咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 24 篇 期刊文献

馆藏范围

  • 52 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 32 篇 计算机科学与技术...
    • 23 篇 电气工程
    • 11 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
    • 1 篇 医学技术(可授医学...
  • 4 篇 管理学
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 52 篇 secure hash algo...
  • 7 篇 advanced encrypt...
  • 7 篇 cryptography
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 private server
  • 2 篇 elliptic curve d...

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 48 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=Secure Hash algorithm"
52 条 记 录,以下是41-50 订阅
排序:
Implementation of high-speed SHA-1 architecture
收藏 引用
IEICE ELECTRONICS EXPRESS 2009年 第16期6卷 1174-1179页
作者: Lee, Eun-Hee Lee, Je-Hoon Park, Il-Hwan Cho, Kyoung-Rok Chungbuk Natl Univ Chungbuk Informat Tech Ctr BK21 Cheongju 361763 South Korea Natl Secur Res Inst Taejon South Korea
This paper proposes a new SHA-1 architecture to exploit higher parallelism and to shorten the critical path for hash operations. It enhances a performance without significant area penalty. We implemented the proposed ... 详细信息
来源: 评论
Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023年 第6期45卷 11993-12012页
作者: Uganya, G. Bommi, R. M. Krishnammal, P. Muthu Vijayaraj, N. Vel Tech Rangarajan Dr Sagunthal R&D Inst Sci & T Dept Elect & Commun Engn Chennai Tamil Nadu India Chennai Inst Technol Dept Elect & Commun Engn Chennai Tamil Nadu India VIT AP Univ Sch Elect Engn Amaravati Andhra Pradesh India Vel Tech Rangarajan Dr Sagunthal R&D Inst Sci & T Dept Comp Sci & Engn Chennai Tamil Nadu India
Internet of things (IoT) is a recent developing technology in the field of smart healthcare. But it is difficult to transfer the patient's health record as a centralized network. So, "blockchain technology&qu... 详细信息
来源: 评论
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic algorithms
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2013年 第5期29卷 889-905页
作者: Lin, Chu-Hsing Lee, Chen-Yu Kavi, Krishna M. Chen, Deng-Jyi Yeh, Yi-Shiung Tunghai Univ Dept Comp Sci Taichung 407 Taiwan Natl Chiao Tung Univ Dept Comp Sci Hsinchu 300 Taiwan Univ N Texas Dept Comp Sci & Engn Denton TX 76203 USA
One-way hash functions play an important role in modem cryptography. Matusiewicz et al. proved that the message scheduling is essential for the security of SHA-256 by showing that it is possible to find collisions wit... 详细信息
来源: 评论
A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2024年 80卷
作者: Rahman, Mobashshirur Murmu, Anita Kumar, Piyush Moparthi, Nageswara Rao Namasudra, Suyel Natl Inst Technol Patna Dept Comp Sci & Engn Patna 800005 Bihar India Koneru Lakshmaiah Educ Fdn Dept Comp Sci & Engn Vaddeswaram 522302 Andhra Pradesh India Natl Inst Technol Agartala Dept Comp Sci & Engn Agartala Tripura India
Human biometric images are utilized for cell phone authentication, airport security, and biometric passports. To improve the biometric identification process, this should be protected from cyber attackers because it i... 详细信息
来源: 评论
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
收藏 引用
SENSORS 2021年 第5期21卷 1620页
作者: Kim, Kyeeun Park, Siwoong Yeo, Chanil Park, Hyoung-Jun Kim, Hyunjin Heo, Young Soon Kang, Hyun Seo Kim, Kyungsoo Elect & Telecommun Res Inst Opt ICT Convergence Sect Gwangju 34129 South Korea IMR Gwangju 61008 South Korea
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastruc... 详细信息
来源: 评论
Forensics: Collection of Sound Digital Evidence
收藏 引用
Journal of Information Security 2023年 第4期14卷 454-463页
作者: Richard Kabanda Harihar Thapa Luis Rivera College of Engineering University of New Haven West Haven USA
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd... 详细信息
来源: 评论
Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2022年 第3期14卷 238-263页
作者: Rajashree, R. Peroumal, Vijayakumar Kishore, Lalit Reddy, K. Venkata Diwakar Reddy, Srujan Jagannath, M. Vellore Inst Technol Sch Elect Engn Chennai Tamil Nadu India
Encryption and decryption is accomplished by means of software or hardware, and has been in continuous usage since the 2000s for data encryption using any communication medium. A modern authentication algorithm is int... 详细信息
来源: 评论
Robust symmetric cryptography using plain-text variant session key
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2015年 第1期7卷 30-40页
作者: Khan, Hari Narayan Regent Educ & Res Fdn Dept Comp Sci & Engn Kolkata 700121 W Bengal India
The secured data communication over internet is the most important concern nowadays. Our main aim is to build an apparently attack resistant encryption model. Session key may be one solution where new encryption key i... 详细信息
来源: 评论
Encryption System Design Based On DES And SHA-1
Encryption System Design Based On DES And SHA-1
收藏 引用
The Eleventh International Symposium on Distributed Computing and Applications to Business,Engineering and Science(DCABES2012)(第十一届分布式计算及其应用国际学术研讨会)(原名:电子商务、工程及科学领域的分布式计算和应用国际学术研讨会)
作者: Jian Zhang Xuling Jin School Of Science Beijing University Of Civil Engineering And ArchitectureBeijingChina
For modern society,The concealment and completeness of data is particularly *** solve this problem,developed a mixed DES and SHA-1 encryption system based on VC++*** system on the one hand by Triple DES and RSA algori... 详细信息
来源: 评论
Encryption System Design Based On DES And SHA-1
Encryption System Design Based On DES And SHA-1
收藏 引用
第11届分布式计算及其应用国际学术研讨会
作者: Jian Zhang Xuling Jin School Of Science Beijing University Of Civil Engineering And Architecture
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand ... 详细信息
来源: 评论