咨询与建议

限定检索结果

文献类型

  • 60 篇 期刊文献
  • 47 篇 会议

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 64 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 11 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 交通运输工程
    • 2 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 城乡规划学
  • 13 篇 理学
    • 8 篇 物理学
    • 5 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 1 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学

主题

  • 107 篇 hash algorithm
  • 10 篇 cryptography
  • 9 篇 image encryption
  • 8 篇 security
  • 6 篇 sha-3
  • 6 篇 chaos
  • 6 篇 fpga
  • 5 篇 information secu...
  • 3 篇 message digest
  • 3 篇 hardware impleme...
  • 3 篇 rfid security
  • 3 篇 convolutional ne...
  • 3 篇 tag
  • 3 篇 keccak
  • 3 篇 pipeline
  • 2 篇 satellite naviga...
  • 2 篇 global positioni...
  • 2 篇 sparser probe da...
  • 2 篇 hls
  • 2 篇 symmetric encryp...

机构

  • 4 篇 natl inst techno...
  • 2 篇 northwest normal...
  • 2 篇 hitachi ltd smar...
  • 2 篇 hitachi ltd soci...
  • 2 篇 konkuk univ dept...
  • 2 篇 hitachi ltd soci...
  • 2 篇 manipal acad hig...
  • 2 篇 tottori univ fac...
  • 2 篇 konkuk univ dept...
  • 1 篇 northeastern uni...
  • 1 篇 minnan sci & tec...
  • 1 篇 chongqing univ p...
  • 1 篇 china univ min &...
  • 1 篇 school of inform...
  • 1 篇 centrin data grp...
  • 1 篇 north china univ...
  • 1 篇 univ dehradun uc...
  • 1 篇 katholieke univ ...
  • 1 篇 coe cgc cse land...
  • 1 篇 changchun acad a...

作者

  • 6 篇 patro k. abhiman...
  • 5 篇 acharya bibhuden...
  • 2 篇 yan shaohui
  • 2 篇 kim keecheon
  • 2 篇 gu binxian
  • 2 篇 okude mariko
  • 2 篇 sakamoto toshiyu...
  • 2 篇 park sun-young
  • 2 篇 kitahara reiji
  • 2 篇 yokota takayoshi
  • 2 篇 zhang wei
  • 1 篇 liu bowen
  • 1 篇 kang joo-young
  • 1 篇 du xiaojing
  • 1 篇 mayilsamy kathir...
  • 1 篇 kralik lukas
  • 1 篇 meikandan padmap...
  • 1 篇 pun chi-man
  • 1 篇 gao zhenguo
  • 1 篇 wang lei

语言

  • 101 篇 英文
  • 4 篇 其他
  • 1 篇 俄文
  • 1 篇 中文
检索条件"主题词=hash algorithm"
107 条 记 录,以下是81-90 订阅
排序:
A new multicast-based architecture to support host mobility in IPv6  9
A new multicast-based architecture to support host mobility ...
收藏 引用
9th Asia-Pacific Conference on Communications held in conjunction with the 6th Malaysia International Conference on Communications (MICC 2003)
作者: Ali, BM Habaebi, MH Al-Talib, S Univ Putra Malaysia Fac Engn Dept Comp & Commun Syst Engn Serdang 43400 Selangor Darul Malaysia
A new multicast group join/leave mechanism for mobile nodes (MNs) is proposed. The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for ... 详细信息
来源: 评论
Shaping the Afghan Learning Settings and Power to the Learners through a High-Tech Library Management System  15
Shaping the Afghan Learning Settings and Power to the Learne...
收藏 引用
15th IEEE/ACIS International Conference on Computer and Information Science (ICIS)
作者: Gharanai, Mohammad Hanif Kobe Inst Comp Dept Informat Syst Kobe Hyogo Japan
At the present, paper-based libraries are a big challenge in Afghan educational organizations. This study proposes a high-tech library management system namely "e-Ketabtoon". It aims to improve the overall w... 详细信息
来源: 评论
An Approach to Defense Dictionary Attack with Message Digest Using Image Salt  13th
An Approach to Defense Dictionary Attack with Message Digest...
收藏 引用
13th International Conference on Ubiquitous Information Management and Communication (IMCOM)
作者: Park, Sun-young Kim, Keecheon Konkuk Univ Dept IT Convergence Informat Secur Seoul South Korea Konkuk Univ Dept Comp Sci & Engn Seoul South Korea
hash algorithms have been widely used for cryptography. It has been impossible to decrypt the ciphertexts generated through hash algorithms, as an operation that damages the original text is performed. However, variou... 详细信息
来源: 评论
Research OnSecurity Analysis of RFID Based on Multiple Readers
Research OnSecurity Analysis of RFID Based on Multiple Reade...
收藏 引用
International Conference on Sensors, Measurement and Intelligent Materials (ICSMIM 2012)
作者: Hou, Yi Ma, Linjia 7 Shisiwei Rd Shenyang Peoples R China
The specialties and limitation of RFID system and device will incur lots of security problems especially when the system contains a lot of tags and many readers, the traditional methods become helpless. Here we presen... 详细信息
来源: 评论
Survey of load balancing method based on DPDK  4
Survey of load balancing method based on DPDK
收藏 引用
4th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity) / 4th IEEE International Conference on High Performance and Smart Computing (HPSC) / 3rd IEEE International Conference on Intelligent Data and Security (IDS)
作者: Jin, Mengxiao Wang, Canshuai Li, Peng Han, Zhijie Nanjing Univ Posts & Telecommun Coll Comp Nanjing Jiangsu Peoples R China Henan Univ Inst Data & Knowledge Engn Kaifeng Henan Peoples R China
This paper introduces a tool suitable for rapid packet processing - DPDK and two frameworks for packet processing based on DPDK. Then we surveyed and analyzed a number of traditional load balancing algorithms. After t... 详细信息
来源: 评论
Research on Collision-free High-efficiency Pseudo-random Sequence Generation algorithm  11
Research on Collision-free High-efficiency Pseudo-random Seq...
收藏 引用
11th IEEE International Conference on Software Engineering and Service Science (IEEE ICSESS)
作者: Liu, Hanyue Zhang, Chunsheng Inner Mongolia Univ Nationalities Coll Comp Sci & Technol Tongliao 028043 Inner Mongolia Peoples R China
To overcome the shortcomings of the current popular conflict-free generation algorithm for pseudo-random sequences, a new conflict-free and efficient random permutation generation algorithm is presented. At the same t... 详细信息
来源: 评论
A NOVEL RESEARCH OF CONFIDENTIAL COMMUNICATION BASED ON THE ELLIPTIC CURVE AND THE COMBINED CHAOTIC MAPPING
收藏 引用
Journal of Electronics(China) 2009年 第5期26卷 706-710页
作者: Gao Chao Liang Dongying Zhou Shanxue Shenzhen Institute of Information Technology Shenzhen 518029 China Shenzhen Polytechnic Shenzhen 518055 China
This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for ... 详细信息
来源: 评论
The Analysis of File Carving Process Using Photorec and Foremost  4
The Analysis of File Carving Process Using Photorec and Fore...
收藏 引用
4th International Conference on Computer Applications and Information Processing Technology (CAIPT)
作者: Nurhayati Fikri, Nurul Syarif Hidayatullah State Islamic Univ Jakarta Dept Informat Engn Fac Sci & Technol Jl Ir H Juanda 95 Ciputat Jakarta 15412 Indonesia
Rapid development of computer is followed by development of digital storage device. One common problem of digital storage device is data loss. The problem of data loss could be solved by using file carving techniques,... 详细信息
来源: 评论
A Secure Communication Suite for Cluster-based Underwater Surveillance Networks  1
A Secure Communication Suite for Cluster-based Underwater Su...
收藏 引用
1st International Conference on Electrical Engineering and Information and Communication Technology (ICEEICT)
作者: Islam, Md. Rafiqul Azad, Saiful Morshed, Md. Monzur Amer Int Univ Bangladesh Dept Comp Sci Dhaka Bangladesh TigerHATS Dhaka Bangladesh
Surveilling the water territory of a country by installing an Underwater Surveillance Network (USN) is one of the prominent applications developed for underwater communication. The primary responsibility of a USN is t... 详细信息
来源: 评论
An Optimization Method for Encrypting CAN Messages  39
An Optimization Method for Encrypting CAN Messages
收藏 引用
39th Chinese Control Conference (CCC)
作者: Yao, Xinyu Sun, Hui Jin, Xiangdong Ding, Yifan Zhejiang Univ Coll Elect Engn Hangzhou 310027 Peoples R China Zhejiang Univ Coll Informat Sci & Elect Engn Hangzhou 310027 Peoples R China
The electric vehicles nowadays arc managed by networked controllers. Because of the advantages of fast, reliable, simple wiring, and light weight, CAN bus has become one of the most widely used field buses in the worl... 详细信息
来源: 评论