咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是21-30 订阅
排序:
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection
收藏 引用
IEEE ACCESS 2023年 11卷 59661-59674页
作者: Jimale, Mohamud Ahmed Abdullah, Nor Aniza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Z'Aba, Muhammad Reza Jamil, Norziana Rohmad, Mohd Saufy Univ Malaya Fac Comp Sci & Informat Technol Dept Comp Syst & Technol Kuala Lumpur 50603 Malaysia MIMOS Berhad Informat Secur Lab Kuala Lumpur 57000 Malaysia Univ Tenaga Nas Coll Comp & Informat Kajang 430000 Selangor Malaysia Univ Teknol MARA Fac Elect Engn Shah Alam 40450 Selangor Malaysia
Authenticated Encryption (AE) protects confidentiality and integrity at the same time. The sponge construction is based on an iterated permutation or transformation that can be used to implement hashing, and AE scheme... 详细信息
来源: 评论
P4Chaskey: An Efficient MAC Algorithm for PISA Switches  32
P4Chaskey: An Efficient MAC Algorithm for PISA Switches
收藏 引用
32nd International Conference on Network Protocols
作者: Francisco, Martim Ferreira, Bernardo Ramos, Fernando M., V Marin, Eduard Signorello, Salvatore Univ Lisbon Fac Ciencias LASIGE Lisbon Portugal Univ Lisbon Inst Super Tecn INESC ID Lisbon Portugal Telefonica Res Barcelona Spain
Cryptographic primitives are of paramount importance to guarantee security properties in communication networks. The associated computational complexity of cryptography standards makes it prohibitive to execute these ... 详细信息
来源: 评论
Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications
收藏 引用
IEEE ACCESS 2022年 10卷 112472-112486页
作者: Upadhyay, Darshana Gaikwad, Nupur Zaman, Marzia Sampalli, Srinivas Dalhousie Univ Fac Comp Sci Halifax NS B3H 1W5 Canada Cistel Technol Inc Res & Dev Dept Ottawa ON K2E 7V7 Canada
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of ... 详细信息
来源: 评论
Implementation of Secure Sampled Value (SeSV) messages in Substation Automation System
收藏 引用
IEEE TRANSACTIONS ON POWER DELIVERY 2022年 第1期37卷 405-414页
作者: Hong, Junho Karnati, Ramya Ten, Chee-Wooi Lee, Soonwoo Choi, Sungsoo Univ Michigan Dept Elect & Comp Engn Dearborn MI 48128 USA Michigan Technol Univ Dept Elect & Comp Engn Houghton MI 49931 USA Korea Electrotechnol Res Inst KERI Ansan 426170 South Korea
IEC61850 is the mainstream of the development for substation automation. This paper presents a practical consideration and analysis for implementing a secure sampled measured value (SeSV) message in substation automat... 详细信息
来源: 评论
Authenticated Encryption Schemes: A Systematic Review
收藏 引用
IEEE ACCESS 2022年 10卷 14739-14766页
作者: Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy Univ Malaya Fac Comp Sci & Informat Technol Dept Comp Syst & Technol Kuala Lumpur 50603 Malaysia Univ Tenaga Nas Coll Comp & Informat Kajang 43000 Selangor Malaysia MIMOS Berhad Informat Secur Lab Kuala Lumpur 57000 Malaysia Univ Teknol MARA Fac Elect Engn Shah Alam 40450 Selangor Malaysia
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 20... 详细信息
来源: 评论
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs  29th
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs
收藏 引用
29th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)
作者: Shen, Yaobin Standaert, Francois-Xavier Wang, Lei UCLouvain ICTEAM Crypto Grp Louvain La Neuve Belgium Shanghai Jiao Tong Univ Shanghai Peoples R China
At CRYPTO'18, Datta et al. proposed nPolyMAC and proved the security up to 2(2n/3) authentication queries and 2(n) verification queries. At EUROCRYPT'19, Dutta et al. proposed CWC+ and showed the security up t... 详细信息
来源: 评论
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
收藏 引用
IEEE ACCESS 2022年 10卷 50819-50838页
作者: Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy Univ Malaya Fac Comp Sci & Informat Technol Dept Comp Syst & Technol Kuala Lumpur 50603 Malaysia Univ Tenaga Nas Coll Comp & Informat Kajang 43000 Selangor Malaysia MIMOS Berhad Informat Secur Lab Kuala Lumpur 57000 Malaysia Univ Teknol MARA Fac Elect Engn Shah Alam 40450 Selangor Malaysia
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in const... 详细信息
来源: 评论
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols  48
Retrofitting Integrity Protection into Unused Header Fields ...
收藏 引用
48th Conference on Local Computer Networks
作者: Wagner, Eric Rothaug, Nils Wolsing, Konrad Bader, Lennart Wehrlet, Klaus Henze, Martin Fraunhofer FKIE Cyber Anal & Def Bonn Germany Rhein Westfal TH Aachen Commun & Distributed Syst Aachen Germany Rhein Westfal TH Aachen Secur & Privacy Ind Cooperat Aachen Germany
Industrial networks become increasingly interconnected, which opens the floodgates for cyberattacks on legacy networks designed without security in mind. Consequently, the vast landscape of legacy industrial communica... 详细信息
来源: 评论
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security  28th
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Secu...
收藏 引用
28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)
作者: Shen, Yaobin Sibleyras, Ferdinand Shanghai Jiao Tong Univ Shanghai Peoples R China UCLouvain Crypto Grp ICTEAM Louvain La Neuve Belgium NTT Social Informat Labs Tokyo Japan
3kf9 is a three-key CBC-type MAC that enhances the standardized integrity algorithm f9 (3GPP-MAC). It has beyond-birthdaybound security and is expected to be a possible candidate in constrained environments when insta... 详细信息
来源: 评论
BEC Defender: QR code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
收藏 引用
SENSORS 2024年 第5期24卷 1676页
作者: Papathanasiou, Anastasios Liontos, George Paparis, Georgios Liagkou, Vasiliki Glavas, Euripides Hellen Police Cyber Crime Div 173 Alexandras Ave Athens 11522 Greece Univ Ioannina Dept Informat & Telecommun Arta 47150 Greece Univ Ioannina Dept Mat Sci & Engn Ioannina 45110 Greece
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and... 详细信息
来源: 评论