咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 电气工程
    • 12 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 5 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 53 篇 secure hash algo...
  • 8 篇 cryptography
  • 7 篇 advanced encrypt...
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 md5
  • 2 篇 sha-3

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 49 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=secure hash algorithm"
53 条 记 录,以下是21-30 订阅
排序:
A NEW NANOELECTRONIC BASED APPROACH FOR EFFICIENT VLSI REALIZATION OF SHA-512 algorithm
A NEW NANOELECTRONIC BASED APPROACH FOR EFFICIENT VLSI REALI...
收藏 引用
International IEEE Conference Devoted to the 150-Anniversary of Alexander S Popov
作者: Shahmoradi, Abbas Masoumi, Massoud Semnan Univ ECE Dept Semnan Iran KN Toosi Univ Tech ECE Dept Tehran Iran
This paper describes a preliminary performance evaluation of the implementation of secure hash algorithm (SHA-512) building blocks on a cell-FPGA-like hybrid CMOS/nanodevice architecture. Such circuits will combine a ... 详细信息
来源: 评论
De-duplication Approach with Enhance Security for Integrity  4
De-duplication Approach with Enhance Security for Integrity
收藏 引用
4th International Conference on Computing Communication Control and Automation (ICCUBEA)
作者: Pokale, Minal Bharat Chaware, Sandeep M. MMCOE Dept Comp Engn Pune Maharashtra India
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th... 详细信息
来源: 评论
Research of Spam Filtering System Based on LSA and SHA
收藏 引用
5th International Symposium on Neural Networks
作者: Sun, Jingtao Zhang, Qiuyu Yuan, Zhanting Huang, Wenhan Yan, Xiaowen Dong, Jianshe Lanzhou Univ Technol Coll Elect & Informat Engn Lanzhou 730050 Peoples R China Lanzhou Univ Technol Coll Comp & Commun Lanzhou 730050 Peoples R China Shaanxi Univ Technol Dept Comp Sci & Technol Hanzhong 723003 Peoples R China Shaanxi Xiyu Highway Corp Ltd Shaanxi 715400 Peoples R China
Along with the widespread concern of spam problem, at present, there are spam filtering system nowadays about the problem of semantic imperfection and spam filter low effect in the multi-send spam. This paper proposes... 详细信息
来源: 评论
A Proposed Impregnable 256-Bit hash Producer  15
A Proposed Impregnable 256-Bit Hash Producer
收藏 引用
15th International Computer Engineering Conference (ICENCO)
作者: Hussein, Omar October Univ Modern Sci & Arts MSA Fac Management Sci Dept Management Informat Syst 6Th October Egypt
This paper proposes a robust 256-bit hash producer. The underlying motivation is to overcome security-related limitations of pseudo-random number generators embedded in Linux and Windows, which render these widely use... 详细信息
来源: 评论
An Encryption Scheme Using Multi-Scroll Memristive Chaotic System  23
An Encryption Scheme Using Multi-Scroll Memristive Chaotic S...
收藏 引用
2nd Asia Conference on algorithms, Computing and Machine Learning (CACML)
作者: Wu, Fan Ji'e, Musha Wang, Lidan Duan, Shukai Southwest Univ Coll Artificial Intelligence Chongqing 400715 Peoples R China
In this paper, a novel multi-scroll memristive chaotic system is designed based on Chua's system via introducing a nonlinear memristor. The dynamics of this system is analyzed based on bifurcation diagrams, Lyapun... 详细信息
来源: 评论
A Flexible Hardware Implementation of SHA-1 and SHA-2 hash Functions
A Flexible Hardware Implementation of SHA-1 and SHA-2 Hash F...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Docherty, James Koelmans, Albert Newcastle Univ Sch Elect Elect & Comp Engn Newcastle Upon Tyne NE1 7RU Tyne & Wear England
This paper summarizes the design of a reprogrammable Application Specific Integrated Circuit capable of performing all members of the secure hash algorithm (SHA) group of hash Functions. The need for high-speed crypto... 详细信息
来源: 评论
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations  5
A Big Data Storage Scheme Based on Distributed Storage Locat...
收藏 引用
5th IEEE Int Conf on Big Data Security on Cloud (BigDataSecurity) / 5th IEEE Int Conf on High Performance and Smart Computing (IEEE HPSC) / 4th IEEE Int Conf on Intelligent Data and Security (IEEE IDS)
作者: Al-Odat, Zeyad A. Al-Qtiemat, Eman M. Khan, Samee U. North Dakota State Univ Dept Elect & Comp Engn Fargo ND 58105 USA
This paper introduces a secured and distributed Big Data storage scheme with multiple authorizations. It divides the Big Data into small chunks and distributes them through multiple Cloud locations. The Shamir's S... 详细信息
来源: 评论
Watermarking digital vector map using graph theoretic approach
收藏 引用
Annals of GIS 2012年 第2期18卷 135-146页
作者: Muttoo, Sunil Kumar Kumar, Vinay Department of Computer Science University of Delhi New Delhi India National Informatics Centre New Delhi India
Similar to any digital dataset, a digital map is also vulnerable to modification, deliberate alteration and copyright violation. A map is a visual representation of a geographical area that is digitally stored in eith... 详细信息
来源: 评论
Open-Source Crypto IP Cores for FPGAs - Overview and Evaluation  27
Open-Source Crypto IP Cores for FPGAs - Overview and Evaluat...
收藏 引用
27th Austrochip Workshop on Microelectronics (Austrochip)
作者: Billmann, M. Werner, S. Holler, R. Praus, F. Puhm, A. Kero, N. Univ Appl Sci Technikum Wien Dept Elect Engn Hochstadtpl 6 A-1200 Vienna Austria Oregano Syst Design & Consulting GmbH Franzosengraben 8 A-1030 Vienna Austria
With the increasing number of electronic based systems being connected to the Internet via wired or wireless connections in the era of the IoT, the importance of security aspects is well recognized. At the same time g... 详细信息
来源: 评论
Anonymous Location Aided secure Routing Protocol
Anonymous Location Aided Secure Routing Protocol
收藏 引用
International Conference on Information Communication and Embedded Systems (ICICES)
作者: Manjuladevi, V. Bharathi, R. Jennie Sri Krishna Coll Engn & Technol Dept ECE Coimbatore Tamil Nadu India
Anonymous location schemes classified into reactive routing methods and proactive routing methods and anonymous middleware methods. Reactive routing methods includes hop by hop encryption and redundant traffic analysi... 详细信息
来源: 评论