咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 电气工程
    • 12 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 5 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 53 篇 secure hash algo...
  • 8 篇 cryptography
  • 7 篇 advanced encrypt...
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 md5
  • 2 篇 sha-3

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 49 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=Secure hash algorithm"
53 条 记 录,以下是31-40 订阅
排序:
Anonymous Location Aided secure Routing Protocol
Anonymous Location Aided Secure Routing Protocol
收藏 引用
International Conference on Information Communication and Embedded Systems (ICICES)
作者: Manjuladevi, V. Bharathi, R. Jennie Sri Krishna Coll Engn & Technol Dept ECE Coimbatore Tamil Nadu India
Anonymous location schemes classified into reactive routing methods and proactive routing methods and anonymous middleware methods. Reactive routing methods includes hop by hop encryption and redundant traffic analysi... 详细信息
来源: 评论
secure Cancelable Fingerprint Key Generation  6
Secure Cancelable Fingerprint Key Generation
收藏 引用
6th IEEE Power India International Conference (PIICON)
作者: Bhatega, Aditi Sharma, Kapil Delhi Technol Univ Delhi India
The strength of present day cryptosystem lies mainly in the key used for encryption. The problem to remember, protect and manage private key is a major issue in case of asymmetric ciphers. By using proven one way math... 详细信息
来源: 评论
Encryption System Design Based On DES And SHA-1
Encryption System Design Based On DES And SHA-1
收藏 引用
第11届分布式计算及其应用国际学术研讨会
作者: Jian Zhang Xuling Jin School Of Science Beijing University Of Civil Engineering And Architecture
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand ... 详细信息
来源: 评论
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic algorithms
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2013年 第5期29卷 889-905页
作者: Lin, Chu-Hsing Lee, Chen-Yu Kavi, Krishna M. Chen, Deng-Jyi Yeh, Yi-Shiung Tunghai Univ Dept Comp Sci Taichung 407 Taiwan Natl Chiao Tung Univ Dept Comp Sci Hsinchu 300 Taiwan Univ N Texas Dept Comp Sci & Engn Denton TX 76203 USA
One-way hash functions play an important role in modem cryptography. Matusiewicz et al. proved that the message scheduling is essential for the security of SHA-256 by showing that it is possible to find collisions wit... 详细信息
来源: 评论
SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2013年 第5期17卷 1051-1059页
作者: Moh'd, Abidalrahman Aslam, Nauman Phillips, William Robertson, William Marzi, Hosein Dalhousie Univ Dept Engn Math & Internetworking Halifax NS Canada Northumbria Univ Sch Comp Engn & Informat Sci Newcastle Upon Tyne NE1 8ST Tyne & Wear England St Francis Xavier Univ Dept Informat Syst Antigonish NS B2G 1C0 Canada
Security was not considered when current wireless sensor nodes were designed. As a result, providing high level of security on current WSNs platforms is unattainable, especially against attacks based on key resolving ... 详细信息
来源: 评论
LDPC and SHA Based Iris Recognition for Smart Card Security
LDPC and SHA Based Iris Recognition for Smart Card Security
收藏 引用
International Conference on Advances in Computing (ICAdC 2012)
作者: Seetharaman, K. Ragupathy, R. Annamalai Univ Dept Comp Sci & Engn Annamalainagar 608002 Tamil Nadu India
We introduce a novel way to use Low Density Parity Check (LDPC) error correction code to reduce the variability and noise in iris code, which is generated from Iris Recognition System (IRS) and secure hash algorithm (... 详细信息
来源: 评论
LDPC and SHA based iris recognition for image authentication
收藏 引用
EGYPTIAN INFORMATICS JOURNAL 2012年 第3期13卷 217-224页
作者: Seetharaman, K. Ragupathy, R. Annamalai Univ Dept Comp Sci & Engn Chidambaram 608002 India
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and secure hash algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wave... 详细信息
来源: 评论
Encryption System Design Based On DES And SHA-1
Encryption System Design Based On DES And SHA-1
收藏 引用
11th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES)
作者: Zhang, Jian Jin, Xuling Univ Civil Engn & Architecture Sch Sci Beijing Peoples R China
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand ... 详细信息
来源: 评论
Encryption System Design Based On DES And SHA-1
Encryption System Design Based On DES And SHA-1
收藏 引用
The Eleventh International Symposium on Distributed Computing and Applications to Business,Engineering and Science(DCABES2012)(第十一届分布式计算及其应用国际学术研讨会)(原名:电子商务、工程及科学领域的分布式计算和应用国际学术研讨会)
作者: Jian Zhang Xuling Jin School Of Science Beijing University Of Civil Engineering And ArchitectureBeijingChina
For modern society,The concealment and completeness of data is particularly *** solve this problem,developed a mixed DES and SHA-1 encryption system based on VC++*** system on the one hand by Triple DES and RSA algori... 详细信息
来源: 评论
Watermarking digital vector map using graph theoretic approach
收藏 引用
Annals of GIS 2012年 第2期18卷 135-146页
作者: Muttoo, Sunil Kumar Kumar, Vinay Department of Computer Science University of Delhi New Delhi India National Informatics Centre New Delhi India
Similar to any digital dataset, a digital map is also vulnerable to modification, deliberate alteration and copyright violation. A map is a visual representation of a geographical area that is digitally stored in eith... 详细信息
来源: 评论