咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 75 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 18 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 2 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 153 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 148 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
153 条 记 录,以下是121-130 订阅
排序:
How to Thwart Birthday Attacks against MACs via Small Randomness
How to Thwart Birthday Attacks against MACs via Small Random...
收藏 引用
17th International Workshop on Fast Software Encryption
作者: Minematsu, Kazuhiko NEC Corp Ltd Nakahara Ku Kawasaki Kanagawa 213 Japan
The security of randomized message authentication code, MAC for short, is typically depending on the uniqueness of random initial vectors (IVs). Thus its security bound usually contains O(q(2)/2(n)), when random IV is... 详细信息
来源: 评论
IEEE 802.11 Wireless LAN Control Frame Protection
IEEE 802.11 Wireless LAN Control Frame Protection
收藏 引用
7th IEEE Consumer Communications and Networking Conference
作者: Myneni, Sushma Huang, Dijiang Arizona State Univ Tempe AZ 85287 USA
In the present communication scenario of 802.11 wireless local access network there is virtually no way to protect control frames and due to this a range of network allocation vector based denial of service attacks ar... 详细信息
来源: 评论
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
Constructing Rate-1 MACs from Related-Key Unpredictable Bloc...
收藏 引用
17th International Workshop on Fast Software Encryption
作者: Zhang, Liting Wu, Wenling Wang, Peng Zhang, Lei Wu, Shuang Liang, Bo Chinese Acad Sci Inst Software State Key Lab Informat Secur Beijing 100190 Peoples R China Grad Univ Chinese Acad Sci Beijing 100049 Peoples R China
Almost all current block-cipher-based MACs reduce their security to the pseudorandomness of their underlying block ciphers, except for a few of them to the unpredictability, a strictly weaker security notion than pseu... 详细信息
来源: 评论
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs  1
收藏 引用
11th International Conference on Information Security and Cryptology
作者: Yasuda, Kan NTT Corp NTT Informat Sharing Platform Labs Tokyo 1808585 Japan
We present a, CBC (cipher block chaining)-like mode of operation for MACs (message authentication codes) using a hash function. The new construction iCBC (imbalanced CBC) does not follow, the Merkle-Damgard design but... 详细信息
来源: 评论
On Efficient Data Integrity and Data Origin authentication for Wireless Sensor Networks Utilising Block Cipher Design Techniques
On Efficient Data Integrity and Data Origin Authentication f...
收藏 引用
3rd International Conference on Next Generation Mobile Applications, Services, and Technologies
作者: Adekunle, A. A. Woodhead, S. R. Univ Greenwich Dept Comp & Commun Engn Chatham ME4 4TB Kent England
Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC) in sensor applications is undertaken;the conclusions are used in the design of two new MAC constr... 详细信息
来源: 评论
Security of Truncated MACs
收藏 引用
4th International Conference on Information Security and Cryptology (Inscript 2008)
作者: Wang, Peng Feng, Dengguo Lin, Changlu Wu, Wenling Chinese Acad Sci Grad Univ State Key Lab Informat Secur Beijing 100049 Peoples R China Inst Software Chinese Acad Sci Stae Key Lab Informat Security Beijing 100080 Peoples R China Fujian Normal Univ Key lab Network Security & Cryptol Fujian 350007 Japan
In all of the MAC standard documents, the tag truncation is defined. Even if a MAC can be proved to be secure in the sense of unforgeability, the truncated MAC may suffer from sudden loss of security. We propose a new... 详细信息
来源: 评论
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Se...
收藏 引用
28th Annual International Conference on Theory and Applications of Cryptographic Techniques
作者: Yasuda, Kan NTT Information Sharing Platform Laboratories NTT Corporation Japan
We revisit the double-pipe construction introduced by Lucks at Asiacrypt 2005. Lucks originally studied the construction for iterated hash functions and showed that the approach is effective in improving security agai... 详细信息
来源: 评论
无线感知网路上兼具传输效能之认证方法
无线感知网路上兼具传输效能之认证方法
收藏 引用
作者: 艾希德 国立清华大学
学位级别:硕士
The hardware design miniaturization has led to the introduction of tiny sensing devices with communication and processing capabilities embedded in the physical world or spread throughout our environment. Nowadays sens... 详细信息
来源: 评论
Authenticated Data Compression in Delay Tolerant Wireless Sensor Networks
Authenticated Data Compression in Delay Tolerant Wireless Se...
收藏 引用
International Conference on Networked Sensing Systems
作者: Young-Hyun Oh Peng Ning Yao Liu Michael K. Reiter North Carolina State University University of North Carolina at Chapel Hill
Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constrain... 详细信息
来源: 评论
Efficient In-Vehicle Delayed Data authentication Based on Compound message authentication codes
Efficient In-Vehicle Delayed Data Authentication Based on Co...
收藏 引用
68th IEEE Vehicular Technology Conference
作者: Nilsson, Dennis K. Larson, Ulf E. Jonsson, Erland Chalmers Univ Technol Dept Comp Sci & Engn SE-41296 Gothenburg Sweden
Modern vehicles contain an in-vehicle network consisting of a number of electronic control units (ECUs). These ECUs are responsible for most of the functionality in the vehicle, including vehicle control and maneuvera... 详细信息
来源: 评论