咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是101-110 订阅
排序:
A new multi-linear universal hash family
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2013年 第3期69卷 351-367页
作者: Sarkar, Palash Indian Stat Inst Appl Stat Unit Kolkata 700108 India
A new universal hash family is described which generalises a previously known multi-linear hash family. messages are sequences over a finite field while keys are sequences over an extension field . A linear map from t... 详细信息
来源: 评论
Integrity in Embedded Control Networks
收藏 引用
IEEE SECURITY & PRIVACY 2013年 第3期11卷 61-63页
作者: Koopman, Philip Szilagyi, Christopher Carnegie Mellon Univ Dept Elect & Comp Engn Pittsburgh PA 15213 USA
As threats from malicious attackers increase, integrity approaches in networked embedded systems will have to evolve to provide both the security and safety aspects of integrity in a unified approach. And they"ll... 详细信息
来源: 评论
The Security of Key Derivation Functions in WINRAR
收藏 引用
JOURNAL OF COMPUTERS 2013年 第9期8卷 2262-2268页
作者: Chen, Jie Zhou, Jun Pan, Kun Lin, Shuqiang Zhao, Cuicui Li, Xiaochao Xiamen Univ Dept Elect Engn Xiamen Peoples R China
In various versions of WINRAR, the file security is mainly protected by user authentication and files encryption. Password based key derivation function (PBKDF) is the core of the WINRAR security mechanism. In this pa... 详细信息
来源: 评论
A Double Key-sharing Based False Data Filtering Scheme in Wireless Sensor Networks
收藏 引用
JOURNAL OF COMPUTERS 2013年 第2期8卷 388-398页
作者: Sun, Qian Wu, Min Cent S Univ Sch Informat Sci & Engn Changsha 410083 Hunan Peoples R China
In wireless sensor networks, the attackers can easily inject false data reports from compromising nodes. Previous approaches to filtering false data reports, notably statistical en-route filtering, usually share keys ... 详细信息
来源: 评论
Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks
Privacy Preserving Secure Communication Protocol for Vehicul...
收藏 引用
7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Mikki, Mohammad Mansour, Yousif M. Yim, Kangbin Islamic Univ Gaza Dept Comp Engn Gaza Israel Governmental Comp Ctr Gaza Israel Soonchunhyang Univ Dept Informat Secur Engn Soonchunhyang South Korea
Vehicular Ad-hoc Networks (VANETs) have attracted much attention recently because of its applications and features. The main purpose of adopting VANET technology is to increase safety and efficiency on roads. In this ... 详细信息
来源: 评论
Ultra-lightweight authentication protocol based on distribution terminal fingerprint
收藏 引用
2nd International Conference on Energy, Environment and Sustainable Development (EESD 2012)
作者: Cheng Chunling Wang Yashi Sun Chunju Zhang Zhihua Wang Jiangning Nanjing Univ Posts & Telecommun Coll Comp Nanjing 210003 Jiangsu Peoples R China
With the development of information technology in power industry, information security of the distribution automation system is facing increasing challenge. To meet the device authentication demand and the limited res... 详细信息
来源: 评论
MISRs for Fast authentication of Long messages
MISRs for Fast Authentication of Long Messages
收藏 引用
16th Euromicro Conference on Digital System Design (DSD)
作者: Katti, Rajendra S. Sule, Rucha N Dakota State Univ Dept ECE Fargo ND 58105 USA
In this paper we investigate the performance of using Multiple Input Shift Registers (MISRs) for message authentication. Linear Feedback Shift Registers (LFSRs) have been shown to be an efficient mechanism for authent... 详细信息
来源: 评论
A combined approach to ensure data security in cloud computing
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2012年 第6期35卷 1831-1838页
作者: Sood, Sandeep K. GNDU Dept Comp Sci & Engn Gurdaspur 143521 Punjab India
Cloud computing is a forthcoming revolution in information technology (IT) industry because of its performance, accessibility, low cost and many other luxuries. It is an approach to maximize the capacity or step up ca... 详细信息
来源: 评论
A key distribution scheme using network coding for mobile ad hoc network
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2012年 第1期5卷 59-67页
作者: Liu, Jianwei Du, Ruiying Chen, Jing He, Kun Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China Wuhan Univ Sch Comp Sci Wuhan 430072 Peoples R China
Network coding offers an excellent solution for maximizing throughput in various networks. Because of its simplicity and high efficiency, the idea of network coding can also be used for designing lightweight key distr... 详细信息
来源: 评论
CSP-DHIES: a new public-key encryption scheme from matrix conjugation
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2012年 第7期5卷 809-822页
作者: Pan, Ping Wang, Lihua Wang, Licheng Li, Lixiang Yang, Yixian Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Natl Inst Informat & Commun Technol NICT Koganei Tokyo 1848795 Japan
We propose a new public-key cryptosystem named conjugacy search problem-based DiffieHellman integrated encryption scheme (CSP-DHIES), by using conjugation-related assumptions for a special monoid of matrices of trunca... 详细信息
来源: 评论