咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是71-80 订阅
排序:
A Study on the Processing and Reinforcement of Message Digest Through Two-Dimensional Array Masking  32
A Study on the Processing and Reinforcement of Message Diges...
收藏 引用
32nd International Conference on Information Networking (ICOIN)
作者: Park, Sun-young Kim, Keecheon Konkuk Univ Dept IT Convergence Informat Secur Seoul South Korea Konkuk Univ Dept Comp Sci & Engn Seoul South Korea
hash algorithms have been widely used for cryptography. It has been impossible to decrypt the ciphertexts generated through hash algorithms, as an operation that damages the original text is performed. The vulnerabili... 详细信息
来源: 评论
Using the SHA-3 to Derive Encryption Keys Based on Key-file  2
Using the SHA-3 to Derive Encryption Keys Based on Key-file
收藏 引用
2nd European Conference on Electrical Engineering and Computer Science (EECS)
作者: Zacek, Petr Jasek, Roman Malanik, David Kralik, Lukas Holbikova, Petra Tomas Bata Univ Zlin Zlin Czech Republic
This paper is about a proposal of the algorithm to derive encryption keys based on key-files using the hash algorithm SHA-3. For our upcoming design of block cipher with special key length, which is 111 bytes, we are ... 详细信息
来源: 评论
Survey of load balancing method based on DPDK  4
Survey of load balancing method based on DPDK
收藏 引用
4th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity) / 4th IEEE International Conference on High Performance and Smart Computing (HPSC) / 3rd IEEE International Conference on Intelligent Data and Security (IDS)
作者: Jin, Mengxiao Wang, Canshuai Li, Peng Han, Zhijie Nanjing Univ Posts & Telecommun Coll Comp Nanjing Jiangsu Peoples R China Henan Univ Inst Data & Knowledge Engn Kaifeng Henan Peoples R China
This paper introduces a tool suitable for rapid packet processing - DPDK and two frameworks for packet processing based on DPDK. Then we surveyed and analyzed a number of traditional load balancing algorithms. After t... 详细信息
来源: 评论
A New algorithm To Secure Image Steganographic File  7
A New Algorithm To Secure Image Steganographic File
收藏 引用
7th International Conference on Cloud Computing, Data Science and Engineering (Confluence)
作者: Sharma, Alok Sharma, Nidhi Kumar, Ankit Baba Mast Nath Univ Dept CSE Rohtak Haryana India TIT&S Dept CSE Bhiwani India
In this digital world, steganography is intended to protect information from intruder, attacker and unwanted parties. Steganography is an excellent means by which security can be accomplished in transferring data over... 详细信息
来源: 评论
High Level Synthesis Using Vivado HLS for Optimizations of SHA-3  60
High Level Synthesis Using Vivado HLS for Optimizations of S...
收藏 引用
60th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Jacinto, H. S. Daoud, Luka Rafla, Nader Boise State Univ Elect & Comp Engn Boise ID 83725 USA
hash functions represent a fundamental building block of many network security protocols. The SHA-3 hashing algorithm is the most recently developed hash function, and the most secure. Implementation of the SHA-3 hash... 详细信息
来源: 评论
The Analysis of File Carving Process Using Photorec and Foremost  4
The Analysis of File Carving Process Using Photorec and Fore...
收藏 引用
4th International Conference on Computer Applications and Information Processing Technology (CAIPT)
作者: Nurhayati Fikri, Nurul Syarif Hidayatullah State Islamic Univ Jakarta Dept Informat Engn Fac Sci & Technol Jl Ir H Juanda 95 Ciputat Jakarta 15412 Indonesia
Rapid development of computer is followed by development of digital storage device. One common problem of digital storage device is data loss. The problem of data loss could be solved by using file carving techniques,... 详细信息
来源: 评论
Implementation of Security features in MANETs using SHA-3 Standard algorithm  1
Implementation of Security features in MANETs using SHA-3 St...
收藏 引用
1st IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS)
作者: Dilli, Ravilla Reddy, Putta Chandra Sekhar Manipal Inst Technol ECE Dept Manipal Karnataka India JNTUH Hyderabad Andhra Pradesh India
In Secure hash algorithm-3 standards, the functions are based on instance of the KECCAK algorithm. In this paper, we have implemented Secured hash algorithm (SHA3-256) for secured routing in hybrid routing technique o... 详细信息
来源: 评论
Shaping the Afghan Learning Settings and Power to the Learners through a High-Tech Library Management System  15
Shaping the Afghan Learning Settings and Power to the Learne...
收藏 引用
15th IEEE/ACIS International Conference on Computer and Information Science (ICIS)
作者: Gharanai, Mohammad Hanif Kobe Inst Comp Dept Informat Syst Kobe Hyogo Japan
At the present, paper-based libraries are a big challenge in Afghan educational organizations. This study proposes a high-tech library management system namely "e-Ketabtoon". It aims to improve the overall w... 详细信息
来源: 评论
High Level Synthesis Using Vivado HLS for Optimizations of SHA-3
High Level Synthesis Using Vivado HLS for Optimizations of S...
收藏 引用
IEEE Pulsed Power Conference
作者: H. S. Jacinto Luka Daoud Nader Rafla Electrical and Computer Engineering Boise State University
hash functions represent a fundamental building block of many network security protocols. The SHA-3 hashing algorithm is the most recently developed hash function, and the most secure. Implementation of the SHA-3 hash... 详细信息
来源: 评论
A Novel Forgery Detection Mechanism for Sensitive Data
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第8期10卷 39-48页
作者: Dhawan, Vikas Gaba, Gurjot Singh Lovely Profess Univ Discipline Elect & Commun Engn Jalandhar 144411 India
There are some applications of military and e-commerce networks, where security of transmitted data on unfriendly environment requires more concern as compared to other design issues like power and energy consumption.... 详细信息
来源: 评论