咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 7 篇 one way hash fun...
  • 2 篇 authentication
  • 2 篇 computation comp...
  • 2 篇 multicast commun...
  • 2 篇 key distribution
  • 1 篇 gcd
  • 1 篇 internet of thin...
  • 1 篇 euler's totient ...
  • 1 篇 lightweight envi...
  • 1 篇 physically unclo...
  • 1 篇 karatsuba multip...
  • 1 篇 mutual authentic...
  • 1 篇 wireless securit...
  • 1 篇 cnn-md
  • 1 篇 secure medicatio...
  • 1 篇 secret key
  • 1 篇 threshold secret...
  • 1 篇 subset differenc...
  • 1 篇 chaos encryption
  • 1 篇 chaotic neural n...

机构

  • 1 篇 curtin univ debi...
  • 1 篇 univ coll engn t...
  • 1 篇 dalian maritime ...
  • 1 篇 anna univ chenna...
  • 1 篇 southeast univ s...
  • 1 篇 anna univ dept i...
  • 1 篇 buddha univ sch ...
  • 1 篇 univn colln engn...
  • 1 篇 anna univ dept c...
  • 1 篇 gitam deemed uni...
  • 1 篇 gautam buddha un...
  • 1 篇 anna univ chenna...
  • 1 篇 unsw adfa sch in...
  • 1 篇 univ texas arlin...
  • 1 篇 purple mt labs n...

作者

  • 2 篇 bose s.
  • 2 篇 kannan a.
  • 2 篇 awasthi amit k.
  • 2 篇 kaul sonam devga...
  • 2 篇 vijayakumar p.
  • 1 篇 wu ge
  • 1 篇 yu kunliang
  • 1 篇 deborah l. jegat...
  • 1 篇 wang xingyuan
  • 1 篇 tian biming
  • 1 篇 han song
  • 1 篇 parvin sazia
  • 1 篇 kosta bhaskarpra...
  • 1 篇 lu tianyu
  • 1 篇 subramanian s. s...
  • 1 篇 hu jiankun
  • 1 篇 das sajal
  • 1 篇 wang yu
  • 1 篇 naidu pasalasany...
  • 1 篇 chen liquan

语言

  • 7 篇 英文
检索条件"主题词=One Way Hash Function"
7 条 记 录,以下是1-10 订阅
排序:
Privacy Model for Threshold RFID System Based on PUF
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2017年 第3期95卷 2803-2828页
作者: Kaul, Sonam Devgan Awasthi, Amit K. Gautam Buddha Univ Sch Appl Sci Greater Noida 201306 India
In order to enhance shared control of the secret among multiple RFID tags and to ensure secure communication through an insecure channel, we present in this paper a new idea of threshold RFID system. We extend well-kn... 详细信息
来源: 评论
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
收藏 引用
COMPUTER JOURNAL 2011年 第4期54卷 549-569页
作者: Tian, Biming Han, Song Parvin, Sazia Hu, Jiankun Das, Sajal Curtin Univ DEBII Inst Perth WA Australia UNSW ADFA Sch Informat Technol & Engn Canberra ACT Australia Univ Texas Arlington Ctr Res Wireless Mobil & Networking Arlington TX USA
The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcas... 详细信息
来源: 评论
The design of keyed hash function based on CNN-MD structure
收藏 引用
CHAOS SOLITONS & FRACTALS 2021年 152卷
作者: Wang, Yu Chen, Liquan Wang, Xingyuan Wu, Ge Yu, Kunliang Lu, Tianyu Southeast Univ Sch Cyber Sci & Engn Nanjing 210000 Peoples R China Purple Mt Labs Network & Commun Secur Nanjing 211111 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China
In this paper, we propose a new chaotic neural network called the Merkle-Damgaard (CNN-MD) iterative structure, which we designed from the perspective of resisting attacks, such as length extension, second original im... 详细信息
来源: 评论
RFID Authentication Protocol to Enhance Patient Medication Safety
收藏 引用
JOURNAL OF MEDICAL SYSTEMS 2013年 第6期37卷 1-6页
作者: Kaul, Sonam Devgan Awasthi, Amit K. Buddha Univ Sch Vocat Studies & Appl Math Gautam Greater Noida 201312 India
Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personaliz... 详细信息
来源: 评论
A Secure Key Distribution Protocol for Multicast Communication
A Secure Key Distribution Protocol for Multicast Communicati...
收藏 引用
1st International Conference on Logic, Information, Control and Computation
作者: Vijayakumar, P. Bose, S. Kannan, A. Subramanian, S. Siva Anna Univ Dept Comp Sci & Engn Madras 25 Tamil Nadu India Anna Univ Dept Informat Sci & Technol Madras 25 Tamil Nadu India Univn Colln Engn Tindivanam Dept Math Tindivanam India
Providing efficient security method to support the distribution of multimedia multicast is a challenging issue, since the group membership in such applications requires dynamic key generation and updation which takes ... 详细信息
来源: 评论
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2013年 第4期7卷 878-894页
作者: Vijayakumar, P. Bose, S. Kannan, A. Deborah, L. Jegatha Univ Coll Engn Tindivanam Dept Comp Sci & Engn Tindivanam 604001 India Anna Univ Chennai Dept Comp Sci & Engn Madras 600025 Tamil Nadu India Anna Univ Chennai Dept Informat Sci & Technol Madras 600025 Tamil Nadu India
Secure multimedia multicast applications involve group communications where group membership requires secured dynamic key generation and updating operations. Such operations usually consume high computation time and t... 详细信息
来源: 评论
Design and Implementation of a Most Secure Cryptographic Scheme for Lightweight Environment using Elliptic Curve and Trigonohash Technique
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2021年 第6期12卷 895-912页
作者: Kosta, BhaskarPrakash Naidu, PasalaSanyasi GITAM Deemed Univ GIT Comp Sci & Engn Dept Vishakhapatnam AP India
The Internet of Things (IoT) is a rising development and is an organization of all gadgets that can be gotten to through the web. As a central advancement of the IoT, wireless sensor networks (WSN) can be used to accu... 详细信息
来源: 评论