咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是11-20 订阅
排序:
High Performance Pipelined FPGA Implementation of the SHA-3 hash algorithm  4
High Performance Pipelined FPGA Implementation of the SHA-3 ...
收藏 引用
4th Mediterranean Conference on Embedded Computing (MECO
作者: Ioannou, Lenos Michail, Harris E. Voyiatzis, Artemios G. Cyprus Univ Technol Dept Elect Engn Comp Engn & Informat CY-3036 Lemesos Cyprus SBA Res Vienna Austria
The SHA-3 cryptographic hash algorithm is standardized in FIPS 202. We present a pipelined hardware architecture supporting all the four SHA-3 modes of operation and a high-performance implementation for FPGA devices ... 详细信息
来源: 评论
New One Way hash algorithm Using Non-Invertible Matrix
New One Way Hash algorithm Using Non-Invertible Matrix
收藏 引用
International Conference on Computer Medical Applications (ICCMA)
作者: Abutaha, Mohammed Hamamreh, Rushdi Palestine Polytech Univ Comp & Informat Technol Dept Hebron Israel
hash functions are widely used in encryption schemes and security layers of communication protocols for data integrity, digital signature and message authentication codes[18]. hash function is a well-defined procedure... 详细信息
来源: 评论
On the High-Throughput Implementation of RIPEMD-160 hash algorithm
On the High-Throughput Implementation of RIPEMD-160 Hash Alg...
收藏 引用
19th IEEE International Conference on Application-Specific Systems, Architectures and Processors
作者: Knezevic, M. Sakiyama, K. Lee, Y. K. Verbauwhede, I. Katholieke Univ Leuven ESAT COSIC Kasteelpk Arenberg 10 B-3001 Louvain Belgium Univ Calif Los Angeles Elect Engn Los Angeles CA 90095 USA
In this paper we present two new architectures of the RIPEMD-160 hash algorithm for high throughput implementations. The first architecture achieves the iteration bound of RIPEMD-160, i.e. it achieves a theoretical up... 详细信息
来源: 评论
Data Preservation by hash algorithm for matrix multiplication over venomous cloud  5
Data Preservation by hash algorithm for matrix multiplicatio...
收藏 引用
5th IEEE International Conference on Parallel, Distributed and Grid Computing (PDGC)
作者: Goel, Gaurav Tiwari, Rajeev Rishiwal, Vinay Upadhyay, Shuchi COE CGC CSE Landran Mohali India UPES CSE Dehra Dun India MJP Rohilkhand Univ Bareilly UP India Univ Dehradun UCALS Uttaranchal India
In today Scenario various organizations, business are dependent on Cloud Computing. This paper focus on security issues in cloud computing. People Stores their confidential data on cloud storage and Cloud Service is a... 详细信息
来源: 评论
hash algorithm Optimization for Long-span Digital Currency Transactions based on Multi-constraint Optimization
Hash Algorithm Optimization for Long-span Digital Currency T...
收藏 引用
作者: Jianqiang Li South China Agricultural University
Block chain technology and satellite integration to achieve wide-area security transactions has become a hot topic in the field of information security. It will face two major problems: the real-time transmission of l... 详细信息
来源: 评论
The Incremental Knowledge Acquisition Based on hash algorithm
收藏 引用
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS 2016年 第3期24卷 347-366页
作者: Zhang, Qing-Hua Yao, Long-Yang Zhang, Guan-Sheng Xin, Yu-Ke Chongqing Univ Posts & Telecommun Chongqing Key Lab Computat Intelligence Chongqing 40065 Peoples R China Chongqing Univ Posts & Telecommun Sch Sci 2 Chongwen Rd Chongqing 400065 Peoples R China Chongqing Univ Posts & Telecommun Res Ctr Intelligent Syst & Robot Chongqing 400065 Peoples R China
In this paper, a new incremental knowledge acquisition method is proposed based on rough set theory, decision tree and granular computing. In order to effectively process dynamic data, describing the data by rough set... 详细信息
来源: 评论
Information Retrieval Method of Natural Resources Data based on hash algorithm
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2023年 第3期14卷 950-955页
作者: Li, Qian Guangxi Vocat Normal Univ Coll Comp & Informat Engn Nanning 530007 Peoples R China
In order to improve the ability of searching and identifying information in natural resources data, this paper puts forward a method of searching information in natural resources data based on hash algorithm. Through ... 详细信息
来源: 评论
Application of Improved Image hash algorithm in Image Tamper Detection
Application of Improved Image Hash Algorithm in Image Tamper...
收藏 引用
作者: Deng Juan Zhou Bing Shi YiLiang Faculty of Information Engineering City CollegeWuhan University of Science and Technology
In order to study the application of improved image hashing algorithm in image tampering detection,based on compressed sensing and ring segmentation,a new image hashing technique is *** image hash algorithm based on c... 详细信息
来源: 评论
Anew compact belief rule model for fault diagnosis
收藏 引用
CONTROL ENGINEERING PRACTICE 2025年 159卷
作者: Ming, Zhichao Zhou, Zhijie Hu, Changhua Feng, Zhichao Lian, Zheng Zhang, Chunchao Rocket Force Univ Engn Dept Missile Engn Xian 710025 Shaanxi Peoples R China
Amidst growing scrutiny of "black box" models in fault diagnosis applications that demand high interpretability, rule-based models are regaining prominence due to their inherent interpretability. Belief rule... 详细信息
来源: 评论
Safeguarding confidentiality and privacy in cloud-enabled healthcare systems with spectrasafe encryption and dynamic k-anonymity algorithm
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2025年 279卷
作者: Dhinakaran, D. Kumar, N. Jagadish Ponnuviji, N. P. Kumar, B. Praveen Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T Dept Comp Sci & Engn Chennai India SRM Inst Sci & Technol Dept Data Sci & Business Syst Chennai India RMK Coll Engn & Technol Dept Comp Sci & Engn Puduvoyal India GITAM Sch Technol Dept Comp Sci & Engn Bengaluru India
Healthcare is no exception to the requirement of cutting-edge solutions for healthcare data security and privacy: novel strategies need be formulated on a regular basis given contemporary threat in order to reliable s... 详细信息
来源: 评论