咨询与建议

限定检索结果

文献类型

  • 61 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 102 篇 工学
    • 65 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 12 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 108 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 102 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
108 条 记 录,以下是61-70 订阅
排序:
A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2022年 第1期16卷 1-24页
作者: Dash, Sachikanta Padhy, Sasmita Parija, Bodhisatwa Rojashree, T. Patro, K. Abhimanyu Kumar GIET Univ Dept Comp Sci & Engn Gunupur Odisha India VIT Bhopal Univ Bhopal India DRIEMS Cuttack Cuttack India Manipal Acad Higher Educ Manipal Inst Technol Manipal 576104 Karnataka India
Medical images such as brain MRIs, ultrasounds, and X-ray images are currently used by doctors to treat many serious diseases in most hospitals and clinics. These images play a major role in medical diagnosis. Diagnos... 详细信息
来源: 评论
Fast and robust map-matching algorithm based on a global measure and dynamic programming for sparse probe data
收藏 引用
IET INTELLIGENT TRANSPORT SYSTEMS 2019年 第11期13卷 1613-1623页
作者: Yokota, Takayoshi Okude, Mariko Sakamoto, Toshiyuki Kitahara, Reiji Tottori Univ Fac Engn Cross Informat Res Ctr CiRC 4-101 Koyamacho Minami Tottori Tottori 6808552 Japan Hitachi Ltd Smart Syst Res Dept Res & Dev Grp 7-1-1 Omika Hitachi Ibaraki 3191292 Japan Hitachi Ltd Social Infrastruct Solut Operat Govt Intelligent Transport Syst Business Promot Ctr Social Infrastruct Solut Operat GovtKoto Ku Shinsuna Plaza 6-27Shinsuna 1 Chome Tokyo 1368632 Japan Hitachi Ltd Social Innovat Business Div Smart Soc Serv Dept Minato Ku JR Shinagawa East Bldg 2-18-1 Tokyo 1088250 Japan
The location data from positioning devices such as those utilising global navigation satellite system (GNSS) provides vital information for the probe-car systems aiming at solving road-traffic problems. In the case of... 详细信息
来源: 评论
Vitality evaluation of the waterfront space in the ancient city of Suzhou
收藏 引用
Frontiers of Architectural Research 2021年 第4期10卷 729-740页
作者: Yingxiang Niu Xiaoyan Mi Zhao Wang School of Architecture Tianjin UniversityTianjin300072China School of Information Technology and Electrical Engineering The University of QueenslandBrisbaneQld4072Australia
With a history spanning thousands of years,the water system of Suzhou is an indispensable carrier of urban space and civil *** model analysis of the waterfront in the ancient city of Suzhou has significant implication... 详细信息
来源: 评论
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2013年 第5期17卷 921-932页
作者: Kim, Mooseop Lee, Deok Gyu Ryou, Jaecheol ETRI Cyber Secur Convergence Res Dept Taejon South Korea Chungnam Natl Univ Div Comp Sci & Engn Taejon South Korea
This paper presents a compact and unified hardware architecture implementing SHA-1 and SHA-256 algorithms that is suitable for the mobile trusted module (MTM), which should satisfy small area and low-power condition. ... 详细信息
来源: 评论
Concealment of iris features based on artificial noises
收藏 引用
ETRI JOURNAL 2019年 第5期41卷 599-607页
作者: Jiao, Wenming Zhang, Heng Zang, Qiyan Xu, Weiwei Zhang, Shuaiwei Zhang, Jian Li, Hongran Jiangsu Ocean Univ Lianyungang Jiangsu Peoples R China China Univ Min & Technol Xuzhou Jiangsu Peoples R China
Although iris recognition verification is considered to be the safest method of biometric verification, studies have shown that iris features may be illegally used. To protect iris features and further improve the sec... 详细信息
来源: 评论
Differential Fault Analysis on Grostl
Differential Fault Analysis on Grostl
收藏 引用
9th International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
作者: Fischer, Wieland Reuter, Christian A. Infineon Technol AG Campeon 1-12 D-85579 Neubiberg Germany Justus Liebig Univ D-35390 Giessen Germany
This paper presents a DFA on Grostl-256, a hash algorithm that imitates the main structures of AES. Although our attack is inspired by the classical fault attacks on AES these could not be adapted directly. The attack... 详细信息
来源: 评论
A Study on the Processing and Reinforcement of Message Digest Through Two-Dimensional Array Masking  32
A Study on the Processing and Reinforcement of Message Diges...
收藏 引用
32nd International Conference on Information Networking (ICOIN)
作者: Park, Sun-young Kim, Keecheon Konkuk Univ Dept IT Convergence Informat Secur Seoul South Korea Konkuk Univ Dept Comp Sci & Engn Seoul South Korea
hash algorithms have been widely used for cryptography. It has been impossible to decrypt the ciphertexts generated through hash algorithms, as an operation that damages the original text is performed. The vulnerabili... 详细信息
来源: 评论
An efficient implementation of electronic election system
An efficient implementation of electronic election system
收藏 引用
10th International Conference on Computer and Information Technology
作者: Fauzia, Naznin Dey, Tanima Bhuiyan, Inaba Rahman, Md. Saidur Bangladesh Univ Engn & Technol CSE Dhaka Bangladesh
Voting is usually recognized as one of the main characteristics of Democracy. Electronic election is a very recent idea regarding voting. Voter, once given his vote, has to rely upon the election system's honesty ... 详细信息
来源: 评论
High Throughput Pipelined Implementation of the SHA-3 Cryptoprocessor  32
High Throughput Pipelined Implementation of the SHA-3 Crypto...
收藏 引用
32nd International Conference on Microelectronics (ICM)
作者: Sideris, Argyrios Sanida, Theodora Dasygenis, Minas Univ Western Macedonia Dept Elect & Comp Engn Kozani 50131 Greece
Today, in the modern world of digital communications, sensitive information is transmitted via public networks. It is essential to ensure the privacy of their transmission with confidentiality, security and integrity ... 详细信息
来源: 评论
Create a Cloud Backup System Using SM4 algorithm and Redundancy Detection Technology  24
Create a Cloud Backup System Using SM4 Algorithm and Redunda...
收藏 引用
3rd International Conference on Frontiers of Artificial Intelligence and Machine Learning (FAIML)
作者: Zhao, Guogang Zhou, Jinyan Yin, Zelong Li, Yulong Chen, Yajun Jiao, Yang Yu, Lianjun Changchun Univ Sch Comp Sci & Technol Changchun 130022 Peoples R China Changchun Sixth Middle Sch Changchun 130031 Jilin Peoples R China Changchun Acad Agr Sci Changchun 130118 Jilin Peoples R China
Cloud backup, as a backup method that stores data in the cloud, is gradually becoming an important trend in the field of data management. In the actual application of cloud backup, data security issues and data redund... 详细信息
来源: 评论