咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 110 篇 工学
    • 75 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 48 篇 理学
    • 28 篇 数学
    • 14 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 11 篇 生物学
    • 6 篇 系统科学
    • 3 篇 化学
  • 22 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 6 篇 algorithm design...
  • 5 篇 hardware
  • 5 篇 training
  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 field programmab...
  • 4 篇 scheduling
  • 3 篇 prediction model...
  • 3 篇 computer archite...
  • 3 篇 logic gates
  • 3 篇 optimization
  • 3 篇 particle swarm o...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 scheduling algor...
  • 3 篇 encryption
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 15 篇 college of compu...
  • 11 篇 key laboratory f...
  • 6 篇 college of infor...
  • 6 篇 collaborative in...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 national collabo...
  • 4 篇 key laboratory o...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 key laboratory o...
  • 3 篇 college of infor...
  • 3 篇 embedded systems...

作者

  • 19 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wang junli
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 6 篇 wang yi
  • 5 篇 yi wang
  • 5 篇 junli wang
  • 5 篇 changjun jiang
  • 5 篇 chungang yan
  • 4 篇 yan chungang
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 jiang changjun
  • 4 篇 li zhiyong

语言

  • 151 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan"
152 条 记 录,以下是141-150 订阅
排序:
A unified architecture for DPA-resistant PRESENT
A unified architecture for DPA-resistant PRESENT
收藏 引用
2012 International Conference on Innovations in Information Technology, IIT 2012
作者: Zhao, Wei Wang, Yi Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformati... 详细信息
来源: 评论
Coordinated dynamic mission planning scheme for intelligent multi-agent systems
收藏 引用
Journal of Central South University 2012年 第11期19卷 3170-3179页
作者: 彭军 文孟飞 谢国祺 张晓勇 Kuo-chi LIN School of Information Science and Engineering Central South UniversityChangsha 410075China Hunan Engineering Laboratory for Advanced Control and Intelligent Automation(Central South University) Changsha 410075China Embedded Systems and Networking Laboratory Hunan Provincial Key Laboratory of Network and Information Security(Hunan University)Changsha 410075China Department of Mechanical and Aerospace Engineering University of Central FloridaOrlandoFL 32816USA
Mission planning was thoroughly studied in the areas of multiple intelligent agent systems,such as multiple unmanned air vehicles,and multiple processor ***,it still faces challenges due to the system complexity,the e... 详细信息
来源: 评论
An improved masked S-box for AES and hardware implementation
收藏 引用
Journal of Convergence Information Technology 2012年 第10期7卷 338-344页
作者: Zeng, Juanli Xu, Cheng Embedded System and Network Laboratory Hunan Province Key Lab. of Network and Information Security College of Inf. Sci. and Engineering Hunan University Changsha 410082 China
Masking in gate level is popularly used to protect AES S-box against power analysis attacks. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. ... 详细信息
来源: 评论
FPGA based optimized SHA-3 finalist in reconfigurable hardware
FPGA based optimized SHA-3 finalist in reconfigurable hardwa...
收藏 引用
2011 International Symposium on Integrated Circuits, ISIC 2011
作者: Song, Qian Wang, Yi Li, Zhican Zhou, Quan Wu, Wufei Han, Demin Xu, Wenlong Chen, Zuo Li, Renfa Embedded Systems and Networking Laboratory Hunan University Hunan Provincial Key Laboratory of Network and Information Security China
A hash function is well-defined procedure to convert large, uncertain long message into fixed small integers. Secure Hash Algorithm (SHA) is an one-way message digest algorithm which is usually used in cryptographic a... 详细信息
来源: 评论
Secret sharing based countermeasure for AES S-box
Secret sharing based countermeasure for AES S-box
收藏 引用
2011 International Symposium on Integrated Circuits, ISIC 2011
作者: Wang, Yi Yuan, Zheng Li, Zhican Li, Renfa Embedded Systems and Networking Laboratory Hunan University Hunan Provincial Key Laboratory of Network and Information Security Changsha China
Cryptographic devices are vulnerable to Differential Power Attack (DPA) in embedded systems. Masking methods are popularly used to defend against DPA by masking all intermediate data with random values. However, maski... 详细信息
来源: 评论
A unified architecture for supporting operations of AES and ECC
A unified architecture for supporting operations of AES and ...
收藏 引用
2011 4th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2011
作者: Wang, Yi Li, Renfa Embedded Systems and Networking Laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
In the recent years, embedded systems began to be used in sensitive applications such as personal digital assistants and smart cards. Due to very strict cost and power constrains, the support for cryptography provided... 详细信息
来源: 评论
FPGA based optimized SHA-3 finalist in reconfigurable hardware
FPGA based optimized SHA-3 finalist in reconfigurable hardwa...
收藏 引用
International Symposium on Integrated Circuits (ISIC)
作者: Qian Song Yi Wang Zhican Li Quan Zhou Wufei Wu Demin Han Wenlong Xu Zuo Chen Renfa Li Embedded Systems & Networking Laboratory Hunan Provincial Key Laboratory of Network and Information Security Hunan University China
A hash function is well-defined procedure to convert large, uncertain long message into fixed small integers. Secure Hash Algorithm (SHA) is an one-way message digest algorithm which is usually used in cryptographic a... 详细信息
来源: 评论
A Unified Architecture for Supporting Operations of AES and ECC
A Unified Architecture for Supporting Operations of AES and ...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
作者: Yi Wang Renfa Li Embedded Systems and Networking Laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha China
In the recent years, embedded systems began to be used in sensitive applications such as personal digital assistants and smart cards. Due to very strict cost and power constrains, the support for cryptography provided... 详细信息
来源: 评论
Secret sharing based countermeasure for AES S-box
Secret sharing based countermeasure for AES S-box
收藏 引用
International Symposium on Integrated Circuits (ISIC)
作者: Yi Wang Zheng Yuan Zhican Li Renfa Li Embedded Systems & Networking Laboratory Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha China
Cryptographic devices are vulnerable to Differential Power Attack (DPA) in embedded systems. Masking methods are popularly used to defend against DPA by masking all intermediate data with random values. However, maski... 详细信息
来源: 评论
A delay-derivative-dependent approach to robust H ∞ filter design for uncertain systems with time-varying distributed delays
收藏 引用
Journal of the Franklin Institute 2011年 第2期348卷 179-200页
作者: Jiyao An Guilin Wen Nianfei Gan Renfa Li State Key Laboratory of Advanced Design and Manufacture for Vehicle Body the Key Laboratory of Advanced Design and Simulation Techniques for Special Equipment Ministry of Education Hunan University Changsha 410082 PR China School of Computer and Communication Institute of Embedded Systems and Network Hunan University Changsha 410082 PR China
This paper focuses on the problem of robust H ∞ filter design for uncertain systems with time-varying state and distributed delays. System uncertainties are considered as norm-bounded time-varying parametric uncertai...
来源: 评论