咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 74 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 59 篇 电气工程
    • 41 篇 信息与通信工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 14 篇 数学
    • 3 篇 化学
    • 3 篇 生物学
    • 1 篇 物理学
  • 7 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 152 篇 message authenti...
  • 16 篇 cryptography
  • 13 篇 authentication
  • 12 篇 wireless sensor ...
  • 10 篇 message authenti...
  • 9 篇 mac
  • 8 篇 authenticated en...
  • 8 篇 provable securit...
  • 7 篇 integrity
  • 7 篇 wireless sensor ...
  • 7 篇 encryption
  • 7 篇 hash function
  • 6 篇 data integrity
  • 6 篇 security
  • 6 篇 zone routing pro...
  • 5 篇 manet
  • 5 篇 codes
  • 4 篇 denial-of-servic...
  • 4 篇 data aggregation
  • 4 篇 aes

机构

  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 mimos berhad inf...
  • 3 篇 univ malaya fac ...
  • 3 篇 univ teknol mara...
  • 3 篇 shanghai jiao to...
  • 2 篇 rhein westfal th...
  • 2 篇 hanyang univ div...
  • 2 篇 queens univ sch ...
  • 2 篇 rhein westfal th...
  • 2 篇 ibaraki univ dep...
  • 2 篇 nitte meenakshi ...
  • 2 篇 univ chinese aca...
  • 2 篇 manipal univ mit...
  • 2 篇 shanghai jiao to...
  • 2 篇 indian stat inst...
  • 2 篇 xiamen univ dept...
  • 2 篇 ntt corp ntt inf...
  • 2 篇 jnt univ dept ec...
  • 2 篇 univ tenaga nas ...

作者

  • 6 篇 yasuda kan
  • 4 篇 dilli ravilla
  • 4 篇 wang peng
  • 3 篇 minematsu kazuhi...
  • 3 篇 wu wenling
  • 3 篇 biradar rajashek...
  • 3 篇 rashwan a. m.
  • 3 篇 sarkar palash
  • 3 篇 jimale mohamud a...
  • 3 篇 hassanein h. s.
  • 3 篇 taha a-e m.
  • 3 篇 zhang liting
  • 3 篇 nalini n.
  • 3 篇 kiah miss laiha ...
  • 3 篇 rohmad mohd sauf...
  • 3 篇 li xiaochao
  • 3 篇 z'aba muhammad r...
  • 3 篇 shen yaobin
  • 3 篇 idris mohd yaman...
  • 3 篇 jamil norziana

语言

  • 147 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Message authentication code"
152 条 记 录,以下是61-70 订阅
排序:
A general construction of tweakable block ciphers and different modes of operations
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2008年 第5期54卷 1991-2006页
作者: Chakraborty, Debrup Sarkar, Palash CINVESTAV IPN Dept Comp Sci Mexico City 07360 DF Mexico Indian Stat Inst Appl Stat Unit Kolkata 700108 India
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC construction by working over a ring R an... 详细信息
来源: 评论
MAC Based Energy Efficiency in Cooperative Cognitive Radio Network in the Presence of Malicious Users
收藏 引用
IEEE ACCESS 2018年 6卷 5666-5677页
作者: Dai, Jianxin Liu, Juan Pan, Cunhua Wang, Jiangzhou Cheng, Chonghu Huang, Zhiliang Nanjing Univ Posts & Telecommun Sch Sci Nanjing 210023 Jiangsu Peoples R China Nanjing Univ Posts & Telecommun Coll Telecommun & Informat Engn Nanjing 210003 Jiangsu Peoples R China Queen Mary Univ London London E1 4NS England Univ Kent Sch Engn & Digital Arts Canterbury CT2 7NZ Kent England Zhejiang Normal Univ Coll Math Phys & Informat Engn Jinhua 321004 Peoples R China
In cognitive radio networks, cooperative spectrum sensing (CSS) is generally adopted for improving spectrum sensing accuracy to increase spectrum utilization and avoid interference with the primary users. However, som... 详细信息
来源: 评论
Integrity in Embedded Control Networks
收藏 引用
IEEE SECURITY & PRIVACY 2013年 第3期11卷 61-63页
作者: Koopman, Philip Szilagyi, Christopher Carnegie Mellon Univ Dept Elect & Comp Engn Pittsburgh PA 15213 USA
As threats from malicious attackers increase, integrity approaches in networked embedded systems will have to evolve to provide both the security and safety aspects of integrity in a unified approach. And they"ll... 详细信息
来源: 评论
More Reliable Approach for Detecting Data Alterations in Communication Networks
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第6期10卷 55-63页
作者: Dhawan, Vikas Gaba, Gurjot Singh Lovely Profess Univ Discipline Elect & Commun Engn Jalandhar 144411 India
Security of precious data is the most critical design parameter of a communication network. Applications like online banking and military information exchange requires more concern over security regardless of other de... 详细信息
来源: 评论
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces
收藏 引用
IEEE ACCESS 2022年 10卷 50819-50838页
作者: Jimale, Mohamud Ahmed Z'aba, Muhammad Reza Kiah, Miss Laiha Binti Mat Idris, Mohd Yamani Idna Jamil, Norziana Mohamad, Moesfa Soeheila Rohmad, Mohd Saufy Univ Malaya Fac Comp Sci & Informat Technol Dept Comp Syst & Technol Kuala Lumpur 50603 Malaysia Univ Tenaga Nas Coll Comp & Informat Kajang 43000 Selangor Malaysia MIMOS Berhad Informat Secur Lab Kuala Lumpur 57000 Malaysia Univ Teknol MARA Fac Elect Engn Shah Alam 40450 Selangor Malaysia
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in const... 详细信息
来源: 评论
Secured routing in wireless sensor networks using fault-free and trusted nodes
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 2016年 第1期29卷 170-193页
作者: Devanagavi, Geetha D. Nalini, N. Biradar, Rajashekhar C. Jain Univ Reva Inst Technol & Management Bangalore 560064 Karnataka India Nitte Meenakshi Inst Technol & Management Dept Comp Sci & Engn Bangalore Karnataka India Reva Inst Technol & Management Dept Informat Sci & Engn Bangalore 560064 Karnataka India
Wireless sensor network (WSN) should be designed such that it is able to identify the faulty nodes, rectify the faults, identify compromised nodes from various security threats, and transmit the sensed data securely t... 详细信息
来源: 评论
Arbitrated unconditionally secure authentication scheme with multi-senders
收藏 引用
INFORMATION PROCESSING LETTERS 1998年 第4期65卷 189-193页
作者: Hwang, TL Wang, CH Natl Cheng Kung Univ Inst Informat Engn Tainan 70101 Taiwan
Previously, Desmedt and Seberry developed a practical proven secure authentication scheme with arbitration. Their scheme, however, only provides an environment for a single sender. Nevertheless, in real applications, ... 详细信息
来源: 评论
A note on the fragility of the "Michael" message integrity code
收藏 引用
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2004年 第5期3卷 1459-1462页
作者: Wool, A Tel Aviv Univ Dept Elect Engn Syst IL-69978 Ramat Aviv Israel
The IEEE 802.11 wireless local area network standard did not incorporate a cryptographic message integrity code into its wired equivalent privacy (WEP) protocol, and relied upon CRC-32 for message integrity. This was ... 详细信息
来源: 评论
The Security of Key Derivation Functions in WINRAR
收藏 引用
JOURNAL OF COMPUTERS 2013年 第9期8卷 2262-2268页
作者: Chen, Jie Zhou, Jun Pan, Kun Lin, Shuqiang Zhao, Cuicui Li, Xiaochao Xiamen Univ Dept Elect Engn Xiamen Peoples R China
In various versions of WINRAR, the file security is mainly protected by user authentication and files encryption. Password based key derivation function (PBKDF) is the core of the WINRAR security mechanism. In this pa... 详细信息
来源: 评论
A Double Key-sharing Based False Data Filtering Scheme in Wireless Sensor Networks
收藏 引用
JOURNAL OF COMPUTERS 2013年 第2期8卷 388-398页
作者: Sun, Qian Wu, Min Cent S Univ Sch Informat Sci & Engn Changsha 410083 Hunan Peoples R China
In wireless sensor networks, the attackers can easily inject false data reports from compromising nodes. Previous approaches to filtering false data reports, notably statistical en-route filtering, usually share keys ... 详细信息
来源: 评论