咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 控制科学与工程
    • 1 篇 信息与通信工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 4 篇 sha-3 algorithm
  • 2 篇 dna sequence
  • 1 篇 application spec...
  • 1 篇 data security
  • 1 篇 asip
  • 1 篇 optical, image a...
  • 1 篇 aomdv
  • 1 篇 detection
  • 1 篇 medical informat...
  • 1 篇 computer vision ...
  • 1 篇 hash value
  • 1 篇 diffie-hellman k...
  • 1 篇 image encryption
  • 1 篇 black hole attac...
  • 1 篇 medical service ...
  • 1 篇 4-dimensional hy...
  • 1 篇 international de...
  • 1 篇 isa
  • 1 篇 aodv
  • 1 篇 medical informat...

机构

  • 1 篇 zhengzhou univ l...
  • 1 篇 islamic azad uni...
  • 1 篇 north western un...
  • 1 篇 univ jiroft dept...
  • 1 篇 luoyang inst sci...
  • 1 篇 lushi chinese me...
  • 1 篇 harbin engn univ...
  • 1 篇 islamic azad uni...
  • 1 篇 henan univ sci &...

作者

  • 1 篇 dutta songita
  • 1 篇 sarkar suborna
  • 1 篇 pan shuaihao
  • 1 篇 islam tajul
  • 1 篇 mehrabani yavar ...
  • 1 篇 ji zhihang
  • 1 篇 ghasempour abolg...
  • 1 篇 hossain sazzat
  • 1 篇 han gaoyong
  • 1 篇 li mingzhen
  • 1 篇 wang yanfeng
  • 1 篇 meng weiming
  • 1 篇 ema romana rahma...
  • 1 篇 shafiabadi moham...
  • 1 篇 wang lin
  • 1 篇 wang guoyong
  • 1 篇 sun junwei
  • 1 篇 hussain md sazza...
  • 1 篇 ataie roghayeh

语言

  • 3 篇 英文
  • 1 篇 其他
检索条件"主题词=SHA-3 algorithm"
4 条 记 录,以下是1-10 订阅
排序:
Design and implementation of an ASIP for sha-3 hash algorithm
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2022年 第3-4期17卷 285-309页
作者: Mehrabani, Yavar Safaei Ataie, Roghayeh shafiabadi, Mohammad Hossein Ghasempour, Abolghasem Islamic Azad Univ Dept Comp Engn North Tehran Branch Tehran Iran Univ Jiroft Dept Elect Engn Jiroft Iran Islamic Azad Univ Dept Comp Engn Islam Shahr Branch Tehran Iran
In recent years, application specific instruction set processor (ASIP) has attracted many researchers attention. These processors resemble application specific integrated circuits (ASICs) and digital signal processors... 详细信息
来源: 评论
Detecting Black hole attack by selecting appropriate routes for authentic message passing using sha-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET  10
Detecting Black hole attack by selecting appropriate routes ...
收藏 引用
10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
作者: Hossain, Sazzat Hussain, Md Sazzad Ema, Romana Rahman Dutta, Songita Sarkar, Suborna Islam, Tajul North Western Univ Comp Sci & Engn Khulna Bangladesh
Ad hoc network is sensitive to attacks because it has temporary nature and frequently recognized insecure environment. Both Ad hoc On-demand Distance Vector (AODV) and Ad hoc On-demand Multipath Distance vector (AOMDV... 详细信息
来源: 评论
Dynamical Analysis of Memcapacitor Chaotic System and Its Image Encryption Application
收藏 引用
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS 2020年 第5期18卷 1242-1249页
作者: Sun, Junwei Han, Gaoyong Wang, Yanfeng Zhengzhou Univ Light Ind Coll Elect & Elect Engn Zhengzhou 450002 Henan Peoples R China
The prospective studies on memcapacitor models and potential applications are of importance due to its dynamical behavior. For this purpose, a memcapacitor model and a corresponding circuit model have been designed, w... 详细信息
来源: 评论
Medical image encryption algorithm based on hyper-chaotic system and DNA coding
收藏 引用
COGNITIVE COMPUTATION AND SYSTEMS 2022年 第4期4卷 378-390页
作者: Li, Mingzhen Pan, Shuaihao Meng, Weiming Wang Guoyong Ji, Zhihang Wang, Lin Henan Univ Sci & Technol Sch Informat Engn Luoyang Peoples R China Lushi Chinese Med Hosp Sanmenxia Peoples R China Harbin Engn Univ Sch Comp Harbin Peoples R China Luoyang Inst Sci & Technol Sch Comp & Informat Engn Luoyang 471023 Peoples R China
With the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informatisation. In this process, it is important to ... 详细信息
来源: 评论