咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 24 篇 期刊文献

馆藏范围

  • 52 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 32 篇 计算机科学与技术...
    • 23 篇 电气工程
    • 11 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
    • 1 篇 医学技术(可授医学...
  • 4 篇 管理学
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 52 篇 secure hash algo...
  • 7 篇 advanced encrypt...
  • 7 篇 cryptography
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 private server
  • 2 篇 elliptic curve d...

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 47 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"主题词=Secure Hash algorithm"
52 条 记 录,以下是21-30 订阅
De-duplication Approach with Enhance Security for Integrity  4
De-duplication Approach with Enhance Security for Integrity
收藏 引用
4th International Conference on Computing Communication Control and Automation (ICCUBEA)
作者: Pokale, Minal Bharat Chaware, Sandeep M. MMCOE Dept Comp Engn Pune Maharashtra India
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th... 详细信息
来源: 评论
A Novel Chaos-Based Encryption Approach for Future-Generation Passive Optical Networks Using SHA-2
收藏 引用
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING 2017年 第12期9卷 1184-1190页
作者: Gill, Harsimranjit Singh Gill, Sandeep Singh Bhatia, Kamaljit Singh IKG PTU Kapurthala India GNDEC Dept Elect & Commun Engn Ludhiana Punjab India IKG PTU Elect & Commun Engn Dept Kapurthala India
A physical layer enhanced secure future generation passive optical network (PON) based on chaotic signal scrambling and the secure hash algorithm (SHA) is proposed and demonstrated. In this paper, the architecture of ... 详细信息
来源: 评论
Generalized secure hash algorithm: SHA-X
Generalized secure hash algorithm: SHA-X
收藏 引用
IEEE EUROCON-International Conference on Computer As A Tool
作者: Lin, Chu-Hsing Yeh, Yi-Shiung Chien, Shih-Pei Lee, Chen-Yu Chien, Hung-Sheng Department of Computer Science Tunghai University Taichung Taiwan
This paper defines a generalized SHA algorithm based on the SHA family rules. The proposed algorithm accepts arbitrary length message as input to generate message digest with the required length. It contains the initi... 详细信息
来源: 评论
De-duplication Approach with Enhance Security for Integrity
De-duplication Approach with Enhance Security for Integrity
收藏 引用
International Conference on Computing Communication Control and Automation
作者: Minal Bharat Pokale Sandeep M. Chaware Computer Engineering Department MMCOE Pune India
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th... 详细信息
来源: 评论
Robustness and Security Enhancement of SHA with Modified Message Digest and Larger Bit Difference
Robustness and Security Enhancement of SHA with Modified Mes...
收藏 引用
Symposium on Colossal Data Analysis and Networking (CDAN)
作者: Verma, Sandhya Prajapati, G. S. VNS Grp Inst Bhopal Dept CSE Bhopal Madhya Pradesh India
Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less time complexity as well as security of data, security is the big issue during transmiss... 详细信息
来源: 评论
LOCATION AWARE SELECTIVE UNLOCKING & secure VERIFICATION SAFER CARD FORENHANCING RFID SECURITY BY USING SHA-3.  2
LOCATION AWARE SELECTIVE UNLOCKING & SECURE VERIFICATION SAF...
收藏 引用
2nd IEEE International Conference on Advances in Computing and Communication Engineering (ICACCE)
作者: Dakhore, Sagar Lohiya, Padma DY Patil Coll Engn Dept E&TC Commun Network Pune Maharashtra India DY Patil Coll Engn Dept E&TC Pune Maharashtra India
In This Paper, we report a new approach for providing security as well as privacy to the corporate user. With the help of locations sensing mechanism by using GPS we can avoid the un-authorized reading & relay att... 详细信息
来源: 评论
Applying secure Authentication Scheme to Protect DNS from Rebinding Attack Using Proxy
Applying Secure Authentication Scheme to Protect DNS from Re...
收藏 引用
International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: Pandiaraja, P. Parasuraman, S. Arunai Engn Coll Dept Comp Sci & Engn Thiruvannamalai Tamil Nadu India
Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware requir... 详细信息
来源: 评论
Research of hash-based secure key expansion algorithm for practical QKD
收藏 引用
OPTIK 2013年 第15期124卷 2273-2276页
作者: Wang, Jian Luo, Chun-li Lin, Sheng-zhao Zhang, Hong-fei Cui, Ke Liang, Hao Jin, Ge Zhou, Lei Chen, Teng-yun Univ Sci & Technol China Dept Modern Phys Anhui Key Lab Phys Elect State Key Lab Particle Detect & Elect Hefei 230026 Anhui Peoples R China Hefei Natl Lab Phys Sci Microscale Hefei 230026 Anhui Peoples R China
The quantum key distribution (QKD) system has been developed rapidly, but its key generation rate is limited for kinds of reason such as detector efficiency and not fitted for high speed application such as video conf... 详细信息
来源: 评论
Robust symmetric cryptography using plain-text variant session key
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2015年 第1期7卷 30-40页
作者: Khan, Hari Narayan Regent Educ & Res Fdn Dept Comp Sci & Engn Kolkata 700121 W Bengal India
The secured data communication over internet is the most important concern nowadays. Our main aim is to build an apparently attack resistant encryption model. Session key may be one solution where new encryption key i... 详细信息
来源: 评论
On the Implementation of McEliece with CCA2 Indeterminacy by SHA-3
On the Implementation of McEliece with CCA2 Indeterminacy by...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Ghosh, Santosh Intel Corp Intel Labs Secur & Privacy Res Hillsboro OR 97124 USA
This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more random... 详细信息
来源: 评论