咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 电气工程
    • 12 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
  • 11 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 天文学
    • 1 篇 地球物理学
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 特种医学
  • 5 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 2 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 53 篇 secure hash algo...
  • 8 篇 cryptography
  • 7 篇 advanced encrypt...
  • 5 篇 data encryption ...
  • 5 篇 fpga
  • 3 篇 message digest
  • 3 篇 public key crypt...
  • 3 篇 data encryption ...
  • 3 篇 security
  • 3 篇 aes
  • 3 篇 hash function
  • 2 篇 internet of thin...
  • 2 篇 rivest-shamir-ad...
  • 2 篇 third party audi...
  • 2 篇 elliptic curve c...
  • 2 篇 field programmab...
  • 2 篇 color image encr...
  • 2 篇 image encryption
  • 2 篇 md5
  • 2 篇 sha-3

机构

  • 2 篇 school of scienc...
  • 1 篇 sri krishna coll...
  • 1 篇 xian univ posts ...
  • 1 篇 shaanxi univ tec...
  • 1 篇 katholieke univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ western ont...
  • 1 篇 china natl digit...
  • 1 篇 shaanxi xiyu hig...
  • 1 篇 natl chiao tung ...
  • 1 篇 maharashtra pune
  • 1 篇 vascage res ctr ...
  • 1 篇 dy patil coll en...
  • 1 篇 department of co...
  • 1 篇 arunai engn coll...
  • 1 篇 chungbuk natl un...
  • 1 篇 gndec dept elect...
  • 1 篇 univ western mac...
  • 1 篇 computer enginee...
  • 1 篇 chennai inst tec...

作者

  • 2 篇 lee chen-yu
  • 2 篇 ragupathy r.
  • 2 篇 lin chu-hsing
  • 2 篇 xuling jin
  • 2 篇 yeh yi-shiung
  • 2 篇 seetharaman k.
  • 2 篇 jian zhang
  • 1 篇 holler r.
  • 1 篇 liang hao
  • 1 篇 kim kyeeun
  • 1 篇 chien shih-pei
  • 1 篇 lee eun-hee
  • 1 篇 chen teng-yun
  • 1 篇 kiechl stefan
  • 1 篇 wang yuliang
  • 1 篇 kim kyungsoo
  • 1 篇 li tianlun
  • 1 篇 luo chun-li
  • 1 篇 park siwoong
  • 1 篇 adhvaryu rachit

语言

  • 49 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"主题词=secure hash algorithm"
53 条 记 录,以下是41-50 订阅
排序:
LDPC and SHA Based Iris Recognition for Smart Card Security
LDPC and SHA Based Iris Recognition for Smart Card Security
收藏 引用
International Conference on Advances in Computing (ICAdC 2012)
作者: Seetharaman, K. Ragupathy, R. Annamalai Univ Dept Comp Sci & Engn Annamalainagar 608002 Tamil Nadu India
We introduce a novel way to use Low Density Parity Check (LDPC) error correction code to reduce the variability and noise in iris code, which is generated from Iris Recognition System (IRS) and secure hash algorithm (... 详细信息
来源: 评论
Robustness and Security Enhancement of SHA with Modified Message Digest and Larger Bit Difference
Robustness and Security Enhancement of SHA with Modified Mes...
收藏 引用
Symposium on Colossal Data Analysis and Networking (CDAN)
作者: Verma, Sandhya Prajapati, G. S. VNS Grp Inst Bhopal Dept CSE Bhopal Madhya Pradesh India
Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less time complexity as well as security of data, security is the big issue during transmiss... 详细信息
来源: 评论
Report on hash algorithm Performance - A Case Study of Cryptocurrency Exchanges Based on Blockchain System  5
Report on Hash Algorithm Performance - A Case Study of Crypt...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Chen, Abel C. H. Chunghwa Telecom Laboratories Information & Communications Security Laboratory Taoyuan Taiwan
The blockchain system has emerged as one of the focal points of research in recent years, particularly in applications and services such as cryptocurrencies and smart contracts. In this context, the hash value serves ... 详细信息
来源: 评论
Enhancing Cloud Security: A Deep Cryptographic Analysis
Enhancing Cloud Security: A Deep Cryptographic Analysis
收藏 引用
2023 International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2023
作者: Deshpande, Ashish Govindrao Srinivasan, C. Raman, Ramakrishnan Rajarajan, S. Adhvaryu, Rachit Maharashtra Pune India Saveetha University Department of Cse Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Symbiosis Institute of Business Management Pune Maharashtra Pune India Sri Sai Ram Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Parul University Faculty of Engineering and Technology Parul Institute of Engineering and Technology Gujarat Vadodara India
Cloud computing has transformed data storage, processing, and access. However, as cloud-based services grow more popular, protecting sensitive data is crucial. Cryptographic algorithms provide strong encryption, safe ... 详细信息
来源: 评论
Implementation and improvement of several representative encryption algorithms on TMS320C5402 DSPs
Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute ...
收藏 引用
Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications 2005年 第5期25卷 26-30+34页
作者: Wang, Mei Sha, Ai-Jun Yuan, Zhi-Feng College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China
Based on TMS320C5402 DSPs, this paper implemented and promoted four repres + entative encryption algorithms, including DES (data encryption standard) algorithm, SHA-1 (secure hash standard algorithm), MD5 (message-dig... 详细信息
来源: 评论
Block color image encryption algorithm based on elementary cellular automata and DNA sequence operations
收藏 引用
JOURNAL OF ELECTRONIC IMAGING 2021年 第4期30卷 043025-043025页
作者: Chong, Jing Xie, Shucui Zhang, Jianzhong Liu, Dingqin Xian Univ Posts & Telecommun Sch Cyberspace Secur Xian Peoples R China Xian Univ Posts & Telecommun Sch Sci Xian Peoples R China Shaanxi Normal Univ Coll Math & Informat Sci Xian Peoples R China Xian Univ Posts & Telecommun Sch Informat & Commun Engn Xian Peoples R China
A block color image encryption algorithm based on chaotic system, elementary cellular automata (ECA), and deoxyribonucleic acid (DNA) sequence operations is proposed. The architecture is comprised of forward-diffusion... 详细信息
来源: 评论
A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2024年 80卷
作者: Rahman, Mobashshirur Murmu, Anita Kumar, Piyush Moparthi, Nageswara Rao Namasudra, Suyel Natl Inst Technol Patna Dept Comp Sci & Engn Patna 800005 Bihar India Koneru Lakshmaiah Educ Fdn Dept Comp Sci & Engn Vaddeswaram 522302 Andhra Pradesh India Natl Inst Technol Agartala Dept Comp Sci & Engn Agartala Tripura India
Human biometric images are utilized for cell phone authentication, airport security, and biometric passports. To improve the biometric identification process, this should be protected from cyber attackers because it i... 详细信息
来源: 评论
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
收藏 引用
SENSORS 2021年 第5期21卷 1620-1620页
作者: Kim, Kyeeun Park, Siwoong Yeo, Chanil Park, Hyoung-Jun Kim, Hyunjin Heo, Young Soon Kang, Hyun Seo Kim, Kyungsoo Elect & Telecommun Res Inst Opt ICT Convergence Sect Gwangju 34129 South Korea IMR Gwangju 61008 South Korea
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastruc... 详细信息
来源: 评论
Forensics: Collection of Sound Digital Evidence
收藏 引用
Journal of Information Security 2023年 第4期14卷 454-463页
作者: Richard Kabanda Harihar Thapa Luis Rivera College of Engineering University of New Haven West Haven USA
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd... 详细信息
来源: 评论
Encryption System Design Based On DES And SHA-1
Encryption System Design Based On DES And SHA-1
收藏 引用
The Eleventh International Symposium on Distributed Computing and Applications to Business,Engineering and Science(DCABES2012)(第十一届分布式计算及其应用国际学术研讨会)(原名:电子商务、工程及科学领域的分布式计算和应用国际学术研讨会)
作者: Jian Zhang Xuling Jin School Of Science Beijing University Of Civil Engineering And ArchitectureBeijingChina
For modern society,The concealment and completeness of data is particularly *** solve this problem,developed a mixed DES and SHA-1 encryption system based on VC++*** system on the one hand by Triple DES and RSA algori... 详细信息
来源: 评论