咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是51-60 订阅
排序:
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19
收藏 引用
Computers, Materials & Continua 2020年 第9期64卷 1435-1452页
作者: Xiaorui Zhang Wenfang Zhang Wei Sun Tong Xu Sunil Kumar Jha Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow100031Poland
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical ***,the safety of digital medical imaging in remote consultati... 详细信息
来源: 评论
FSR-SPD: an efficient chaotic multi-image encryption system based on flip-shift-rotate synchronous-permutation-diffusion operation
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第19期83卷 57011-57057页
作者: Raghuvanshi, Ankita Budhia, Muskan Patro, K. Abhimanyu Kumar Acharya, Bibhudendra Natl Inst Technol Raipur Dept Elect & Commun Engn Raipur 492010 Chhattisgarh India Manipal Acad Higher Educ Manipal Inst Technol Dept Mechatron Manipal 576104 Karnataka India
Images are a crucial component in contemporary data transmission. Numerous images are transmitted daily through the open-source network. This paper presents a multi-image encryption scheme that utilises flip-shift-rot... 详细信息
来源: 评论
Reconfigurable and High-Efficiency Password Recovery algorithms Based on HRCA
收藏 引用
IEEE ACCESS 2021年 9卷 18085-18111页
作者: Li, Bin Feng, Feng Chen, Xiaojie Cao, Yan Zhengzhou Univ Sch Informat Engn Zhengzhou 450001 Peoples R China PLA Strateg Support Force Informat & Engn Univ State Key Lab Math Engn & Adv Comp Zhengzhou 450001 Peoples R China
Cryptographic algorithms are widely used in information security fields such as network protocol authentication and commercial encryption software. Password recovery based on the hash algorithm is an important means o... 详细信息
来源: 评论
Analysis and detection of errors in implementation of SHA-512 algorithms on FPGAs
收藏 引用
COMPUTER JOURNAL 2007年 第6期50卷 728-738页
作者: Ahmad, Imtiaz Das, A. Shoba Kuwait Univ Dept Comp Engn Safat 13060 Kuwait
The Secure hash algorithm SHA-512 is a dedicated cryptographic hash function widely considered for use in data integrity assurance and data origin authentication security services. Reconfigurable hardware devices such... 详细信息
来源: 评论
An efficient dual-layer cross-coupled chaotic map security-based multi-image encryption system
收藏 引用
NONLINEAR DYNAMICS 2021年 第3期104卷 2759-2805页
作者: Patro, K. Abhimanyu Kumar Acharya, Bibhudendra Natl Inst Technol Raipur Dept Elect & Commun Engn Raipur 492010 Chhattisgarh India
This paper proposes an effective image encryption method to encrypt several images in one encryption process. The proposed encryption scheme differs from the current multiple image encryption schemes because of their ... 详细信息
来源: 评论
Detection model for network access data tampering attacks with blockchain technology
收藏 引用
INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS 2024年 第4期18卷 3333-3345页
作者: Huang, Cong Nong, Liyong Nong, Yingxiong Lu, Ying Chen, Zhibin Li, Zhe China Tobacco Guangxi Ind Co LTD Nanning Guangxi Peoples R China Centrin Data Grp Co Ltd Beijing 100176 Peoples R China
This paper studies the detection model of network access data tampering attack based on blockchain technology to solve the problem of over-dependence on central server and easy data tampering in traditional network en... 详细信息
来源: 评论
An efficient two-level image encryption system using chaotic maps
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2023年 第1-2期21卷 35-69页
作者: Patro, K. Abhimanyu Kumar Acharya, Bibhudendra Manipal Inst Technol Manipal Acad Higher Educ Dept Mechatron Engn Manipal India Natl Inst Technol Raipur Dept Elect & Commun Engn Raipur 492010 Chhattisgarh India
This paper proposes an image securing technique that aims to provide two-level security on two images in terms of encryption at the same time. In this technique, both bit and pixel-level encryptions are carried out;fi... 详细信息
来源: 评论
BE-AC: reliable blockchain-based anti-counterfeiting traceability solution for pharmaceutical industry
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2024年 第6期27卷 8119-8139页
作者: Cao, Youliang Guan, Shaopeng Wang, Debao Wang, Zhenqi Shandong Technol & Business Univ Sch Informat & Elect Engn Huanghai Rd St Yantai 264003 Shandong Peoples R China
Currently, blockchain-based solutions for drug traceability encounter challenges related to counterfeit drug prevention, user identity verification, and scalability. This paper presents BE-AC, an enhanced blockchain-b... 详细信息
来源: 评论
A Mesh-Structured Scalable IPsec Processor
收藏 引用
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 2010年 第5期18卷 725-731页
作者: Wang, Mao-Yin Wu, Cheng-Wen Natl Tsing Hua Univ Lab Reliable Comp EE Hsinchu 30013 Taiwan
IP security (IPsec) protocols are widely used to protect sensitive data over the Internet. For equipment linked by high-bandwidth optical fibers, the throughput requirement usually results in the adoption of high-perf... 详细信息
来源: 评论
A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2022年 第1期16卷 1-24页
作者: Dash, Sachikanta Padhy, Sasmita Parija, Bodhisatwa Rojashree, T. Patro, K. Abhimanyu Kumar GIET Univ Dept Comp Sci & Engn Gunupur Odisha India VIT Bhopal Univ Bhopal India DRIEMS Cuttack Cuttack India Manipal Acad Higher Educ Manipal Inst Technol Manipal 576104 Karnataka India
Medical images such as brain MRIs, ultrasounds, and X-ray images are currently used by doctors to treat many serious diseases in most hospitals and clinics. These images play a major role in medical diagnosis. Diagnos... 详细信息
来源: 评论