咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是41-50 订阅
排序:
On the relationships between perfect nonlinear functions and universal hash families
收藏 引用
THEORETICAL COMPUTER SCIENCE 2013年 513卷 85-95页
作者: Liu, Jian Chen, Lusheng Nankai Univ Sch Math Sci Tianjin 300071 Peoples R China
In this paper, the relationships between perfect nonlinear (in brief, PN) functions and optimal universal hash families are discussed. We point out the equivalence of constructions between them, i.e., from PN function... 详细信息
来源: 评论
Anonymous Communication in Ubiquitous Computing Environments
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2011年 第1期56卷 21-36页
作者: Park, Min-Ho Son, Ju-Hyung Seo, Seung-Woo Seoul Natl Univ Sch Elect Engn & Comp Sci Seoul 151742 South Korea
Wireless networks such as WLANs which have already been commonplace will play an important role in providing the last mile access for ubiquitous computing environments. However, the wireless access technologies are ac... 详细信息
来源: 评论
A fast image encryption and authentication scheme based on chaotic maps
收藏 引用
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION 2010年 第11期15卷 3507-3517页
作者: Yang, Huaqian Wong, Kwok-wo Liao, Xiaofeng Zhang, Wei Wei, Pengcheng Chongqing Educ Coll Dept Comp & Modern Educ Technol Chongqing 400067 Peoples R China City Univ Hong Kong Dept Elect Engn Kowloon Tong Hong Kong Peoples R China Chongqing Univ Coll Comp Sci & Engn Chongqing 400044 Peoples R China
In recent years, a variety of chaos-based image cryptosystems have been proposed The key used for encryption/decryption is usually independent of the plain-image To achieve a satisfactory level of security, at least t... 详细信息
来源: 评论
Agent based trusted neighbor identification in Wireless Sensor Networks
收藏 引用
AI COMMUNICATIONS 2015年 第4期28卷 693-708页
作者: Geetha, D. D. Nalini, N. Biradar, Rajashekhar C. Jain Univ Bangalore Karnataka India Reva Univ Bangalore Karnataka India Shridevi Inst Engn & Technol Tumkur India
Wireless Sensor Networks (WSNs) have been extensively used in various applications such as environmental monitoring, industrial monitoring, agriculture, green house monitoring, structural monitoring, passive localizat... 详细信息
来源: 评论
CSP-DHIES: a new public-key encryption scheme from matrix conjugation
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2012年 第7期5卷 809-822页
作者: Pan, Ping Wang, Lihua Wang, Licheng Li, Lixiang Yang, Yixian Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Natl Inst Informat & Commun Technol NICT Koganei Tokyo 1848795 Japan
We propose a new public-key cryptosystem named conjugacy search problem-based DiffieHellman integrated encryption scheme (CSP-DHIES), by using conjugation-related assumptions for a special monoid of matrices of trunca... 详细信息
来源: 评论
Design and performance analysis of electronic seal protection systems based on AES
收藏 引用
ETRI JOURNAL 2007年 第6期29卷 755-768页
作者: Kim, Dong Kyue Lee, Mun-Kyu Kang, You Sung Chung, Sang-Hwa Ybon, Won-Ju Min, Jung-Ki Kim, Howon Hanyang Univ Div Elect & Comp Engn Seoul 133791 South Korea Inha Univ Sch Comp Sci & Engn Inchon South Korea ETRI Informat Security Res Div Taejon South Korea Pusan Natl Univ Dept Comp Engn Pusan South Korea
A very promising application of active RFID systems is the electronic seal, an electronic device to guarantee the authenticity and integrity of freight containers. To provide freight containers with a high level of ta... 详细信息
来源: 评论
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2018年 第7期86卷 1411-1449页
作者: Han, Shuai Liu, Shengli Lyu, Lin Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Westone Cryptol Res Ctr Beijing 100070 Peoples R China
F-related-key attacks (RKA) on cryptographic systems consider adversaries who can observe the outcome of a system under not only the original key, say k, but also related keys f(k), with f adaptively chosen from by th... 详细信息
来源: 评论
Implementation of Secure Sampled Value (SeSV) messages in Substation Automation System
收藏 引用
IEEE TRANSACTIONS ON POWER DELIVERY 2022年 第1期37卷 405-414页
作者: Hong, Junho Karnati, Ramya Ten, Chee-Wooi Lee, Soonwoo Choi, Sungsoo Univ Michigan Dept Elect & Comp Engn Dearborn MI 48128 USA Michigan Technol Univ Dept Elect & Comp Engn Houghton MI 49931 USA Korea Electrotechnol Res Inst KERI Ansan 426170 South Korea
IEC61850 is the mainstream of the development for substation automation. This paper presents a practical consideration and analysis for implementing a secure sampled measured value (SeSV) message in substation automat... 详细信息
来源: 评论
An Effective Metaheuristic Based Dynamic Fine Grained Data Security Framework for Big Data
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2024年 第4期137卷 2441-2468页
作者: Gupta, Lalit Mohan Samad, Abdus Garg, Hitendra Shah, Kaushal Aligarh Coll Engn & Technol Dept Comp Sci & Engn Aligarh Uttar Pradesh India Aligarh Muslim Univ Dept Comp Engn ZHCET Aligarh Uttar Pradesh India GLA Univ Dept Comp Sci Mathura Uttar Pradesh India Pandit Deendayal Energy Univ Dept Comp Sci & Engn Gandhinagar India
Medical records are transmitted between medical institutions using cloud-based Electronic health record (EHR) systems, which are intended to improve various medical services. Due to the potential of data breaches and ... 详细信息
来源: 评论
Authenticated Encryption Schemes: A Systematic Review
收藏 引用
IEEE ACCESS 2022年 10卷 14739-14766页
作者: Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy Univ Malaya Fac Comp Sci & Informat Technol Dept Comp Syst & Technol Kuala Lumpur 50603 Malaysia Univ Tenaga Nas Coll Comp & Informat Kajang 43000 Selangor Malaysia MIMOS Berhad Informat Secur Lab Kuala Lumpur 57000 Malaysia Univ Teknol MARA Fac Elect Engn Shah Alam 40450 Selangor Malaysia
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 20... 详细信息
来源: 评论