咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 24 篇 期刊文献

馆藏范围

  • 52 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 32 篇 计算机科学与技术...
    • 23 篇 电气工程
    • 11 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
    • 1 篇 医学技术(可授医学...
  • 4 篇 管理学
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 52 篇 secure hash algo...
  • 7 篇 advanced encrypt...
  • 7 篇 cryptography
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 private server
  • 2 篇 elliptic curve d...

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 48 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=secure hash algorithm"
52 条 记 录,以下是21-30 订阅
排序:
A Flexible Hardware Implementation of SHA-1 and SHA-2 hash Functions
A Flexible Hardware Implementation of SHA-1 and SHA-2 Hash F...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Docherty, James Koelmans, Albert Newcastle Univ Sch Elect Elect & Comp Engn Newcastle Upon Tyne NE1 7RU Tyne & Wear England
This paper summarizes the design of a reprogrammable Application Specific Integrated Circuit capable of performing all members of the secure hash algorithm (SHA) group of hash Functions. The need for high-speed crypto... 详细信息
来源: 评论
Anonymous Location Aided secure Routing Protocol
Anonymous Location Aided Secure Routing Protocol
收藏 引用
International Conference on Information Communication and Embedded Systems (ICICES)
作者: Manjuladevi, V. Bharathi, R. Jennie Sri Krishna Coll Engn & Technol Dept ECE Coimbatore Tamil Nadu India
Anonymous location schemes classified into reactive routing methods and proactive routing methods and anonymous middleware methods. Reactive routing methods includes hop by hop encryption and redundant traffic analysi... 详细信息
来源: 评论
On the Implementation of McEliece with CCA2 Indeterminacy by SHA-3
On the Implementation of McEliece with CCA2 Indeterminacy by...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Ghosh, Santosh Intel Corp Intel Labs Secur & Privacy Res Hillsboro OR 97124 USA
This paper deals with the design and implementation of the post-quantum public-key algorithm McEliece. Seamless incorporation of a new error generator and new SHA-3 module provides higher indeterminacy and more random... 详细信息
来源: 评论
Ultra High Throughput Implementations for MD5 hash algorithm on FPGA
Ultra High Throughput Implementations for MD5 Hash Algorithm...
收藏 引用
2nd International Conference on High Performance Computing and Applications
作者: Wang, Yuliang Zhao, Qiuxia Jiang, Liehui Shao, Yi China Natl Digital Switching Syst Engn & Technol Zhengzhou 450002 Peoples R China
This paper first presents a new architecture of MD5, which achieved the theoretical upper bound on throughput in the iterative architecture. And then based on the general proposed architecture, this paper implemented ... 详细信息
来源: 评论
LOCATION AWARE SELECTIVE UNLOCKING & secure VERIFICATION SAFER CARD FORENHANCING RFID SECURITY BY USING SHA-3.  2
LOCATION AWARE SELECTIVE UNLOCKING & SECURE VERIFICATION SAF...
收藏 引用
2nd IEEE International Conference on Advances in Computing and Communication Engineering (ICACCE)
作者: Dakhore, Sagar Lohiya, Padma DY Patil Coll Engn Dept E&TC Commun Network Pune Maharashtra India DY Patil Coll Engn Dept E&TC Pune Maharashtra India
In This Paper, we report a new approach for providing security as well as privacy to the corporate user. With the help of locations sensing mechanism by using GPS we can avoid the un-authorized reading & relay att... 详细信息
来源: 评论
Hardware Acceleration of SHA-256 algorithm using NIOS-II Processor  8
Hardware Acceleration of SHA-256 Algorithm using NIOS-II Pro...
收藏 引用
8th International Conference on Modern Circuit and System Technologies (MOCAST)
作者: Sideris, Argirios Sanida, Theodora Dasygenis, Minas Univ Western Macedonia Dept Informat & Telecommun Engn Kozani 50131 Greece
Cryptography plays a leading role in the information transmission security. Even though encrypted, data can be altered when transmitted over a network. Therefore, to verify data the use of a digital signature is essen... 详细信息
来源: 评论
De-duplication Approach with Enhance Security for Integrity  4
De-duplication Approach with Enhance Security for Integrity
收藏 引用
4th International Conference on Computing Communication Control and Automation (ICCUBEA)
作者: Pokale, Minal Bharat Chaware, Sandeep M. MMCOE Dept Comp Engn Pune Maharashtra India
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th... 详细信息
来源: 评论
Some methods for blindfolded record linkage
收藏 引用
BMC Medical Informatics and Decision Making 2004年 第1期4卷 1-17页
作者: Churches, Tim Christen, Peter Centre for Epidemiology and Research Population Health Division New South Wales Department of Health North Sydney NSW 2059 Locked Mail Bag 961 Australia Department of Computer Science Australian National University Canberra ACT 0200 Australia
Background: The linkage of records which refer to the same entity in separate data collections is a common requirement in public health and biomedical research. Traditionally, record linkage techniques have required t... 详细信息
来源: 评论
Applying secure Authentication Scheme to Protect DNS from Rebinding Attack Using Proxy
Applying Secure Authentication Scheme to Protect DNS from Re...
收藏 引用
International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: Pandiaraja, P. Parasuraman, S. Arunai Engn Coll Dept Comp Sci & Engn Thiruvannamalai Tamil Nadu India
Internet is critical to both the economy and society in today's world. Domain Name System (DNS) is a key building block of the internet and the DNS hides all technical infrastructures, software and hardware requir... 详细信息
来源: 评论
LDPC and SHA Based Iris Recognition for Smart Card Security
LDPC and SHA Based Iris Recognition for Smart Card Security
收藏 引用
International Conference on Advances in Computing (ICAdC 2012)
作者: Seetharaman, K. Ragupathy, R. Annamalai Univ Dept Comp Sci & Engn Annamalainagar 608002 Tamil Nadu India
We introduce a novel way to use Low Density Parity Check (LDPC) error correction code to reduce the variability and noise in iris code, which is generated from Iris Recognition System (IRS) and secure hash algorithm (... 详细信息
来源: 评论