咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是131-140 订阅
排序:
On the unprovable security of 2-Key XCBC
On the unprovable security of 2-Key XCBC
收藏 引用
13th Australasian Conference on Information Security and Privacy
作者: Wang, Peng Feng, Dengguo Wu, Wenling Zhang, Liting Chinese Acad Sci Grad Univ State Key Lab Informat Secur Beijing 100049 Peoples R China Chinese Acad Sci Inst Software State Key Lab Informat Secur Beijing 100080 Peoples R China
There has been extensive research focusing on improving CBC-MAC to operate on variable length messages with less keys and less blockcipher invocations. After Black and Rogaway's XCBC, Moriai and Imai proposed 2-Ke... 详细信息
来源: 评论
A One-Pass Mode of Operation for Deterministic message authentication - Security beyond the Birthday Barrier
收藏 引用
15th International Workshop on Fast Software Encryption
作者: Yasuda, Kan NTT Corp NTT Informat Sharing Platform Labs Musashino Tokyo 1808585 Japan
We present a novel mode of operation which iterates a compression function f : {0, 1}(n+b) -> {0, 1}(n) meeting a condition b >= 2n. Our construction can be viewed as a way of domain extension, applicable to a f... 详细信息
来源: 评论
Secure time synchronization in sensor networks
收藏 引用
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2008年 第4期11卷 23-23页
作者: Ganeriwal, Saurabh Poepper, Christina Capkun, Srdjan Srivastava, Mani B. Univ Calif Los Angeles Dept Elect Engn Los Angeles CA 90095 USA ETH Dept Comp Sci CH-8092 Zurich Switzerland
Time synchronization is critical in sensor networks at many layers of their design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming, and other collaborative signal processing... 详细信息
来源: 评论
Study of chaos functions for their suitability in generating message authentication codes
收藏 引用
APPLIED SOFT COMPUTING 2007年 第3期7卷 1064-1071页
作者: Arumugam, G. Praba, V. Lakshmi Radhakrishnan, S. Arulmigu Kalasalingam Coll Engn Dept Comp Applicat Krishnankoil Tamil Nadu India Madurai Kamaraj Univ Dept Comp Sci Madurai Tamil Nadu India Arulmigu Kalasalingam Coll Engn Dept Comp Sci & Engn Krishnankoil Tamil Nadu India
Chaos functions are mainly used to develop mathematical models of non-linear systems. They have attracted the attention of many mathematicians owing to their extremely sensitive nature to initial conditions and their ... 详细信息
来源: 评论
Applying Security Algorithms against Cyber Attacks in the Distribution Automation System
Applying Security Algorithms against Cyber Attacks in the Di...
收藏 引用
2008 IEEE/PES Transmission & Distribution Conference & Exposition, part 1
作者: I. H. Lim S. Hong M. S. Choi S. J. Lee S. W. Lee B. N. Ha Next-generation Power Technology Center Department of Electrical Engineering and Computer Software Engineering Myongji University Yongin si South Korea KEPRI Daejeon South Korea
As the communication technology weighs heavily in the power system, so the security issues becomes major concerns. So far most security research has focused on the SCADA system. In this paper we consider the security ... 详细信息
来源: 评论
Design and performance analysis of electronic seal protection systems based on AES
收藏 引用
ETRI JOURNAL 2007年 第6期29卷 755-768页
作者: Kim, Dong Kyue Lee, Mun-Kyu Kang, You Sung Chung, Sang-Hwa Ybon, Won-Ju Min, Jung-Ki Kim, Howon Hanyang Univ Div Elect & Comp Engn Seoul 133791 South Korea Inha Univ Sch Comp Sci & Engn Inchon South Korea ETRI Informat Security Res Div Taejon South Korea Pusan Natl Univ Dept Comp Engn Pusan South Korea
A very promising application of active RFID systems is the electronic seal, an electronic device to guarantee the authenticity and integrity of freight containers. To provide freight containers with a high level of ta... 详细信息
来源: 评论
"Sandwich" is indeed secure: How to authenticate a message with just one hashing
收藏 引用
12th Australasian Conference on Information Security and Privacy
作者: Yasuda, Kan NTT Corp NTT Informat Sharing Platform Labs Kanagawa 2390847 Japan
This paper shows that the classical "Sandwich" method, which prepends and appends a key to a message and then hashes the data using Merkle-Damgard iteration, does indeed provide a secure message Authenticati... 详细信息
来源: 评论
Multilane HMAC - Security beyond the birthday limit
Multilane HMAC - Security beyond the birthday limit
收藏 引用
8th Annual International Conference on Cryptology in India
作者: Yasuda, Kan NTT Corp NTT Informat Sharing Platform Labs Tokyo 1808585 Japan
HMAC is a popular MAC (message authentication code) that is based on a cryptographic hash function. HMAC is provided with a formal proof of security, in which it is proven to be a PRF (Pseudo-Random Function) under th... 详细信息
来源: 评论
Analysis and design of secure watermark-based authentication systems
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2006年 第1期1卷 43-55页
作者: Fei, Chuhong Kundur, Deepa Kwong, Raymond H. Univ Toronto Edward S Rogers Sr Dept Elect & Comp Engn Toronto ON M5S 3G4 Canada Texas A&M Univ Dept Elect & Comp Engn College Stn TX 77843 USA
This paper focuses on a coding approach for effective analysis and design of secure watermark-based multimedia authentication systems. We provide a design framework for semi-fragile watermark-based authentication such... 详细信息
来源: 评论
Efficient implementation of pseudorandom functions for electronic seal protection protocols
收藏 引用
7th International Workshop on Information Security Applications
作者: Lee, Mun-Kyu Min, Jung Ki Kang, Seok Hun Chung, Sang-Hwa Kim, Howon Kim, Dong Kyue Inha Univ Sch Comp Sci & Engn Inchon 402751 South Korea Pusan Natl Univ Dept Comp Engn Busan South Korea Elect & Telecommun Res Inst Daejeon South Korea Hanyang Univ Div Elect & Comp Engn Seoul South Korea
One of the most promising applications of active RFID tags is electronic seal, which is an electronic device to guarantee the authenticity and integrity of freight containers and also provides physical protection like... 详细信息
来源: 评论