咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是91-100 订阅
排序:
Security analysis of GCM for communication
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2014年 第5期7卷 854-864页
作者: Yap, Wun-She Yeo, Sze Ling Heng, Swee-Huay Henricksen, Matt ASTAR Inst Infocomm Res Singapore Singapore Multimedia Univ Fac Informat Sci & Technol Ayer Keroh Melaka Malaysia
The Galois/Counter Mode of operations (GCM) is constructed by combining the counter mode encryption and the authentication component (i.e., GTAG) to provide both privacy and authenticity. GTAG can be used as a stand-a... 详细信息
来源: 评论
A TIGHT BOUND FOR EXHAUSTIVE KEY SEARCH ATTACKS AGAINST message authentication codeS
收藏 引用
RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS 2013年 第2期47卷 171-180页
作者: de Sa, Vinicius G. P. Boccardo, Davidson R. Rust, Luiz Fernando Machado, Raphael C. S. Univ Fed Rio de Janeiro Dept Ciencia Comp BR-21941 Rio De Janeiro Brazil
A message authentication code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a net... 详细信息
来源: 评论
Differential Cryptanalysis of SipHash  1
收藏 引用
21st International Conference on Selected Areas in Cryptography (SAC)
作者: Dobraunig, Christoph Mendel, Florian Schlaeffer, Martin Graz Univ Technol IAIK A-8010 Graz Austria
SipHash is an ARX based message authentication code developed by Aumasson and Bernstein. SipHash was designed to be fast on short messages. Already, a lot of implementations and applications for SipHash exist, whereas... 详细信息
来源: 评论
Intrusion Detection System-An Efficient way to Thwart against Dos/DDos Attack in the Cloud Environment  4
Intrusion Detection System-An Efficient way to Thwart agains...
收藏 引用
International Conference on Recent Trends in Information Technology
作者: Aishwarya, R. Malliga, S. Kongu Engn Coll Dept CSE Erode India
One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices ... 详细信息
来源: 评论
Characterizing the Impact of Dynamic Resource Management on message authentication in Mobiles
Characterizing the Impact of Dynamic Resource Management on ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Rashwan, A. M. Taha, A-E M. Hassanein, H. S. Queens Univ Sch Comp Telecommun Res Lab Kingston ON K7L 3N6 Canada Alfaisal Univ Dept Elect Engn Riyadh 11533 Saudi Arabia
Communication security measures are becoming prominent standards of next generation mobile networks. These measures usually involve resource-intensive cryptographic operations that can greatly affect communication per... 详细信息
来源: 评论
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers  1
收藏 引用
21st International Conference on Selected Areas in Cryptography (SAC)
作者: Mouha, Nicky Mennink, Bart Van Herrewege, Anthony Watanabe, Dai Preneel, Bart Verbauwhede, Ingrid Katholieke Univ Leuven COSIC ESAT Dept Elect Engn Ghent Belgium iMinds Ghent Belgium Yokohama Res Lab Yokohama Kanagawa Japan
We propose Chaskey: a very efficient message authentication code (MAC) algorithm for 32-bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot implement standard MAC algorithms... 详细信息
来源: 评论
Tweakable Blockciphers with Asymptotically Optimal Security
Tweakable Blockciphers with Asymptotically Optimal Security
收藏 引用
20th International Workshop on Fast Software Encryption (FSE)
作者: Lampe, Rodolphe Seurin, Yannick Univ Versailles Versailles France ANSSI Paris France
We consider tweakable blockciphers with beyond the birthday bound security. Landecker, Shrimpton, and Terashima (CRYPTO 2012) gave the first construction with security up to O(2(2n/3)) adversarial queries (n denotes t... 详细信息
来源: 评论
An Efficient Edge-Based authentication for Network Coding Against Entropy Attacks  34
An Efficient Edge-Based Authentication for Network Coding Ag...
收藏 引用
34th IEEE International Conference on Distributed Computing Systems (ICDCS)
作者: Iguchi, Ryo Manabe, Yoshifumi Kogakuin Univ Fac Informat Dept Comp Sci Shinjuku Ku Tokyo 1638677 Japan
This paper proposes a new edge-based authentication scheme for network coding. Many authentication schemes for random linear network coding have been proposed against pollution attacks. However, random linear network ... 详细信息
来源: 评论
Dropping False Packet to Increase the Network Lifetime of Wireless Sensor Network using EFDD Protocol
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2013年 第4期70卷 1697-1709页
作者: Kumar, S. Manoj Rajkumar, N. Mary, W. Catherine Christinal Karunya Univ Dept Informat Technol Coimbatore Tamil Nadu India Sri Ramakrishna Engn Coll Dept Comp Sci & Engn Coimbatore Tamil Nadu India WIPRO Technol Madras Tamil Nadu India
In Wireless Sensor Network (WSN) sensors are densely deployed where the intruders can compromise some sensor nodes and inject false data in order to raise false alarms, reduce network lifetime, utilize bandwidth resou... 详细信息
来源: 评论
On the relationships between perfect nonlinear functions and universal hash families
收藏 引用
THEORETICAL COMPUTER SCIENCE 2013年 513卷 85-95页
作者: Liu, Jian Chen, Lusheng Nankai Univ Sch Math Sci Tianjin 300071 Peoples R China
In this paper, the relationships between perfect nonlinear (in brief, PN) functions and optimal universal hash families are discussed. We point out the equivalence of constructions between them, i.e., from PN function... 详细信息
来源: 评论