设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(179)
CNKI会议论文(3)
CNKI学位论文(5221)
CNKI期刊论文0611(5)
知网期刊论文(4531)
在“
Elsevier电子期刊
”中,
命中:
1,197
条,耗时:小于0.01 秒
在所有数据库中总计命中:
9,939
条
1.
A
cryptographic
model based on logistic map and a 3-D matrix
作者:
Manish Kumar
;
Sunil Kumar
;
Rajat Budhiraja
;
M.K. Das
;
Sanjeev Singh
;
sanjeev@south.du.ac.in
关键词:
3-D matrix
;
Shuffling engine
;
Logistic map
;
Chaos
;
Cryptography
刊名:Journal of Information Security and Applications
出版年:2017
2.
Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all
cryptographic
criteria
作者:
WeiGuo Zhang
;
a
;
b
;
zwg@xidian.edu.cn" class="auth_mail" title="E-mail the corresponding author
;
weiguozhang@vip.qq.com" class="auth_mail" title="E-mail the corresponding author
;
Enes Pasalic
c
;
enes.pasalic6@gmail.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Boolean functions
;
Nonlinearity
;
Resiliency
;
Algebraic immunity
;
Stream ciphers
刊名:Information Sciences
出版年:2017
3.
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
作者:
Tigran Avanesov
a
;
tigran.avanesov@uni.lu
;
Yannick Chevalier
b
;
ychevali@irit.fr
;
Michael Rusinowitch
c
;
rusi@loria.fr
;
Mathieu Turuani
c
;
mathieu.turuani@loria.fr
关键词:
Web services
;
Orchestration
;
Security policy
;
Separation of duty
;
Deducibility constraints
;
Cryptographic
protocols
;
Formal methods
;
Automated verification
;
Synthesis
刊名:Journal of Symbolic Computation
出版年:2017
4.
A simple yet efficient S-box method based on chaotic sine map
作者:
Akram Belazi
a
;
Ahmed A. Abd El-Latif
b
;
a.rahiem@gmail.com
关键词:
Cryptography
;
S-box
;
Chaos
;
Cryptographic
analyses
刊名:Optik - International Journal for Light and Electron Optics
出版年:2017
5.
Why current secure scan designs fail and how to fix them?
作者:
Aijiao Cui
a
;
;
Yanhui Luo
b
;
Huawei Li
c
;
Gang Qu
d
关键词:
Scan-based side-channel attacks
;
Secure scan design
;
Cryptographic
chip
;
Cipher key
刊名:Integration, the VLSI Journal
出版年:2017
6.
On the arithmetic complexity of Strassen-like matrix multiplications
作者:
Murat Cenk
a
;
mcenk@metu.edu.tr
;
M. Anwar Hasan
b
;
ahasan@uwaterloo.ca
关键词:
Fast matrix multiplication
;
Strassen-like matrix multiplication
;
Computational complexity
;
Cryptographic
computations
;
Computer algebra
刊名:Journal of Symbolic Computation
出版年:2017
7.
Corrigendum to “Characterization of polynomially complete quasigroups based on latin squares for
cryptographic
transformations” [Discrete Appl. Math. 200 (2016) 5-17]
作者:
V.A. Artamonov
a
;
artamon@mech.math.msu.su
;
S. Chakrabarti
b
;
S.K. Pal
b
刊名:Discrete Applied Mathematics
出版年:2017
8.
Lightweight and escrow-less authenticated key agreement for the internet of things
作者:
Marcos A. Simplicio Jr.
mjunior@larc.usp.br
;
Marcos V.M. Silva
mvsilva@larc.usp.br
;
Renan C.A. Alves
;
ralves@larc.usp.br
;
Tiago K.C. Shibata
tshibata@larc.usp.br
关键词:
Security
;
Authenticated key agreement
;
Sensor networks
;
Internet of things
刊名:Computer Communications
出版年:2017
9.
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
作者:
Arcangelo Castiglione
a
;
arcastiglione@unisa.it
;
Alfredo De Santis
a
;
ads@unisa.it
;
Barbara Masucci
a
;
bmasucci@unisa.it
;
Francesco Palmieri
a
;
fpalmieri@unisa.it
;
Xinyi Huang
b
;
c
;
xyhuang81@gmail.com
;
Aniello Castiglione
;
a
;
castiglione@ieee.org
;
castiglione@acm.org
关键词:
Access control
;
Key assignment
;
Dynamic updates
;
Key management
;
Cloud storage
刊名:Information Sciences
出版年:2017
10.
Privacy-friendly secure bidding for smart grid demand-response
作者:
Mohammad Shahriar Rahman
;
a
;
mohammad@kddi-research.jp" class="auth_mail" title="E-mail the corresponding author
;
md.shahriarr@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Anirban Basu
a
;
basu@kddi-research.jp" class="auth_mail" title="E-mail the corresponding author
;
Shinsaku Kiyomoto
a
;
kiyomoto@kddi-research.jp" class="auth_mail" title="E-mail the corresponding author
;
M. Z. A Bhuiyan
b
;
mbhuiyan3@fordham.edu" class="auth_mail" title="E-mail the corresponding author
关键词:
Security
;
Privacy
;
Smart grid
;
Demand response
;
Bidding
刊名:Information Sciences
出版年:2017
1
2
3
4
5
6
7
8
9
按检索点细分(1197)
题名(226)
关键词(152)
文摘(1061)
按出版年细分(1197)
2027年及以后(42)
2017年(20)
2016年(83)
2015年(13)
2014年(2)
2013年(93)
2012年(87)
2011年(78)
2010年(64)
2009年(75)
2008年(67)
2007年(93)
2006年(59)
2005年(83)
2004年(44)
2003年(41)
2002年(29)
2001年(23)
2000年(28)
2000年及以前(173)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.