咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是111-120 订阅
排序:
On the Security of Key Derivation Functions in Office
On the Security of Key Derivation Functions in Office
收藏 引用
6th International Conference on Anti-Counterfeiting, Security and Identification (ASID)
作者: Zhou, Jun Chen, Jie Pan, Kun Zhao, Cuicui Li, Xiaochao Xiamen Univ Dept Elect Engn Xiamen 361005 Peoples R China
In Microsoft Office, the file security is mainly protected by user authentication and files encryption. The cryptographic keys are usually derived from a password. Thus, password based key derivation function (PBKDF) ... 详细信息
来源: 评论
On Generic Construction for Private Designated Verifier Signatures
On Generic Construction for Private Designated Verifier Sign...
收藏 引用
8th International Conference on Computational Intelligence and Security (CIS)
作者: Gao, Wei Wang, Zhenyou Li, Fei Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200030 Peoples R China Ludong Univ Sch Math & Informat Yantai Peoples R China Guangdong Univ Technol Fac Appl Math Guangzhou Peoples R China Ludong Univ Sch Math & Informat Yantai Peoples R China
This paper finds the same framework underlying some designated verifier signature schemes: each of them can be seen as a message authentication code scheme (MAC) where the private key is generated by the Diffie-Hellma... 详细信息
来源: 评论
Throughput optimization of the cipher message authentication code
Throughput optimization of the cipher message authentication...
收藏 引用
15th International Conference on Digital Signal Processing
作者: Michail, H. E. Kakarountas, A. P. Selimis, G. Goutis, C. E. Univ Patras Dept Elect & Comp Engn VLSI Design Lab GR-26110 Patras Greece
A new algorithm for producing message authenticating code (MAC) was recently proposed by NIST. The MAC protects both a message's integrity - by ensuring that a different MAC will be produced if the message has cha... 详细信息
来源: 评论
Anonymous Communication in Ubiquitous Computing Environments
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2011年 第1期56卷 21-36页
作者: Park, Min-Ho Son, Ju-Hyung Seo, Seung-Woo Seoul Natl Univ Sch Elect Engn & Comp Sci Seoul 151742 South Korea
Wireless networks such as WLANs which have already been commonplace will play an important role in providing the last mile access for ubiquitous computing environments. However, the wireless access technologies are ac... 详细信息
来源: 评论
CIPHER BLOCK BASED authentication MODULE: A HARDWARE DESIGN PERSPECTIVE
收藏 引用
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 2011年 第2期20卷 163-184页
作者: Michail, Harris E. Schinianakis, Dimitrios Goutis, Costas E. Kakarountas, Athanasios P. Selimis, Georgios Univ Patras Dept Elect & Comp Engn GR-26500 Patras Greece Univ Cent Greece Dept Comp Sci & Biomed Informat GR-35100 Lamia Greece IMEC Holst Ctr NL-5656 AE Eindhoven Netherlands
message authentication codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction wi... 详细信息
来源: 评论
CBCR:CBC MAC with rotating transformations
收藏 引用
Science China(Information Sciences) 2011年 第11期54卷 2247-2255页
作者: ZHANG LiTing 1,2,WU WenLing 1,ZHANG Lei 1 & WANG Peng 21 State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China 2 Graduate University of Chinese Academy of Sciences,Beijing 100049,China 1. State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China2. Graduate University of Chinese Academy of Sciences Beijing 100049 China
message authentication codes (MACs) are widely used to protect data integrity and data origin authentication in *** this paper,we propose a new block-cipher-based MAC algorithm,CBCR,with provable security for arbitrar... 详细信息
来源: 评论
A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks
A Double Key-Sharing Based False Data Filtering Scheme in Wi...
收藏 引用
Int Joint Conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
作者: Sun, Qian Wu, Min Cent S Univ Sch Informat Sci & Engn Changsha Hunan Peoples R China
In wireless sensor networks, the attackers can inject false data reports containing bogus readings or nonexistent events from compromising nodes, which may result in false alarms, interfere decision making, and drain ... 详细信息
来源: 评论
A fast image encryption and authentication scheme based on chaotic maps
收藏 引用
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION 2010年 第11期15卷 3507-3517页
作者: Yang, Huaqian Wong, Kwok-wo Liao, Xiaofeng Zhang, Wei Wei, Pengcheng Chongqing Educ Coll Dept Comp & Modern Educ Technol Chongqing 400067 Peoples R China City Univ Hong Kong Dept Elect Engn Kowloon Tong Hong Kong Peoples R China Chongqing Univ Coll Comp Sci & Engn Chongqing 400044 Peoples R China
In recent years, a variety of chaos-based image cryptosystems have been proposed The key used for encryption/decryption is usually independent of the plain-image To achieve a satisfactory level of security, at least t... 详细信息
来源: 评论
SEAODV: A SECURITY ENHANCED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORKS
SEAODV: A SECURITY ENHANCED AODV ROUTING PROTOCOL FOR WIRELE...
收藏 引用
6th Annual IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)/STMWC/NASSUE/CMPA/VECON/AWSAN/AWSAN
作者: Li, Celia Wang, Zhuang Yang, Cungang York Univ Dept Comp Sci & Engn N York ON M3J 1P3 Canada Ryerson Univ Dept Elect & Comp Engn Toronto ON Canada
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through ... 详细信息
来源: 评论
How to Thwart Birthday Attacks against MACs via Small Randomness
How to Thwart Birthday Attacks against MACs via Small Random...
收藏 引用
17th International Workshop on Fast Software Encryption
作者: Minematsu, Kazuhiko NEC Corp Ltd Nakahara Ku Kawasaki Kanagawa 213 Japan
The security of randomized message authentication code, MAC for short, is typically depending on the uniqueness of random initial vectors (IVs). Thus its security bound usually contains O(q(2)/2(n)), when random IV is... 详细信息
来源: 评论