咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 24 篇 期刊文献

馆藏范围

  • 52 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 32 篇 计算机科学与技术...
    • 23 篇 电气工程
    • 11 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
    • 1 篇 医学技术(可授医学...
  • 4 篇 管理学
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 52 篇 secure hash algo...
  • 7 篇 advanced encrypt...
  • 7 篇 cryptography
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 private server
  • 2 篇 elliptic curve d...

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 47 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"主题词=Secure Hash algorithm"
52 条 记 录,以下是11-20 订阅
排序:
Enhancing Cloud Security: A Deep Cryptographic Analysis
Enhancing Cloud Security: A Deep Cryptographic Analysis
收藏 引用
2023 International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2023
作者: Deshpande, Ashish Govindrao Srinivasan, C. Raman, Ramakrishnan Rajarajan, S. Adhvaryu, Rachit Maharashtra Pune India Saveetha University Department of Cse Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Symbiosis Institute of Business Management Pune Maharashtra Pune India Sri Sai Ram Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Parul University Faculty of Engineering and Technology Parul Institute of Engineering and Technology Gujarat Vadodara India
Cloud computing has transformed data storage, processing, and access. However, as cloud-based services grow more popular, protecting sensitive data is crucial. Cryptographic algorithms provide strong encryption, safe ... 详细信息
来源: 评论
Block color image encryption algorithm based on elementary cellular automata and DNA sequence operations
收藏 引用
JOURNAL OF ELECTRONIC IMAGING 2021年 第4期30卷
作者: Chong, Jing Xie, Shucui Zhang, Jianzhong Liu, Dingqin Xian Univ Posts & Telecommun Sch Cyberspace Secur Xian Peoples R China Xian Univ Posts & Telecommun Sch Sci Xian Peoples R China Shaanxi Normal Univ Coll Math & Informat Sci Xian Peoples R China Xian Univ Posts & Telecommun Sch Informat & Commun Engn Xian Peoples R China
A block color image encryption algorithm based on chaotic system, elementary cellular automata (ECA), and deoxyribonucleic acid (DNA) sequence operations is proposed. The architecture is comprised of forward-diffusion... 详细信息
来源: 评论
Forensics: Collection of Sound Digital Evidence
收藏 引用
Journal of Information Security 2023年 第4期14卷 454-463页
作者: Richard Kabanda Harihar Thapa Luis Rivera College of Engineering University of New Haven West Haven USA
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd... 详细信息
来源: 评论
An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems
收藏 引用
IEEE ACCESS 2020年 8卷 25650-25663页
作者: Samiullah, Muhammad Aslam, Waqar Nazir, Hira Lali, M. Ikramullah Shahzad, Basit Mufti, Muhammad Rafiq Afzal, Humaira Islamia Univ Bahawalpur Dept Comp Sci & Informat Technol Bahawalpur 63100 Pakistan Univ Educ Div Sci & Technol Dept Comp Sci & IT Lahore 54770 Pakistan Natl Univ Modern Language Fac Engn & Comp Sci Dept Engn Islamabad 44000 Pakistan COMSATS Univ Islamabad Vehari Dept Comp Sci Vehari 45550 Pakistan Bahauddin Zakariya Univ Dept Comp Sci Multan 60000 Pakistan
A number of techniques for securing plaintext, images and video frames have been developed in cryptography using jointly DNA computing and Chaos Theory. With the advancement of DNA/quantum computing, the threats of se... 详细信息
来源: 评论
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
收藏 引用
SENSORS 2021年 第5期21卷 1620页
作者: Kim, Kyeeun Park, Siwoong Yeo, Chanil Park, Hyoung-Jun Kim, Hyunjin Heo, Young Soon Kang, Hyun Seo Kim, Kyungsoo Elect & Telecommun Res Inst Opt ICT Convergence Sect Gwangju 34129 South Korea IMR Gwangju 61008 South Korea
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastruc... 详细信息
来源: 评论
Homogenized Chebyshev-Arnold Map and Its Application to Color Image Encryption
收藏 引用
IEEE ACCESS 2019年 7卷 114459-114471页
作者: Kang, Xuejing Luo, Xuanshu Zhang, Xuesong Jiang, Jing Beijing Univ Posts & Telecommun Sch Comp Sci Beijing 100876 Peoples R China Beijing Union Univ Dept Commun Engn Beijing 100101 Peoples R China
In this paper, we propose a homogenized Chebyshev-Arnold map (HCAM) by homogenizing the linear coupling of Chebyshev map and Arnold map. The proposed HCAM has complex dynamical behaviors and can avoid the problems of ... 详细信息
来源: 评论
A Proposed Impregnable 256-Bit hash Producer  15
A Proposed Impregnable 256-Bit Hash Producer
收藏 引用
15th International Computer Engineering Conference (ICENCO)
作者: Hussein, Omar October Univ Modern Sci & Arts MSA Fac Management Sci Dept Management Informat Syst 6Th October Egypt
This paper proposes a robust 256-bit hash producer. The underlying motivation is to overcome security-related limitations of pseudo-random number generators embedded in Linux and Windows, which render these widely use... 详细信息
来源: 评论
Open-Source Crypto IP Cores for FPGAs - Overview and Evaluation  27
Open-Source Crypto IP Cores for FPGAs - Overview and Evaluat...
收藏 引用
27th Austrochip Workshop on Microelectronics (Austrochip)
作者: Billmann, M. Werner, S. Holler, R. Praus, F. Puhm, A. Kero, N. Univ Appl Sci Technikum Wien Dept Elect Engn Hochstadtpl 6 A-1200 Vienna Austria Oregano Syst Design & Consulting GmbH Franzosengraben 8 A-1030 Vienna Austria
With the increasing number of electronic based systems being connected to the Internet via wired or wireless connections in the era of the IoT, the importance of security aspects is well recognized. At the same time g... 详细信息
来源: 评论
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations  5
A Big Data Storage Scheme Based on Distributed Storage Locat...
收藏 引用
5th IEEE Int Conf on Big Data Security on Cloud (BigDataSecurity) / 5th IEEE Int Conf on High Performance and Smart Computing (IEEE HPSC) / 4th IEEE Int Conf on Intelligent Data and Security (IEEE IDS)
作者: Al-Odat, Zeyad A. Al-Qtiemat, Eman M. Khan, Samee U. North Dakota State Univ Dept Elect & Comp Engn Fargo ND 58105 USA
This paper introduces a secured and distributed Big Data storage scheme with multiple authorizations. It divides the Big Data into small chunks and distributes them through multiple Cloud locations. The Shamir's S... 详细信息
来源: 评论
Hardware Acceleration of SHA-256 algorithm using NIOS-II Processor  8
Hardware Acceleration of SHA-256 Algorithm using NIOS-II Pro...
收藏 引用
8th International Conference on Modern Circuit and System Technologies (MOCAST)
作者: Sideris, Argirios Sanida, Theodora Dasygenis, Minas Univ Western Macedonia Dept Informat & Telecommun Engn Kozani 50131 Greece
Cryptography plays a leading role in the information transmission security. Even though encrypted, data can be altered when transmitted over a network. Therefore, to verify data the use of a digital signature is essen... 详细信息
来源: 评论