咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是51-60 订阅
排序:
Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs
收藏 引用
ACM TRANSACTIONS ON SENSOR NETWORKS 2019年 第2期15卷 18-18页
作者: Alghamdi, Wael Rezvani, Mohsen Wu, Hui Kanhere, Salil S. Taif Univ Fac Comp Sci & Informat Technol Airport Rd At Taif 26571 Mecca Province Saudi Arabia Shahrood Univ Technol Fac Comp Engn Shahrood Iran Univ New South Wales Sch Comp Sci & Engn Sydney NSW Australia
Data aggregation in Wireless Sensor Networks (WSNs) can effectively reduce communication overheads and reduce the energy consumption of sensor nodes. A WSN needs to be not only energy efficient but also secure. Variou... 详细信息
来源: 评论
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 2018年 第7期86卷 1411-1449页
作者: Han, Shuai Liu, Shengli Lyu, Lin Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Westone Cryptol Res Ctr Beijing 100070 Peoples R China
F-related-key attacks (RKA) on cryptographic systems consider adversaries who can observe the outcome of a system under not only the original key, say k, but also related keys f(k), with f adaptively chosen from by th... 详细信息
来源: 评论
MAC Based Energy Efficiency in Cooperative Cognitive Radio Network in the Presence of Malicious Users
收藏 引用
IEEE ACCESS 2018年 6卷 5666-5677页
作者: Dai, Jianxin Liu, Juan Pan, Cunhua Wang, Jiangzhou Cheng, Chonghu Huang, Zhiliang Nanjing Univ Posts & Telecommun Sch Sci Nanjing 210023 Jiangsu Peoples R China Nanjing Univ Posts & Telecommun Coll Telecommun & Informat Engn Nanjing 210003 Jiangsu Peoples R China Queen Mary Univ London London E1 4NS England Univ Kent Sch Engn & Digital Arts Canterbury CT2 7NZ Kent England Zhejiang Normal Univ Coll Math Phys & Informat Engn Jinhua 321004 Peoples R China
In cognitive radio networks, cooperative spectrum sensing (CSS) is generally adopted for improving spectrum sensing accuracy to increase spectrum utilization and avoid interference with the primary users. However, som... 详细信息
来源: 评论
An Improved Authenticated Compressive Sensing Imaging  12
An Improved Authenticated Compressive Sensing Imaging
收藏 引用
12th IEEE International Conference on Semantic Computing (ICSC)
作者: Wu, Tao Ruland, Christoph Univ Siegen Chair Data Commun Syst Siegen Germany
Compressive Sensing (CS) is a hot topic in mathematics, computer science and electronics area in recent years. Imaging system takes fully advantage of this novel theory, i. e. Compressive Sensing based Imaging (CSI) c... 详细信息
来源: 评论
Enabling Authenticated Data Exchanges in Industrial Control Systems  6
Enabling Authenticated Data Exchanges in Industrial Control ...
收藏 引用
6th International Symposium on Digital Forensic and Security (ISDFS)
作者: Duka, Adrian-Vasile Genge, Bela Haller, Piroska Petru Maior Univ Tirgu Mures Dept Elect Engn & Comp Sci 1 N Iorga St Tirgu Mures Mures 540088 Romania Petru Maior Univ Tirgu Mures Dept Informat 1 N Iorga St Tirgu Mures Mures 540088 Romania
In the context of the ever more increasing number of cyber attacks targeted against Industrial Control Systems, the protection of data (e.g., process variables) commonly exchanged between the system's components (... 详细信息
来源: 评论
An Authenticated Encrypted Compressive Sensing based Imaging Mechanism  9
An Authenticated Encrypted Compressive Sensing based Imaging...
收藏 引用
9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
作者: Wu, Tao Ruland, Christoph Univ Siegen Chair Data Commun Syst Siegen Germany
Compressive Sensing (CS) based imaging (CSI) method can recover N pixel information from only M measurements with N >> M, if the source information is sparse in some domain. With help of CSI mechanism an imaging... 详细信息
来源: 评论
PASTA: PASsword-based Threshold authentication  18
PASTA: PASsword-based Threshold Authentication
收藏 引用
ACM SIGSAC Conference on Computer and Communications Security (CCS)
作者: Agrawal, Shashank Miao, Peihan Mohassel, Payman Mukherjee, Pratyay Visa Res Palo Alto CA 94306 USA Univ Calif Berkeley Berkeley CA 94720 USA
Token-based authentication is commonly used to enable a single-sign-on experience on the web, in mobile applications and on enterprise networks using a wide range of open standards and network authentication protocols... 详细信息
来源: 评论
車用控制器區域網路安全防護系統
NCS 2019 全国计算机会议
收藏 引用
NCS 2019 全国计算机会议 2019年 546-553页
作者: 林亞吟 魯家瑜 楊明豪 羅嘉寧 吳章銘
现代汽车不再仅仅只是机械设备,而是一个由多个电子控制单元(Electronic Control Unit, ECU)组成的车载网络。这些ECU负责车辆中的大多数功能,包括车辆控制和机动性。但是在他们的底层协议中并未实现安全性,例如用於传输即时的关... 详细信息
来源: 评论
A secure image sharing scheme with high quality stego-images based on steganography
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2017年 第6期76卷 7677-7698页
作者: He, Junhui Lan, Weiqiang Tang, Shaohua South China Univ Technol Sch Comp Sci & Engn Guangzhou Higher Educ Mega Ctr Guangzhou 510006 Guangdong Peoples R China
Image sharing can be utilized to protect important commercial, military or private images against a single point of failure. Many existing image sharing schemes may have one or more of the security weaknesses as follo... 详细信息
来源: 评论
Mini-MAC: Raising the bar for vehicular security with a lightweight message authentication protocol
收藏 引用
VEHICULAR COMMUNICATIONS 2017年 9卷 188-196页
作者: Schmandt, Jackson Sherman, Alan T. Banerjee, Nilanjan UMBC CSEE Dept Mobile Pervas Sensor Syst Lab Baltimore MD 21250 USA UMBC CSEE Dept Cyber Def Lab Baltimore MD 21250 USA
We propose Mini-MAC, a new message authentication protocol that works in existing automotive computer networks without delaying any message or increasing network traffic. Deployed in many vehicles, the CAN bus is a lo... 详细信息
来源: 评论