咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是31-40 订阅
排序:
Analysis and design of secure watermark-based authentication systems
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2006年 第1期1卷 43-55页
作者: Fei, Chuhong Kundur, Deepa Kwong, Raymond H. Univ Toronto Edward S Rogers Sr Dept Elect & Comp Engn Toronto ON M5S 3G4 Canada Texas A&M Univ Dept Elect & Comp Engn College Stn TX 77843 USA
This paper focuses on a coding approach for effective analysis and design of secure watermark-based multimedia authentication systems. We provide a design framework for semi-fragile watermark-based authentication such... 详细信息
来源: 评论
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards
收藏 引用
IET INFORMATION SECURITY 2016年 第5期10卷 272-282页
作者: Reddy, Alavalapati Goutham Yoon, Eun-Jun Das, Ashok Kumar Yoo, Kee-Young Kyungpook Natl Univ Sch Engn & Comp Sci Daegu South Korea Kyungil Univ Dept Cyber Secur Gyeonbuk South Korea Int Inst Informat Technol Ctr Secur Theory & Algorithm Res Hyderabad 500032 Andhra Pradesh India
In 2012, Mun et al. proposed an enhanced secure authentication with key-agreement protocol for roaming service in global mobility networks environment based on elliptic curve cryptography. They claimed that their prot... 详细信息
来源: 评论
Physical-Layer authentication via a Dynamic Scaling
收藏 引用
Chinese Journal of Electronics 2020年 第4期29卷 651-659页
作者: LI Min JIANG Shaoquan LIAO Yongjian Institute of Information Security Mianyang Normal University School of Information and Software Engineering University of Electronic Science and Technology of China
message authentication is a process that allows sender Alice to transmit a source state to receiver Bob such that the latter is assured of the *** study this problem in the physical-layer where the channel is degraded... 详细信息
来源: 评论
MacDES: MAC algorithm based on DES
收藏 引用
ELECTRONICS LETTERS 1998年 第9期34卷 871-873页
作者: Knudsen, LR Preneel, B Univ Bergen Dept Informat N-5020 Bergen Norway Katholieke Univ Leuven Dept Elect Engn ESAT COSIC B-3001 Heverlee Belgium
A new message authentication code (MAC) algorithm is proposed, which improves the popular retail MAC based on the data encryption standard;it has the same complexity, but provides better resistance against key recover... 详细信息
来源: 评论
Evaluating Bernstein-Rabin-Winograd polynomials
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2019年 第2-3期87卷 527-546页
作者: Ghosh, Sebati Sarkar, Palash Indian Stat Inst 203 BT Rd Kolkata 700108 India
We describe an algorithm which can efficiently evaluate Bernstein-Rabin-Winograd (BRW) polynomials. The presently best known complexity of evaluating a BRW polynomial on m3 field elements is m/2 field multiplications.... 详细信息
来源: 评论
A MAC forgery attack on SOBER-128
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2005年 第5期E88A卷 1166-1172页
作者: Watanabe, D Furuya, S Kaneko, T Hitachi Ltd Syst Dev Lab Yokohama Kanagawa 2440817 Japan Tokyo Univ Sci Noda Chiba 2788510 Japan
SOBER-128 is a stream cipher designed by Rose and Hawkes in 2003. It can be also used for generating message authentication codes (MACs) and an authenticated encryption. The developers claimed that it is difficult to ... 详细信息
来源: 评论
Trusted Neighbors Based Secured Routing Scheme in Wireless Sensor Networks Using Agents
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2014年 第1期78卷 1-28页
作者: Devanagavi, Geetha D. Nalini, N. Biradar, Rajashekhar C. Reva Inst Technol & Management Dept Elect & Commun Engn Bangalore Karnataka India Jain Univ Bangalore Karnataka India Nitte Meenakshi Inst Technol & Management Dept Comp Sci & Engn Bangalore Karnataka India Reva Inst Technol & Management Dept Informat Sci & Engn Bangalore Karnataka India
In Wireless Sensor Network (WSN) applications, nodes are deployed in public domains that are prone to be attacked by various types of attacks wherein the data confidentiality, integrity and authentication are compromi... 详细信息
来源: 评论
Leveraging quantum uncertainty: Quantum randomness through the lens of classical communication networks
收藏 引用
COMPUTER NETWORKS 2024年 254卷
作者: Das, Siddharth Krause, Stefan Giering, Kay-Uwe Pousa, Ricardo J. B. Bassoli, Riccardo Fitzek, Frank H. P. Tech Univ Dresden Deutsch Telekom Chair Commun Networks Dresden Saxony Germany Tech Univ Dresden Ctr Tactile Internet CeTi Dresden Saxony Germany Tech Univ Dresden Quantum Commun Networks Res Grp Dresden Saxony Germany Fraunhofer IIS Inst Steil Entwicklung Adaptiver Syst EAS Dresden Saxony Germany
The generation of random numbers and the study of its properties have been an elusive field for a fair portion of the century. The application of random numbers is employed in many use cases such as cryptography, neur... 详细信息
来源: 评论
A key distribution scheme using network coding for mobile ad hoc network
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2012年 第1期5卷 59-67页
作者: Liu, Jianwei Du, Ruiying Chen, Jing He, Kun Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China Wuhan Univ Sch Comp Sci Wuhan 430072 Peoples R China
Network coding offers an excellent solution for maximizing throughput in various networks. Because of its simplicity and high efficiency, the idea of network coding can also be used for designing lightweight key distr... 详细信息
来源: 评论
Security analysis of GCM for communication
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2014年 第5期7卷 854-864页
作者: Yap, Wun-She Yeo, Sze Ling Heng, Swee-Huay Henricksen, Matt ASTAR Inst Infocomm Res Singapore Singapore Multimedia Univ Fac Informat Sci & Technol Ayer Keroh Melaka Malaysia
The Galois/Counter Mode of operations (GCM) is constructed by combining the counter mode encryption and the authentication component (i.e., GTAG) to provide both privacy and authenticity. GTAG can be used as a stand-a... 详细信息
来源: 评论