咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是61-70 订阅
排序:
Concealment of iris features based on artificial noises
收藏 引用
ETRI JOURNAL 2019年 第5期41卷 599-607页
作者: Jiao, Wenming Zhang, Heng Zang, Qiyan Xu, Weiwei Zhang, Shuaiwei Zhang, Jian Li, Hongran Jiangsu Ocean Univ Lianyungang Jiangsu Peoples R China China Univ Min & Technol Xuzhou Jiangsu Peoples R China
Although iris recognition verification is considered to be the safest method of biometric verification, studies have shown that iris features may be illegally used. To protect iris features and further improve the sec... 详细信息
来源: 评论
Hybrid generative-discriminative hash tracking with spatio-temporal contextual cues
收藏 引用
NEURAL COMPUTING & APPLICATIONS 2018年 第2期29卷 389-399页
作者: Dai, Manna Cheng, Shuying He, Xiangjian Fuzhou Univ Fuzhou Fujian Peoples R China Univ Technol Sydney NSW Australia
Visual object tracking is of a great application value in video monitoring systems. Recent work on video tracking has taken into account spatial relationship between the targeted object and its background. In this pap... 详细信息
来源: 评论
Top Position Sensitive Ordinal Relation Preserving Bitwise Weight for Image Retrieval
收藏 引用
algorithmS 2020年 第1期13卷 18页
作者: Wang, Zhen Sun, Fuzhen Zhang, Longbo Wang, Lei Liu, Pingping Shandong Univ Technol Sch Comp Sci & Technol Zibo 255000 Peoples R China Jilin Univ Sch Comp Sci & Technol Changchun 130000 Peoples R China
In recent years, binary coding methods have become increasingly popular for tasks of searching approximate nearest neighbors (ANNs). High-dimensional data can be quantized into binary codes to give an efficient simila... 详细信息
来源: 评论
Fast and robust map-matching algorithm based on a global measure and dynamic programming for sparse probe data
Fast and robust map-matching algorithm based on a global mea...
收藏 引用
26th Intelligent Transport Systems (ITS) World Congress
作者: Yokota, Takayoshi Okude, Mariko Sakamoto, Toshiyuki Kitahara, Reiji Tottori Univ Fac Engn Cross Informat Res Ctr CiRC 4-101 Koyamacho Minami Tottori Tottori 6808552 Japan Hitachi Ltd Smart Syst Res Dept Res & Dev Grp 7-1-1 Omika Hitachi Ibaraki 3191292 Japan Hitachi Ltd Social Infrastruct Solut Operat Govt Intelligent Transport Syst Business Promot Ctr Social Infrastruct Solut Operat GovtKoto Ku Shinsuna Plaza 6-27Shinsuna 1 Chome Tokyo 1368632 Japan Hitachi Ltd Social Innovat Business Div Smart Soc Serv Dept Minato Ku JR Shinagawa East Bldg 2-18-1 Tokyo 1088250 Japan
The location data from positioning devices such as those utilising global navigation satellite system (GNSS) provides vital information for the probe-car systems aiming at solving road-traffic problems. In the case of... 详细信息
来源: 评论
An Approach to Defense Dictionary Attack with Message Digest Using Image Salt  13th
An Approach to Defense Dictionary Attack with Message Digest...
收藏 引用
13th International Conference on Ubiquitous Information Management and Communication (IMCOM)
作者: Park, Sun-young Kim, Keecheon Konkuk Univ Dept IT Convergence Informat Secur Seoul South Korea Konkuk Univ Dept Comp Sci & Engn Seoul South Korea
hash algorithms have been widely used for cryptography. It has been impossible to decrypt the ciphertexts generated through hash algorithms, as an operation that damages the original text is performed. However, variou... 详细信息
来源: 评论
An Optimization Method for Encrypting CAN Messages
An Optimization Method for Encrypting CAN Messages
收藏 引用
第三十九届中国控制会议
作者: Xinyu Yao Hui Sun Xiangdong Jin Yifan Ding College of Electrical Engineering Zhejiang University College of Information Science & Electronic Engineering Zhejiang University
The electric vehicles nowadays are managed by networked controllers. Because of the advantages of fast, reliable, simple wiring, and light weight, CAN bus has become one of the most widely used field buses in the worl... 详细信息
来源: 评论
A novel chaotic hash-based attribute-based encryption and decryption on cloud computing
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2018年 第1期10卷 1-19页
作者: Tamma, Lakshmi Naga Divya Ahamad, Shaik Shakeel KL Univ Dept CSE Guntur India Majmaah Univ CCIS Riyadh Saudi Arabia
Cloud computing has evolved as widely accepted and used paradigm for service providers as well as customers on internet. As users share their sensitive information on cloud, it has become the major concern of the clou... 详细信息
来源: 评论
Design of an Automatic Testing System for Camera UI Test
Design of an Automatic Testing System for Camera UI Test
收藏 引用
第三十九届中国控制会议
作者: Pengfei Ji Yiwen Qi Chi Zhang Ning Xing School of Automation Shenyang Aerospace University
In view of the current tedious camera inspection process,limited test cycle and complex test content,in order to reduce the work intensity of testers,the automatic test is designed for functional test with high repeat... 详细信息
来源: 评论
A novel chaotic encryption scheme based on image segmentation and multiple diffusion models
收藏 引用
OPTICS AND LASER TECHNOLOGY 2018年 108卷 558-573页
作者: Wang, Mingxu Wang, Xingyuan Zhang, Yingqian Gao, Zhenguo Dalian Univ Technol Sch Elect & Informat Engn Dalian 116024 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China Xiamen Univ Tan Kah Kee Coll Sch Informat Sci & Technol Zhangzhou 363105 Peoples R China
Based on image segmentation and multiple diffusion models, a novel chaotic encryption scheme is proposed in this paper. Firstly, a random key is generated to calculate the initial value and control parameter of chaoti... 详细信息
来源: 评论
An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2018年 71卷 578-593页
作者: Mayilsamy, Kathiresh Ramachandran, Neelaveni Raj, Vismitha Sunder PSG Coll Technol Dept Elect & Elect Engn Coimbatore 641004 Tamil Nadu India
An integrated approach that uses a combination of cryptography and steganography to enhance the data security in automotive applications is proposed in this paper. In this method, the data is encrypted using the modif... 详细信息
来源: 评论