咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是1-10 订阅
排序:
SPMAC: Scalable Prefix Verifiable message authentication code for Internet of Things
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2022年 第3期19卷 3453-3464页
作者: Yan, Haotian Hu, Haibo Ye, Qingqing Tang, Li Hong Kong Polytech Univ Fac Engn Dept Elect & Informat Engn Hong Kong Peoples R China
Internet of Things is a valuable tool in various application domains, including smart cities, industrial production, healthcare, and so on. Every connected device can share messages with others in an IoT network. Howe... 详细信息
来源: 评论
QR code authentication with Embedded message authentication code
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2017年 第3期22卷 383-394页
作者: Chen, Changsheng Shenzhen Univ Coll Informat Engn Shenzhen Peoples R China Shenzhen Univ Shenzhen Key Lab Media Secur Shenzhen Peoples R China
Quick Response (QR) code is widely used nowadays but its authenticity is an open issue. Attackers can easily replace the original barcode by a modified one which is generated through the standard encoder. This paper p... 详细信息
来源: 评论
message authentication code algorithm for IP-SEC
收藏 引用
COMPUTER SYSTEMS SCIENCE AND ENGINEERING 2010年 第5期25卷 335-341页
作者: Praba, V. Lakshmi Arumugam, G. Govt Arts Coll Women Sivaganga Tamil Nadu India Madurai Kamaraj Univ Madurai 625021 Tamil Nadu India
authentication is included as a necessary security feature in IPv6. message authentication code (MAC) algorithms are used as authenticating mechanisms in IP-Sec protocol authentication Header (AH) to provide data orig... 详细信息
来源: 评论
Considering Security For ZigBee Protocol Using message authentication code  12
Considering Security For ZigBee Protocol Using Message Authe...
收藏 引用
12 IEEE Int C Elect Energy Env Communications Computer Control
作者: Kulkarni, Suhas Ghosh, Uttam Pasupuleti, Haribabu Niite C DAC Intern Bangalore NMAMIT Coll Dept Informat Sci Bangalore Karnataka India C DAC Bangalore Karnataka India
ZigBee is a wireless technology developed as an open global standard. ZigBee main characteristics include low power, low-complexity and cost-effective. In this paper we propose a secure routing protocol that makes use... 详细信息
来源: 评论
Benchmarking message authentication code Functions for Mobile Computing
Benchmarking Message Authentication Code Functions for Mobil...
收藏 引用
IEEE Global Communications Conference (GLOBECOM)
作者: Rashwan, A. M. Taha, A-E M. Hassanein, H. S. Queens Univ Sch Comp Telecommun Res Lab Kingston ON K7L 3N6 Canada
With the increased popularity of both Internet and mobile computing, several security mechanisms, each using various cryptography functions, have been proposed to ensure that future generation Internets will guarantee... 详细信息
来源: 评论
LMAC: A Lightweight message authentication code for Wireless Sensor Network  58
LMAC: A Lightweight Message Authentication Code for Wireless...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM)
作者: Chowdhury, Amrita Roy DasBit, Sipra Indian Inst Engn Sci & Technol Dept Comp Sci & Tech Sibpur Howrah India
message authentication codes (MACs) are classically used for preventing unauthorized and corrupted messages from being forwarded in a network. However, inherent energy limitations of wireless sensor networks (WSNs) ma... 详细信息
来源: 评论
An Area-Efficient Implementation of a message authentication code (MAC) Algorithm for Cryptographic Systems
An Area-Efficient Implementation of a Message Authentication...
收藏 引用
IEEE Region 10 Conference (TENCON)
作者: Lan, Jingjing Zhou, Jun Liu, Xin ASTAR Inst Microelect Singapore Singapore
In this paper, an area-efficient hardware implementation of the lightweight Chaskey algorithm is present. The major targets of this work are resource-constrained devices. An efficient and simple design scheme is emplo... 详细信息
来源: 评论
A Lightweight message authentication code for Virtual Work in Future Smart Cities
A Lightweight Message Authentication Code for Virtual Work i...
收藏 引用
IEEE European Technology and Engineering Management Summit (E-TEMS)
作者: Pindar, Zahraddeen A. Fayomi, Joshua O. Waziri, Nazir H. Abdulhamid, Bala M. Jamel, Sapiee Nigerian Army Univ Biu Dept Comp Sci Borno Nigeria Kaunas Univ Technol Digitalizat Res Grp Kaunas Lithuania Tallinn Univ Technol Dept Software Sci Tallinn Estonia Nigerian Army Univ Biu Dept Math Borno Nigeria Univ Tun Hussein Onn Malaysia Dept Informat Secur Batu Pahat Malaysia
Data security remains a severe challenge of every IoT setting. As smart devices exchange data and information over the internet, there is a growing concern over securing the integrity and confidentiality of this excha... 详细信息
来源: 评论
Throughput optimization of the cipher message authentication code
Throughput optimization of the cipher message authentication...
收藏 引用
15th International Conference on Digital Signal Processing
作者: Michail, H. E. Kakarountas, A. P. Selimis, G. Goutis, C. E. Univ Patras Dept Elect & Comp Engn VLSI Design Lab GR-26110 Patras Greece
A new algorithm for producing message authenticating code (MAC) was recently proposed by NIST. The MAC protects both a message's integrity - by ensuring that a different MAC will be produced if the message has cha... 详细信息
来源: 评论
TDMAC: A Timestamp Defined message authentication code for Secure Data Dissemination in VANET
TDMAC: A Timestamp Defined Message Authentication Code for S...
收藏 引用
IEEE International Conference on Advanced Networks and Telecommuncations Systems
作者: Atanu Mondal Sulata Mitra Department of Computer Science & Engineering Camellia Institute of Technology Department of Computer Science & Technology Indian Institute of Engineering Science & Technology
message authentication codes (MACs) are used to prevent the dissemination of unauthorized and corrupted message to avoid road accident in vehicular ad hoc network (VANET). VANET is a short-lived network due to high mo... 详细信息
来源: 评论