咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 3 篇 电气工程
    • 2 篇 计算机科学与技术...
    • 1 篇 石油与天然气工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 5 篇 shuffling algori...
  • 2 篇 cryptography
  • 1 篇 uniform distribu...
  • 1 篇 detection mechan...
  • 1 篇 computational co...
  • 1 篇 low power consum...
  • 1 篇 image encryption
  • 1 篇 random numbers
  • 1 篇 n-phase pseudora...
  • 1 篇 memory access co...
  • 1 篇 writing
  • 1 篇 fisher-yates alg...
  • 1 篇 system-on-chips
  • 1 篇 sdram controller
  • 1 篇 memory access pa...
  • 1 篇 quality of servi...
  • 1 篇 blackhole attack...
  • 1 篇 dram chips
  • 1 篇 sdram
  • 1 篇 security level

机构

  • 1 篇 huazhong univ sc...
  • 1 篇 huazhong univ sc...
  • 1 篇 soongsil univ sc...
  • 1 篇 southwest univ c...
  • 1 篇 technol inst phi...
  • 1 篇 nanchang univ sc...
  • 1 篇 nanchang inst te...
  • 1 篇 christ inst tech...
  • 1 篇 pondicherry engn...
  • 1 篇 west visayas sta...
  • 1 篇 christ inst tech...

作者

  • 1 篇 gerardo bobby d.
  • 1 篇 manucom emraida ...
  • 1 篇 liu lingfeng
  • 1 篇 medina ruji p.
  • 1 篇 wang lidan
  • 1 篇 hu hanping
  • 1 篇 miao suoxia
  • 1 篇 kumar c. suraj
  • 1 篇 wu fan
  • 1 篇 sandosh s.
  • 1 篇 govindasamy v.
  • 1 篇 cheng mengfan
  • 1 篇 duan shukai
  • 1 篇 ji'e musha
  • 1 篇 lee chanho

语言

  • 5 篇 英文
检索条件"主题词=Shuffling algorithm"
5 条 记 录,以下是1-10 订阅
排序:
Arbitration and shuffling algorithm for Processing Multiple Commands in SDRAM Controller
Arbitration and Shuffling Algorithm for Processing Multiple ...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Lee, Chanho Soongsil Univ Sch Elect Engn Seoul South Korea
In this paper, we propose an algorithm of arbitration and shuffling of requests for a memory controller which enables high bandwidth, low latency and low power consumption in systems with SoC network protocols that su... 详细信息
来源: 评论
KD2SA: KEY DISTRIBUTION SCHEME shuffling algorithm FOR HEIGHTENED SECURE DATA TRANSMISSION  5
KD2SA: KEY DISTRIBUTION SCHEME SHUFFLING ALGORITHM FOR HEIGH...
收藏 引用
5th IEEE International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)
作者: Govindasamy, V. Sandosh, S. Kumar, C. Suraj Pondicherry Engn Coll Dept IT Pondicherry India Christ Inst Technol Dept CSE Pondicherry India Christ Inst Technol Pondicherry India
Mobile Adhoc Network is a progressively self-adjusting nodes of mobile devices connected without any wires and non-defined infrastructure. The advent of Mobile Adhoc Network is widely applied in Personal Area Networki... 详细信息
来源: 评论
N-phase logistic chaotic sequence and its application for image encryption
收藏 引用
IET SIGNAL PROCESSING 2016年 第9期10卷 1096-1104页
作者: Liu, Lingfeng Miao, Suoxia Hu, Hanping Cheng, Mengfan Nanchang Univ Sch Software Nanchang 330031 Jiangxi Peoples R China Nanchang Inst Technol Fac Sci Nanchang 330029 Jiangxi Peoples R China Huazhong Univ Sci & Technol Sch Automat Wuhan 430074 Peoples R China Huazhong Univ Sci & Technol Sch Opt & Elect Informat Wuhan 430074 Peoples R China
In this study, the authors use a non-symmetric partition to generate N-phase pseudorandom sequences using the logistic maps. The theoretical analysis shows that this N-phase logistic sequence is with uniform distribut... 详细信息
来源: 评论
An Encryption Scheme Using Multi-Scroll Memristive Chaotic System  23
An Encryption Scheme Using Multi-Scroll Memristive Chaotic S...
收藏 引用
2nd Asia Conference on algorithms, Computing and Machine Learning (CACML)
作者: Wu, Fan Ji'e, Musha Wang, Lidan Duan, Shukai Southwest Univ Coll Artificial Intelligence Chongqing 400715 Peoples R China
In this paper, a novel multi-scroll memristive chaotic system is designed based on Chua's system via introducing a nonlinear memristor. The dynamics of this system is analyzed based on bifurcation diagrams, Lyapun... 详细信息
来源: 评论
Analysis of Key Randomness in Improved One-Time Pad Cryptography  13
Analysis of Key Randomness in Improved One-Time Pad Cryptogr...
收藏 引用
13th IEEE International Conference on Anti-Counterfeiting, Security, and Identification (ASID)
作者: Manucom, Emraida Marie M. Gerardo, Bobby D. Medina, Ruji P. Technol Inst Philippines Grad Programs Quezon City Philippines West Visayas State Univ Coll ICT Iloilo Philippines
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random a... 详细信息
来源: 评论