限定检索结果

检索条件"主题词=security"
72 条 记 录,以下是1-10 订阅
视图:
排序:
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
收藏 引用
《Frontiers of Information Technology & Electronic Engineering》2018年 第12期19卷 1475-1499页
作者:Fan ZHANG Zi-yuan LIANG Bo-lin YANG Xin-jie ZHAO Shi-ze GUO Kui RENCollege of Information Science and Electronic Engineering Zhejiang University Institute of Cyberspace Research Zhejiang University State Key Laboratory of Cryptology Alibaba-Zhejiang University Joint Institute of Frontier Technologies Institute of North Electronic Equipment 
The Competition for Authenticated Encryption: security, Applicability, and Robustness(CAESAR)supported by the National Institute of Standards and Technology(NIST) is an ongoing project calling for submissions of authe...
来源:详细信息评论
Design of Anti-Collision Integrated security Mechanism Based on Chaotic Sequence in UHF RFID System
收藏 引用
《China Communications》2014年 第3期11卷 137-147页
作者:YUE Keqiang SUN Lingling QIN Xing ZHENG ZhonghuaInstitute of VLSI Design Zhejiang University Hangzhou Zhejiang 310027 China Key Laboratory of RF Circuits and Systems Ministry of Education Hangzhou Dianzi University Hangzhou Zhejiang 310018 China 
Collision and security issues are considered as barriers to RFID *** this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFID system is ...
来源:详细信息评论
Design and Study of a High security ATM System
收藏 引用
《Journal of Beijing Institute of Technology》2002年 第1期11卷 41-44页
作者:范瑞霞 赵则祥 张俊北京理工大学自动控制系北京100081 
Based on the characteristics of ATM system and the special requirement of financial transaction, an overall design of hardware and software structure of ATM was made. For software structure, the pattern of modules and...
来源:详细信息评论
Proactive security Mechanism and Design for Firewall
收藏 引用
《Journal of Information security2011年 第3期2卷 122-130页
作者:Saleem-Ullah Lar Xiaofeng Liao Aqeel ur Rehman MA Qinglu不详 
In this paper we have present the architecture and module for internet firewall. The central component is fuzzy controller while properties of packets are fuzzified as inputs. On the basis of proposed fuzzy security a...
来源:详细信息评论
Design and Development of a House-Mobile security System
收藏 引用
《Engineering(科研)》2011年 第12期3卷 1213-1224页
作者:Ashraf Elfasakhany Jorge Hernández Juan Carlos García Mario Reyes Francisco Martell不详 
The objective of this work is to design, develop and implement an alarm system that triggers the alarm and alerts the owner via a mobile text message if the house has been opened or an attempt has been made to open it...
来源:详细信息评论
Design of Secure and Traceable Requirement Engineering Process for security-Sensitive Projects
收藏 引用
《Journal of Software Engineering and Applications》2017年 第12期10卷 873-883页
作者:Abdul Ahad Luqman Tariq Saba Niaz Muhammad InamDepartment of Computer Science Virtual University Lahore Pakistan Department of Computer Science Preston University Islamabad Pakistan Department of Computer Science Beijing University of Technology Beijing China 
With continuous evolution in software industry, security is becoming very important in software projects. However, in many development methodologies, security is thought to be added in the project at later stages of t...
来源:详细信息评论
The Design of an Intelligent security Access Control System Based on Fingerprint Sensor FPC1011C
收藏 引用
《Circuits and Systems》2010年 第1期1卷 30-33页
作者:Yan Wang Hongli Liu Jun Feng不详 
This paper deals with the design of an intelligent access control system based on the fingerprint sensor FPC- 1011C. The design uses the S3C2410 and TMS320VC5510A as the system processor. A fingerprint acquisition mod...
来源:详细信息评论
Design and Development of a Novel Symmetric Algorithm for Enhancing Data security in Cloud Computing
收藏 引用
《Journal of Information security2019年 第4期10卷 199-236页
作者:Mohammad Anwar Hossain Ahsan Ullah Newaz Ibrahim Khan Md Feroz AlamDepartment of Computer Science and Engineering World University of Bangladesh Dhaka Bangladesh 
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no...
来源:详细信息评论
SMS Notifying Design in Intra-Day Scheduling security Check System
收藏 引用
《Energy and Power Engineering》2017年 第4期9卷 535-543页
作者:Cui-Hui Yan Licheng Sha Sai Dai Hai-Dong ZhaoPower System Automation Department China Electric Power Research Institute Beijing State Grid Beijing Electric Power Company Beijing 
In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into o...
来源:详细信息评论
Internet of Things Behavioral-Economic security Design, Actors &Cyber War
收藏 引用
《Advances in Internet of Things》2017年 第2期7卷 25-45页
作者:Robert L. Shuler Billy G. SmithNASA Johnson Space Center Houston Texas USA 
Using security incident history we identify threats to and using the IoT and other ubiquitous devices emerging since 2012, gaining widespread recognition in 2016, and only lightly addressed in either IoT security lite...
来源:详细信息评论
聚类工具 回到顶部