咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 电气工程
    • 12 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 5 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 53 篇 secure hash algo...
  • 8 篇 cryptography
  • 7 篇 advanced encrypt...
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 md5
  • 2 篇 sha-3

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 49 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=secure hash algorithm"
53 条 记 录,以下是11-20 订阅
排序:
Concerns about hash cracking - Aftereffect on authentication procedures in applications of cyberspace
收藏 引用
IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE 2007年 第1期22卷 3-7页
作者: Wang, Shiuh-Jeng Ke, Hung-Jui Huang, Jia-Hung Chan, Chien-Lung Cent Police Univ Dept Informat Management Tao Yuan 333 Taiwan Changhua Cty Police Bur Informat Management Off Changhua 500 Taiwan Yuan Ze Univ Dept Informat Management Taoyuan 333 Taiwan
In the Crypto 2004 conference [6], one of the big news was that a fundamental technique in Cryptography - one of the hash algorithms, Message Digest 5 (MD5) had been cracked. Soon after this event, it was announced th... 详细信息
来源: 评论
The First 10 Years of Advanced Encryption
收藏 引用
IEEE SECURITY & PRIVACY 2010年 第6期8卷 72-74页
作者: Daemen, Joan Rijmen, Vincent Katholieke Univ Leuven Dept Elect Engn Louvain Belgium
On 2 October 2000, after a three-year study period in which 15 block ciphers competed, the US National Institute of Standards and Technology (NIST) announced that the block cipher Rijndael would become the Advanced En... 详细信息
来源: 评论
SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2013年 第5期17卷 1051-1059页
作者: Moh'd, Abidalrahman Aslam, Nauman Phillips, William Robertson, William Marzi, Hosein Dalhousie Univ Dept Engn Math & Internetworking Halifax NS Canada Northumbria Univ Sch Comp Engn & Informat Sci Newcastle Upon Tyne NE1 8ST Tyne & Wear England St Francis Xavier Univ Dept Informat Syst Antigonish NS B2G 1C0 Canada
Security was not considered when current wireless sensor nodes were designed. As a result, providing high level of security on current WSNs platforms is unattainable, especially against attacks based on key resolving ... 详细信息
来源: 评论
An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems
收藏 引用
IEEE ACCESS 2020年 8卷 25650-25663页
作者: Samiullah, Muhammad Aslam, Waqar Nazir, Hira Lali, M. Ikramullah Shahzad, Basit Mufti, Muhammad Rafiq Afzal, Humaira Islamia Univ Bahawalpur Dept Comp Sci & Informat Technol Bahawalpur 63100 Pakistan Univ Educ Div Sci & Technol Dept Comp Sci & IT Lahore 54770 Pakistan Natl Univ Modern Language Fac Engn & Comp Sci Dept Engn Islamabad 44000 Pakistan COMSATS Univ Islamabad Vehari Dept Comp Sci Vehari 45550 Pakistan Bahauddin Zakariya Univ Dept Comp Sci Multan 60000 Pakistan
A number of techniques for securing plaintext, images and video frames have been developed in cryptography using jointly DNA computing and Chaos Theory. With the advancement of DNA/quantum computing, the threats of se... 详细信息
来源: 评论
Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2022年 第3期14卷 238-263页
作者: Rajashree, R. Peroumal, Vijayakumar Kishore, Lalit Reddy, K. Venkata Diwakar Reddy, Srujan Jagannath, M. Vellore Inst Technol Sch Elect Engn Chennai Tamil Nadu India
Encryption and decryption is accomplished by means of software or hardware, and has been in continuous usage since the 2000s for data encryption using any communication medium. A modern authentication algorithm is int... 详细信息
来源: 评论
Image sequence encryption based on chaotic fingerprint phase mask and single-shot digital holography
收藏 引用
JOURNAL OF OPTICS-INDIA 2023年 第3期52卷 1608-1619页
作者: Li, Tianlun Zhao, Qinyu Wang, Yonghui Zhang, Haoran Liu, Shuaiqi Su, Yonggang Hebei Univ Coll Elect & Informat Engn Baoding 071000 Peoples R China
In this paper, an image sequence encryption scheme based on chaotic fingerprint phase mask and single-shot digital holography is proposed. In this proposed encryption scheme, the fingerprint serves as the secret key d... 详细信息
来源: 评论
LDPC and SHA based iris recognition for image authentication
收藏 引用
EGYPTIAN INFORMATICS JOURNAL 2012年 第3期13卷 217-224页
作者: Seetharaman, K. Ragupathy, R. Annamalai Univ Dept Comp Sci & Engn Chidambaram 608002 India
We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and secure hash algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wave... 详细信息
来源: 评论
Robust symmetric cryptography using plain-text variant session key
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2015年 第1期7卷 30-40页
作者: Khan, Hari Narayan Regent Educ & Res Fdn Dept Comp Sci & Engn Kolkata 700121 W Bengal India
The secured data communication over internet is the most important concern nowadays. Our main aim is to build an apparently attack resistant encryption model. Session key may be one solution where new encryption key i... 详细信息
来源: 评论
Reconstruction of pseudonymized patient-trajectories in Austria's stroke cohort using medical record-linkage of in-patient routine documentation to establish a nation-wide acute stroke cohort of 102,107 pseudonymized patients between 2015 and 2019
收藏 引用
EUROPEAN STROKE JOURNAL 2022年 第4期7卷 456-466页
作者: Heidinger, Martin Lang, Wilfried Boehme, Christian Knoflach, Michael Kiechl, Stefan Willeit, Peter Kleyhons, Rainer Tuerk, Silvia Austrian Fed Minist Social Affairs Hlth Care & Consumer Prot Radetzkystr 2 A-1030 Vienna Austria St Johns God Hosp Dept Neurol Vienna Austria Austrian Stroke Soc Vienna Austria Med Univ Innsbruck Dept Neurol Innsbruck Austria VASCage Res Ctr Vasc Ageing & Stroke Innsbruck Austria Univ Cambridge Dept Publ Hlth & Primary Care Cambridge England
Introduction: Administrative health data are increasingly used for disease surveillance, quality assurance and research purposes. In Austria, reporting of a standardized dataset is mandatory for each patient. Patients... 详细信息
来源: 评论
A Novel Chaos-Based Encryption Approach for Future-Generation Passive Optical Networks Using SHA-2
收藏 引用
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING 2017年 第12期9卷 1184-1190页
作者: Gill, Harsimranjit Singh Gill, Sandeep Singh Bhatia, Kamaljit Singh IKG PTU Kapurthala India GNDEC Dept Elect & Commun Engn Ludhiana Punjab India IKG PTU Elect & Commun Engn Dept Kapurthala India
A physical layer enhanced secure future generation passive optical network (PON) based on chaotic signal scrambling and the secure hash algorithm (SHA) is proposed and demonstrated. In this paper, the architecture of ... 详细信息
来源: 评论