Saitama 3568502 Japan
This paper presents the first side-channel analysis (SCA) on polynomial-based message authentication code (MAC) schemes which is applicable to Poly1305. Typical SCAs (e.g., simple power analysis (SPA) and differential... 详细信息
来源: 评论
Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection  30
Twine Stack: A Hybrid Mechanism Achieving Less Cost for Retu...
收藏 引用
IEEE 30th Asian Test Symposium (ATS)
作者: Xu, Qizhen Chen, Liwei Shi, Gang Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Return-oriented programming(ROP) is a prevalent technique that targets return addresses to hijack control flow. To prevent such attack, researchers mainly focus on either Shadow Stack or MAC-based mechanisms(message c... 详细信息
来源: 评论
Physical-Layer authentication via a Dynamic Scaling
收藏 引用
Chinese Journal of Electronics 2020年 第4期29卷 651-659页
作者: LI Min JIANG Shaoquan LIAO Yongjian Institute of Information Security Mianyang Normal University School of Information and Software Engineering University of Electronic Science and Technology of China
message authentication is a process that allows sender Alice to transmit a source state to receiver Bob such that the latter is assured of the *** study this problem in the physical-layer where the channel is degraded... 详细信息
来源: 评论
TESLA-Based authentication for BeiDou Civil Navigation message
收藏 引用
China Communications 2020年 第11期17卷 194-218页
作者: Zhijun Wu Yun Zhang Liang Liu Meng Yue The College of Electronic Information&Automation Civil Aviation University of ChinaTianjin 300300China
Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or *** main security loophole here is spoofi... 详细信息
来源: 评论