设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
CNKI学位论文(14)
知网期刊论文(2)
在“
SpringerLink电子期刊
”中,
命中:
17
条,耗时:0.0209743 秒
在所有数据库中总计命中:
16
条
1.
Ownership-guaranteed security framework for the private data in the entrusted management environment
作者:
SeongMin Yoo
;
Jinsul Kim
;
JaeHyung Park
;
Jiseung Nam
;
JaeCheol
Ryou
关键词:
Security framework
;
Cloud computing
;
Information security
;
Key management
刊名:Cluster Computing
出版年:2015
2.
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
作者:
Mooseop Kim (1)
Deok Gyu Lee (1)
Jaecheol
Ryou
(2)
关键词:
Trusted computing
;
Cryptosystem
;
Mobile trusted module
;
HASH algorithm
;
Low
;
power system
刊名:Personal and Ubiquitous Computing
出版年:2013
3.
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
作者:
Mooseop Kim
;
Jaecheol
Ryou
;
Sungik Jun
刊名:Lecture Notes in Computer Science
出版年:2009
4.
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
作者:
Mooseop Kim
;
Jaecheol
Ryou
;
Sungik Jun
刊名:Lecture Notes in Computer Science
出版年:2009
5.
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
作者:
Mooseop Kim
;
Jaecheol
Ryou
刊名:Lecture Notes in Computer Science
出版年:2008
6.
What Are Possible Security Threats in Ubiquitous Sensor Network Environment?
作者:
Marie Kim
;
YoungJun Lee
;
Jaecheol
Ryou
关键词:
USN
;
middleware
;
security threat
刊名:Lecture Notes in Computer Science
出版年:2007
7.
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing
作者:
Mooseop Kim
;
Youngse Kim
;
Jaecheol
Ryou
;
Sungik Jun
刊名:Lecture Notes in Computer Science
出版年:2007
8.
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
作者:
Mooseop Kim
;
Jaecheol
Ryou
刊名:Lecture Notes in Computer Science
出版年:2008
9.
What Are Possible Security Threats in Ubiquitous Sensor Network Environment?
作者:
Marie Kim
;
YoungJun Lee
;
Jaecheol
Ryou
关键词:
USN
;
middleware
;
security threat
刊名:Lecture Notes in Computer Science
出版年:2007
10.
Low Power AES Hardware Architecture for Radio Frequency Identification
作者:
Mooseop Kim
;
Jaecheol
Ryou
;
Yongje Choi
;
Sungik Jun
刊名:Lecture Notes in Computer Science
出版年:2006
1
2
按检索点细分(17)
作者(17)
按出版年细分(17)
2015年(1)
2013年(1)
2009年(2)
2008年(2)
2007年(4)
2006年(3)
2005年(4)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.