咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 电气工程
    • 12 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 5 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 53 篇 secure hash algo...
  • 8 篇 cryptography
  • 7 篇 advanced encrypt...
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 md5
  • 2 篇 sha-3

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 49 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=Secure hash algorithm"
53 条 记 录,以下是1-10 订阅
排序:
AN EFFICIENT FAULT DETECTION SCHEME FOR THE secure hash algorithm SHA-512
AN EFFICIENT FAULT DETECTION SCHEME FOR THE SECURE HASH ALGO...
收藏 引用
International Conference on Green Energy and Conversion Systems (GECS)
作者: Kahri, Fatma Mestiri, Hassen Bouallegue, Belgacem Machhout, Mohsen Univ Monastir Fac Sci Monastir Elect & Microelect Lab Monastir Tunisia
To protect the implementation of the standard secure hash algorithm (SHA) against attacks. We have proposed a number of countermeasures. This paper present a proposed new fault detection scheme. It is based on the hyb... 详细信息
来源: 评论
Securing the edge: privacy-preserving federated learning for insider threats in IoT networks
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-49页
作者: Kamatchi, K. Uma, E. Anna Univ Coll Engn Guindy Dept Informat Sci & Technol Chennai 600025 India
Insider threats in Internet of Things (IoT) networks pose significant risks, as compromised devices can misuse their privileges to cause substantial harm. Centralized methods for insider threat detection in IoT device... 详细信息
来源: 评论
Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency
收藏 引用
Computer Systems Science & Engineering 2023年 第4期45卷 641-658页
作者: G.Uganya Radhika Baskar Department of Electronics and Communication Engineering Saveetha School of EngineeringSIMATSChennaiTamil NaduIndia
Internet of Things(IoT)is an emerging technology that moves the world in the direction of smart ***,IoT security is the complex problem due to its centralized architecture,and limited ***,blockchain technology has gre... 详细信息
来源: 评论
Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023年 第6期45卷 11993-12012页
作者: Uganya, G. Bommi, R. M. Krishnammal, P. Muthu Vijayaraj, N. Vel Tech Rangarajan Dr Sagunthal R&D Inst Sci & T Dept Elect & Commun Engn Chennai Tamil Nadu India Chennai Inst Technol Dept Elect & Commun Engn Chennai Tamil Nadu India VIT AP Univ Sch Elect Engn Amaravati Andhra Pradesh India Vel Tech Rangarajan Dr Sagunthal R&D Inst Sci & T Dept Comp Sci & Engn Chennai Tamil Nadu India
Internet of things (IoT) is a recent developing technology in the field of smart healthcare. But it is difficult to transfer the patient's health record as a centralized network. So, "blockchain technology&qu... 详细信息
来源: 评论
Image sequence encryption based on chaotic fingerprint phase mask and single-shot digital holography
收藏 引用
JOURNAL OF OPTICS-INDIA 2023年 第3期52卷 1608-1619页
作者: Li, Tianlun Zhao, Qinyu Wang, Yonghui Zhang, Haoran Liu, Shuaiqi Su, Yonggang Hebei Univ Coll Elect & Informat Engn Baoding 071000 Peoples R China
In this paper, an image sequence encryption scheme based on chaotic fingerprint phase mask and single-shot digital holography is proposed. In this proposed encryption scheme, the fingerprint serves as the secret key d... 详细信息
来源: 评论
Report on hash algorithm Performance - A Case Study of Cryptocurrency Exchanges Based on Blockchain System  5
Report on Hash Algorithm Performance - A Case Study of Crypt...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Chen, Abel C. H. Chunghwa Telecom Laboratories Information & Communications Security Laboratory Taoyuan Taiwan
The blockchain system has emerged as one of the focal points of research in recent years, particularly in applications and services such as cryptocurrencies and smart contracts. In this context, the hash value serves ... 详细信息
来源: 评论
An Encryption Scheme Using Multi-Scroll Memristive Chaotic System  23
An Encryption Scheme Using Multi-Scroll Memristive Chaotic S...
收藏 引用
2nd Asia Conference on algorithms, Computing and Machine Learning (CACML)
作者: Wu, Fan Ji'e, Musha Wang, Lidan Duan, Shukai Southwest Univ Coll Artificial Intelligence Chongqing 400715 Peoples R China
In this paper, a novel multi-scroll memristive chaotic system is designed based on Chua's system via introducing a nonlinear memristor. The dynamics of this system is analyzed based on bifurcation diagrams, Lyapun... 详细信息
来源: 评论
Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2022年 第3期14卷 238-263页
作者: Rajashree, R. Peroumal, Vijayakumar Kishore, Lalit Reddy, K. Venkata Diwakar Reddy, Srujan Jagannath, M. Vellore Inst Technol Sch Elect Engn Chennai Tamil Nadu India
Encryption and decryption is accomplished by means of software or hardware, and has been in continuous usage since the 2000s for data encryption using any communication medium. A modern authentication algorithm is int... 详细信息
来源: 评论
Reconstruction of pseudonymized patient-trajectories in Austria's stroke cohort using medical record-linkage of in-patient routine documentation to establish a nation-wide acute stroke cohort of 102,107 pseudonymized patients between 2015 and 2019
收藏 引用
EUROPEAN STROKE JOURNAL 2022年 第4期7卷 456-466页
作者: Heidinger, Martin Lang, Wilfried Boehme, Christian Knoflach, Michael Kiechl, Stefan Willeit, Peter Kleyhons, Rainer Tuerk, Silvia Austrian Fed Minist Social Affairs Hlth Care & Consumer Prot Radetzkystr 2 A-1030 Vienna Austria St Johns God Hosp Dept Neurol Vienna Austria Austrian Stroke Soc Vienna Austria Med Univ Innsbruck Dept Neurol Innsbruck Austria VASCage Res Ctr Vasc Ageing & Stroke Innsbruck Austria Univ Cambridge Dept Publ Hlth & Primary Care Cambridge England
Introduction: Administrative health data are increasingly used for disease surveillance, quality assurance and research purposes. In Austria, reporting of a standardized dataset is mandatory for each patient. Patients... 详细信息
来源: 评论
Enhancing Cloud Security: A Deep Cryptographic Analysis
Enhancing Cloud Security: A Deep Cryptographic Analysis
收藏 引用
2023 International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2023
作者: Deshpande, Ashish Govindrao Srinivasan, C. Raman, Ramakrishnan Rajarajan, S. Adhvaryu, Rachit Maharashtra Pune India Saveetha University Department of Cse Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Symbiosis Institute of Business Management Pune Maharashtra Pune India Sri Sai Ram Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Parul University Faculty of Engineering and Technology Parul Institute of Engineering and Technology Gujarat Vadodara India
Cloud computing has transformed data storage, processing, and access. However, as cloud-based services grow more popular, protecting sensitive data is crucial. Cryptographic algorithms provide strong encryption, safe ... 详细信息
来源: 评论