咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 10 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 交通运输工程
    • 2 篇 软件工程
    • 2 篇 安全科学与工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 14 篇 cryptographic fu...
  • 3 篇 cryptography
  • 2 篇 blockchain
  • 1 篇 power demand
  • 1 篇 secret key memor...
  • 1 篇 consumers
  • 1 篇 communication in...
  • 1 篇 iot devices
  • 1 篇 bitvector arithm...
  • 1 篇 whirlpool hash f...
  • 1 篇 cache storage
  • 1 篇 tls
  • 1 篇 butson-hadamard ...
  • 1 篇 data security
  • 1 篇 telemedicine
  • 1 篇 data integrity
  • 1 篇 crypto-based alg...
  • 1 篇 fault diagnosis
  • 1 篇 vivado 2015
  • 1 篇 cryptography the...

机构

  • 1 篇 schoolofmathemat...
  • 1 篇 univ jordan comp...
  • 1 篇 huazhong univ sc...
  • 1 篇 balqa appl univ ...
  • 1 篇 ecole polytech f...
  • 1 篇 amrita vishwa vi...
  • 1 篇 telecom paristec...
  • 1 篇 namibia universi...
  • 1 篇 university of ca...
  • 1 篇 nist informat te...
  • 1 篇 brightsight bv d...
  • 1 篇 cmu
  • 1 篇 manav rachna int...
  • 1 篇 huazhong univ sc...
  • 1 篇 imperial coll lo...
  • 1 篇 hacettepe univ b...
  • 1 篇 indian inst tech...
  • 1 篇 univ southern de...
  • 1 篇 nasa ames mounta...
  • 1 篇 carnegie mellon ...

作者

  • 1 篇 dai weiqi
  • 1 篇 negi shweta
  • 1 篇 paul rourab
  • 1 篇 daniel adkins
  • 1 篇 karthik lakshmin...
  • 1 篇 kurt sibel
  • 1 篇 rawat megha
  • 1 篇 adrian perrig
  • 1 篇 abandah gheith
  • 1 篇 zhang kang
  • 1 篇 ion stoica
  • 1 篇 find magnus gaus...
  • 1 篇 yayla oguz
  • 1 篇 gupta neha
  • 1 篇 qiang weizhong
  • 1 篇 filieri antonio
  • 1 篇 phan quoc-sang
  • 1 篇 al-haj ali
  • 1 篇 borges mateus
  • 1 篇 pasareanu corina...

语言

  • 14 篇 英文
检索条件"主题词=cryptographic functions"
14 条 记 录,以下是1-10 订阅
排序:
Secure cryptographic functions via virtualization-based outsourced computing
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2016年 第11期28卷 3149-3163页
作者: Qiang, Weizhong Zhang, Kang Dai, Weiqi Jin, Hai Huazhong Univ Sci & Technol Sch Comp Sci & Technol Serv Comp Technol & Syst Lab Wuhan 430074 Peoples R China Huazhong Univ Sci & Technol Sch Comp Sci & Technol Cluster & Grid Comp Lab Wuhan 430074 Peoples R China
cryptographic functions, such as encryption/decryption libraries, are common and important tools for applications to enhance confidentiality of the data. However, these functions could be compromised by subtle attacks... 详细信息
来源: 评论
Partitioned security processor architecture on FPGA platform
收藏 引用
IET COMPUTERS AND DIGITAL TECHNIQUES 2018年 第5期12卷 216-226页
作者: Paul, Rourab Shukla, Sandeep Indian Inst Technol Kanpur Comp Sci Engn Dept Kanpur Uttar Pradesh India
Internet protocol security (IPSec), secure sockets layer (SSL)/transport layer security (TLS) and other security protocols necessitate high throughput hardware implementation of cryptographic functions. In recent lite... 详细信息
来源: 评论
Crypto-based algorithms for secured medical image transmission
收藏 引用
IET INFORMATION SECURITY 2015年 第6期9卷 365-373页
作者: Al-Haj, Ali Abandah, Gheith Hussein, Noor Princess Sumaya Univ Comp Engn Amman 11941 Jordan Univ Jordan Comp Engn Amman Jordan Balqa Appl Univ Comp Engn Salt Jordan
Booming telemedicine applications makes it deemed necessary to provide security services for such applications. The algorithms proposed in this field can be grouped into three classes: watermarking-based algorithms, c... 详细信息
来源: 评论
Small low-depth circuits for cryptographic applications
收藏 引用
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN functions AND SEQUENCES 2019年 第1期11卷 109-127页
作者: Boyar, Joan Find, Magnus Gausdal Peralta, Rene Univ Southern Denmark Dept Math & Comp Sci Odense Denmark NIST Informat Technol Lab Gaithersburg MD 20899 USA
We present techniques to obtain small circuits which also have low depth. The techniques apply to typical cryptographic functions, as these are often specified over the field GF(2), and they produce circuits containin... 详细信息
来源: 评论
Decentralized and Permission-Aware Blockchain for Certificate Security: An Exploratory Analysis  2
Decentralized and Permission-Aware Blockchain for Certificat...
收藏 引用
2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS)
作者: Gupta, Neha Negi, Shweta Rawat, Khyaty Rawat, Megha Manav Rachna Int Inst Res & Studies Sch Comp Applicat Faridabad Haryana India
Certificate authenticity and validity are becoming increasingly important in various fields, such as education, professional licensing, and various types of documentation. However, secure distributed systems are subje... 详细信息
来源: 评论
Near Butson-Hadamard Matrices and Nonlinear Boolean functions  1
收藏 引用
1st International Conference on Number-Theoretic Methods in Cryptology (NuTMiC)
作者: Kurt, Sibel Yayla, Oguz Hacettepe Univ Beytepe Dept Math TR-06800 Ankara Turkey
A Hadamard matrix is a square matrix with entries +/- 1 whose rows are orthogonal to each other. Hadamard matrices appear in various fields including cryptography, coding theory, combinatorics etc. This study takes an... 详细信息
来源: 评论
A Novel Authentication Framework for Hadoop
A Novel Authentication Framework for Hadoop
收藏 引用
International Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES)
作者: Rahul, P. K. Kumar, T. Gireesh Amrita Vishwa Vidyapeetham Tifac Core Cyber Secur Coimbatore Tamil Nadu India
Hadoop is an open-source file system used to process and carry Big data which is out of the reach of normal softwares to be work on. This paper analyses the data security issues in Hadoop and proposes a new authentica... 详细信息
来源: 评论
Design and Analysis of an Improved BitMessage Anti-spam Mechanism
Design and Analysis of an Improved BitMessage Anti-spam Mech...
收藏 引用
IEEE International Conference on Peer to Peer Computing (P2P)
作者: Schaub, Alexander Rossi, Dario Ecole Polytech F-91128 Palaiseau France Telecom ParisTech F-75013 Paris France
The BitMessage protocol offers privacy to its anonymous users. It is a completely decentralized messaging system, enabling users to exchange messages preventing accidental eavesdropping -a nice features in the Post-Sn... 详细信息
来源: 评论
Model-Counting Approaches for Nonlinear Numerical Constraints  1
收藏 引用
9th International NASA Formal Methods (NFM) Symposium
作者: Borges, Mateus Phan, Quoc-Sang Filieri, Antonio Pasareanu, Corina S. Imperial Coll London London England Carnegie Mellon Univ Silicon Valley Mountain View CA USA NASA Ames Mountain View CA USA
Model counting is of central importance in quantitative reasoning about systems. Examples include computing the probability that a system successfully accomplishes its task without errors, and measuring the number of ... 详细信息
来源: 评论
Enhancing Blockchain Layer in Smart Grid Edge IoT Devices to Improve Data Security  4
Enhancing Blockchain Layer in Smart Grid Edge IoT Devices to...
收藏 引用
4th International Conference on Emerging Trends in Networks and Computer Communications, ETNCC 2024
作者: Iindombo, Sakaria Chitauro, Mecy Namibia University of Science and Technology Department of Cyber Security Windhoek Namibia
With the proliferation of Internet of Things (IoT) devices in smart grid edge computing environments, ensuring robust data security has become paramount. This research explores an enhanced blockchain layer to strength... 详细信息
来源: 评论