咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是31-40 订阅
排序:
A hash Approach to Refine CNC Computation of Arc Length and Parameter of NURBS with High Efficiency and Precision
收藏 引用
INTERNATIONAL JOURNAL OF PRECISION ENGINEERING AND MANUFACTURING 2024年 第6期25卷 1243-1256页
作者: Han, Xueting Zhu, Kongfeng Wang, Xingbo Foshan Univ Dept Mechatron 33 Guangyun Rd Foshan 528000 Guangdong Peoples R China GSK CNC Equipment Co Ltd R&D 22 Guanda Rd Guangzhou 510000 Guangdong Peoples R China Guangdong Coll Appl Sci & Technol Dept Intelligent Manufacture 20 Fengle Rd Zhaoqing 526000 Guangdong Peoples R China
A hash method is proposed to compute bi-directionally the arc length and the parameter of the NURBS curve in curve interpolation. By using a hash table that adopts a doubly linked circular list and a red-black tree, t... 详细信息
来源: 评论
Changes in Federal Information Processing Standard (FIPS) 180-4, Secure hash Standard
收藏 引用
CRYPTOLOGIA 2013年 第1期37卷 69-73页
作者: Dang, Quynh NIST Comp Secur Div 773 Informat Technol Lab Gaithersburg MD 20899 USA
This article describes the changes between Federal Information Processing Standards FIPS 180-3 and FIPS 180-4. FIPS 180-4 specifies two new secure cryptographic hash algorithms: secure hashing algorithms SHA-512/224 a... 详细信息
来源: 评论
A novel chaotic hash-based attribute-based encryption and decryption on cloud computing
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2018年 第1期10卷 1-19页
作者: Tamma, Lakshmi Naga Divya Ahamad, Shaik Shakeel KL Univ Dept CSE Guntur India Majmaah Univ CCIS Riyadh Saudi Arabia
Cloud computing has evolved as widely accepted and used paradigm for service providers as well as customers on internet. As users share their sensitive information on cloud, it has become the major concern of the clou... 详细信息
来源: 评论
HTIME: A hash-Based Terminal Identification Method in Cloud Environment  12
HTIME: A Hash-Based Terminal Identification Method in Cloud ...
收藏 引用
IEEE Int Congr on Cybermat / 12th IEEE Int Conf on Cyber, Phys and Social Comp (CPSCom) / 15th IEEE Int Conf on Green Computing and Communications (GreenCom) / 12th IEEE Int Conf on Internet of Things (iThings) / 5th IEEE Int Conf on Smart Data
作者: Liu, Bowen Jiang, Xutong Song, Zhang Liu, Jiabang Dou, Wanchun Northeastern Univ Dept Software Shenyang Peoples R China Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China
In mobile computing environment, it is a key issue to ensure the security of a user when he/she visits a cloud service by his/her smart terminal. Generally speaking, the existing techniques, e.g. biometric technique, ... 详细信息
来源: 评论
Hybrid open hash tables for network processors
Hybrid open hash tables for network processors
收藏 引用
IEEE Workshop on High Performance Switching and Routing (HPSR 2005)
作者: Ye, Q Parson, D Cheng, L Lehigh Univ Dept Comp Sci & Engn Lab Networking Grp LONGLAB Bethlehem PA 18015 USA
Packet classification by analyzing the traffic header information is an essential task of network processors. To efficiently store, retrieve and update information, key-based data accessing algorithms such as hashing ... 详细信息
来源: 评论
A novel chaotic encryption scheme based on image segmentation and multiple diffusion models
收藏 引用
OPTICS AND LASER TECHNOLOGY 2018年 108卷 558-573页
作者: Wang, Mingxu Wang, Xingyuan Zhang, Yingqian Gao, Zhenguo Dalian Univ Technol Sch Elect & Informat Engn Dalian 116024 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China Xiamen Univ Tan Kah Kee Coll Sch Informat Sci & Technol Zhangzhou 363105 Peoples R China
Based on image segmentation and multiple diffusion models, a novel chaotic encryption scheme is proposed in this paper. Firstly, a random key is generated to calculate the initial value and control parameter of chaoti... 详细信息
来源: 评论
A combined chaotic cryptographic and hashing scheme
收藏 引用
PHYSICS LETTERS A 2003年 第5-6期307卷 292-298页
作者: Wong, KW City Univ Hong Kong Dept Comp Engn & Informat Technol Kowloon Hong Kong Peoples R China
Recently, we have proposed a fast chaotic cryptographic scheme based on iterating a logistic map with the look-up table updated dynamically. We found that after the whole encryption process, the final look-up table st... 详细信息
来源: 评论
Dynamical analysis of four-dimensional chaotic system and its application in image encryption
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第14期82卷 21509-21534页
作者: Yan, Shaohui Gu, Binxian Ren, Yu Sun, Xi Wang, Ertong Northwest Normal Univ Coll Phys & Elect Engn 967 Anning East Rd Lanzhou 730070 Gansu Peoples R China Gansu Intelligent Informat Technol & Applicat Eng Lanzhou 730070 Gansu Peoples R China
In this paper, a phase diagram of a four-dimensional chaotic system is established by introducing cosine function into Lorenz system. Then 0-1 test, complexity, and offset boosting, National Institute of Standards and... 详细信息
来源: 评论
Optimized data storage algorithm of IoT based on cloud computing in distributed system
收藏 引用
COMPUTER COMMUNICATIONS 2020年 157卷 124-131页
作者: Wang, Mingzhe Zhang, Qiuliang China Acad Railway Sci Beijing 100081 Peoples R China
The existing Internet of Things(IoT) uses cloud computing data access storage algorithms, that is, the hash algorithm has defects of low data processing efficiency and low fault tolerance rate. Therefore, HDFS is intr... 详细信息
来源: 评论
An efficient dual-stage pixel-diffusion based multimedia-image encryption using one-type 1D chaotic maps
收藏 引用
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES 2022年 第3期47卷 1-25页
作者: Patro, K. Abhimanyu Kumar Kumar, Maddikuntla Praveen Acharya, Bibhudendra Manipal Acad Higher Educ Manipal Inst Technol Dept Mechatron Manipal 576104 Karnataka India Natl Inst Technol Raipur Dept Elect & Commun Engn Raipur 492010 Chhattisgarh India
Multimedia is an appealing and interactive information representation using a mixture of images, text, audios, and videos. In many cases, people are using images more often than text to represent the information. This... 详细信息
来源: 评论