咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是51-60 订阅
排序:
A new multi-linear universal hash family
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2013年 第3期69卷 351-367页
作者: Sarkar, Palash Indian Stat Inst Appl Stat Unit Kolkata 700108 India
A new universal hash family is described which generalises a previously known multi-linear hash family. messages are sequences over a finite field while keys are sequences over an extension field . A linear map from t... 详细信息
来源: 评论
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第18期8卷 3592-3601页
作者: Chen, Zhenhua Li, Shundong Zhu, Youwen Yan, Jianhua Xu, Xinli Xian Univ Sci & Technol Sch Comp Sci & Technol Xian 710054 Peoples R China Shaanxi Normal Univ Sch Comp Sci Xian 710062 Peoples R China Kyushu Univ Inst Math Ind Fukuoka 8190395 Japan Beiyou Univ State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Huaiyin Inst Technol Fac Math & Phys Huaian 223003 Peoples R China
There are many researches on the polynomial-based verifiable (k, n) multi-secret sharing scheme (VMSSS), but none of them focuses on the Chinese remainder theorem (CRT)-based VMSSS so far. For the first time, we provi... 详细信息
来源: 评论
On the Size of Source Space in a Secure MAC
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2015年 第9期10卷 2007-2015页
作者: Jiang, Shaoquan Mianyang Normal Univ Inst Informat Secur Mianyang 621000 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China
A message authentication code (MAC) is (t, epsilon) secure if an attacker cannot forge a valid message with probability better than epsilon after adaptively obtaining t valid messages. For a fixed key space K, it is i... 详细信息
来源: 评论
TESLA-Based authentication for BeiDou Civil Navigation message
收藏 引用
China Communications 2020年 第11期17卷 194-218页
作者: Zhijun Wu Yun Zhang Liang Liu Meng Yue The College of Electronic Information&Automation Civil Aviation University of ChinaTianjin 300300China
Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or *** main security loophole here is spoofi... 详细信息
来源: 评论
Crypto-Aided MAP Test for Low-Latency Detection of False Data in Short Packets
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021年 16卷 4939-4949页
作者: Kim, Sang Wu Liu, Xudong Iowa State Univ Dept Elect & Comp Engn Ames IA 50011 USA Zhengzhou Univ Dept Elect Engn Zhengzhou 450001 Peoples R China
Cryptography has been used as the first line of defense to ensure data integrity. However, it incurs a significant overhead for short packets which represent the most common form of traffic in emerging applications, s... 详细信息
来源: 评论
CIPHER BLOCK BASED authentication MODULE: A HARDWARE DESIGN PERSPECTIVE
收藏 引用
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 2011年 第2期20卷 163-184页
作者: Michail, Harris E. Schinianakis, Dimitrios Goutis, Costas E. Kakarountas, Athanasios P. Selimis, Georgios Univ Patras Dept Elect & Comp Engn GR-26500 Patras Greece Univ Cent Greece Dept Comp Sci & Biomed Informat GR-35100 Lamia Greece IMEC Holst Ctr NL-5656 AE Eindhoven Netherlands
message authentication codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction wi... 详细信息
来源: 评论
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2024年 第12期92卷 4423-4451页
作者: Minematsu, Kazuhiko Sato, Shingo Shikata, Junji Yokohama Natl Univ Inst Adv Sci Yokohama Japan Yokohama Natl Univ Grad Sch Environm & Informat Sci Yokohama Japan
In this paper, we propose a formal security model and a construction methodology of interactive aggregate message authentication codes with detecting functionality (IAMDs). The IAMD is an interactive aggregate MAC pro... 详细信息
来源: 评论
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 2024年 第1期32卷 253-267页
作者: Hayashi, Masahito Koshiba, Takeshi Southern Univ Sci & Technol Shenzhen Inst Quantum Sci & Engn Shenzhen 518055 Peoples R China Chinese Univ Hong Kong Sch Data Sci Shenzhen 518172 Longgang Peoples R China Int Quantum Acad SIQA Shenzhen 518048 Peoples R China Nagoya Univ Grad Sch Math Chikusa ku Nagoya 4648602 Japan Waseda Univ Fac Educ & Integrated Arts & Sci Shinju ku Tokyo 1698050 Japan
Secret sharing is a useful method for secure distributed data storage. Such a distributed data storage can avoid the information leakage under an attack to a limited number of distributed servers. While such distribut... 详细信息
来源: 评论
Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin Board
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2024年 第4期17卷 1698-1711页
作者: Li, Xiaotong Wang, Hao Li, Zhi Wu, Lei Wei, Xiaochao Su, Ye Lu, Rongxing Shandong Normal Univ Sch Informat Sci & Engn Jinan 250061 Peoples R China Univ New Brunswick Fac Comp Sci Fredericton NB Canada
Although secure multi-party computation breaks down data barriers, its utility is reduced when participants have limited computation and communication resources. To make secure multi-party computation more practical, ... 详细信息
来源: 评论
Cluster based secure authentication technique using ant colony optimization in wireless sensor networks
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2016年 第1期31卷 423-432页
作者: Rajesh, D. Hevin Paramasivan, B. St Xaviers Catholic Coll Engn Dept Informat Technol Kanyakumari Tamil Nadu India Natl Engn Coll Dept Comp Sci & Engn Kovilpatti Tamil Nadu India
In cluster based wireless sensor networks the existing technique does not offer security to the cluster head. The communication between the cluster head and the sink is not secured. Also, the technique to prevent mali... 详细信息
来源: 评论