期刊文献+
共找到1,565篇文章
< 1 2 79 >
每页显示 20 50 100
Hash折叠寻址模型的研究
1
作者 庞志赟 萧琳 《现代信息科技》 2025年第5期184-186,192,共4页
在大数据背景下,研究大数据存储及寻址对大数据管理具有重要的数据经济意义。文章从数据存储物理结构和逻辑结构分析了数据存储的架构化现状,以准实时或实时为数据查询需求,在传统的主键索引查询技术基础上,对数据存储结构进行重组,关... 在大数据背景下,研究大数据存储及寻址对大数据管理具有重要的数据经济意义。文章从数据存储物理结构和逻辑结构分析了数据存储的架构化现状,以准实时或实时为数据查询需求,在传统的主键索引查询技术基础上,对数据存储结构进行重组,关心数据模型原型、数据存储规律与调用、数据Hash检索计算策略、结果存储和分发、折叠寻址结构模型,以及提升数据处理速度和数据查询处理能力等。应用Hash折叠检索策略和折叠函数原型构建折叠寻址思想模型,并将该思想应用于折叠寻址用例,对数据快速查询的Hash折叠寻址模型的研究具有重要意义。 展开更多
关键词 hash 折叠寻址 存储结构 折叠检索策略 寻址模型
在线阅读 下载PDF
基于Python语言和Hash算法的双关键字查找算法应用研究
2
作者 卢志刚 陈平 《安徽水利水电职业技术学院学报》 2025年第1期43-48,共6页
大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,... 大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,并使用Python语言开发了使用该算法的软件。对比分析结果表明,该方法在处理大规模数据时,相比传统顺序查找和二分查找,不仅简化了实现过程,而且显著提高了查找效率。 展开更多
关键词 二维表 hash table 查找算法
在线阅读 下载PDF
Underwater Pulse Waveform Recognition Based on Hash Aggregate Discriminant Network
3
作者 WANG Fangchen ZHONG Guoqiang WANG Liang 《Journal of Ocean University of China》 SCIE CAS CSCD 2024年第3期654-660,共7页
Underwater pulse waveform recognition is an important method for underwater object detection.Most existing works focus on the application of traditional pattern recognition methods,which ignore the time-and space-vary... Underwater pulse waveform recognition is an important method for underwater object detection.Most existing works focus on the application of traditional pattern recognition methods,which ignore the time-and space-varying characteristics in sound propagation channels and cannot easily extract valuable waveform features.Sound propagation channels in seawater are time-and space-varying convolutional channels.In the extraction of the waveform features of underwater acoustic signals,the effect of high-accuracy underwater acoustic signal recognition is identified by eliminating the influence of time-and space-varying convolutional channels to the greatest extent possible.We propose a hash aggregate discriminative network(HADN),which combines hash learning and deep learning to minimize the time-and space-varying effects on convolutional channels and adaptively learns effective underwater waveform features to achieve high-accuracy underwater pulse waveform recognition.In the extraction of the hash features of acoustic signals,a discrete constraint between clusters within a hash feature class is introduced.This constraint can ensure that the influence of convolutional channels on hash features is minimized.In addition,we design a new loss function called aggregate discriminative loss(AD-loss).The use of AD-loss and softmax-loss can increase the discriminativeness of the learned hash features.Experimental results show that on pool and ocean datasets,which were collected in pools and oceans,respectively,by using acoustic collectors,the proposed HADN performs better than other comparative models in terms of accuracy and mAP. 展开更多
关键词 convolutional channel hash aggregate discriminative network aggregate discriminant loss waveform recognition
在线阅读 下载PDF
基于线性同态hash和秘密分享的高效可验证聚合方案
4
作者 高琦 孙奕 +1 位作者 王友贺 李宇杰 《计算机应用研究》 北大核心 2025年第2期599-605,共7页
针对目前联邦学习可验证聚合方案存在用户通信开销过大、无法容忍用户退出以及用户退出导致验证效率降低的问题,提出了一种基于线性同态hash和秘密分享的高效可验证聚合方案(LHSSEVA)。首先,采用线性同态hash和同态承诺实现聚合结果的... 针对目前联邦学习可验证聚合方案存在用户通信开销过大、无法容忍用户退出以及用户退出导致验证效率降低的问题,提出了一种基于线性同态hash和秘密分享的高效可验证聚合方案(LHSSEVA)。首先,采用线性同态hash和同态承诺实现聚合结果的可验证性,保证验证信息通信开销与模型维度无关,同时防止服务器通过伪造聚合hash欺骗用户接受错误聚合结果;然后基于椭圆曲线离散对数问题及其同态性保护输入的隐私,同时保证验证的正确性;接着通过融入秘密分享使验证过程可以容忍用户随时退出,并确保用户退出不会导致验证效率降低;最后理论分析证明了方案的正确性、可靠性和隐私性。仿真实验结果表明了方案的可行性和高效性,与VeriFL方案相比,具有更低的计算和通信开销,特别是存在用户退出时,显著提高了验证效率,具有更强的退出容忍性。 展开更多
关键词 联邦学习 隐私保护 可验证 线性同态hash 秘密分享 容忍退出
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
5
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Dynamically redactable blockchain based on decentralized Chameleon hash
6
作者 Xinzhe Huang Yujue Wang +3 位作者 Yong Ding Qianhong Wu Changsong Yang Hai Liang 《Digital Communications and Networks》 2025年第3期757-767,共11页
The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchai... The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchains enable on-chain modification,they suffer from inefficiency and excessive centralization,the majority of redactable blockchain schemes ignore the difficult problems of traceability and consistency check.In this paper,we present a Dynamically Redactable Blockchain based on decentralized Chameleon hash(DRBC).Specifically,we propose an Identity-Based Decentralized Chameleon Hash(IDCH)and a Version-Based Transaction structure(VT)to realize the traceability of transaction modifications in a decentralized environment.Then,we propose an efficient block consistency check protocol based on the Bloom filter tree,which can realize the consistency check of transactions with extremely low time and space cost.Security analysis and experiment results demonstrate the reliability of DRBC and its significant advantages in a decentralized environment. 展开更多
关键词 Privacy protection Redactable blockchain Chameleon hash Consistency check SCALABILITY
在线阅读 下载PDF
Hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
7
作者 Xing Huang Yulin Chen +4 位作者 Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang 《Global Energy Interconnection》 2025年第1期1-12,共12页
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam... Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sampling time period inevitably causes the wasteful use of communication resources.This paper proposes a self-triggered secondary control scheme under perturbations from false data injection(FDI)attacks.We designed a linear clock for each DG to trigger its controller at aperiodic and intermittent instants.Sub-sequently,a hash-based defense mechanism(HDM)is designed for detecting and eliminating malicious data infiltrated in the MGs.With the aid of HDM,a self-triggered control scheme achieves the secondary control objectives even in the presence of FDI attacks.Rigorous theoretical analyses and simulation results indicate that the introduced secondary control scheme significantly reduces communication costs and enhances the resilience of MGs under FDI attacks. 展开更多
关键词 MICROGRIDS Distributed secondary control Self-triggered control hash algorithms False data injection attack
在线阅读 下载PDF
Secure Medical Image Retrieval Based on Multi-Attention Mechanism and Triplet Deep Hashing
8
作者 Shaozheng Zhang Qiuyu Zhang +1 位作者 Jiahui Tang Ruihua Xu 《Computers, Materials & Continua》 2025年第2期2137-2158,共22页
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third... Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality. 展开更多
关键词 Secure medical image retrieval multi-attention mechanism triplet deep hashing image enhancement lightweight image encryption
在线阅读 下载PDF
一种基于Bilinear-HashNet网络的车型识别方法 被引量:3
9
作者 费东炜 孙涵 《小型微型计算机系统》 CSCD 北大核心 2019年第8期1750-1754,共5页
车型识别对于智能交通系统具有重要的意义.目前基于深度学习的车型识别技术通常采用卷积神经网络来进行图像分类,这一类方法对于已训练的车型类别具有较好的识别效果,但是对于未训练数据类型就无能为力了.针对这一缺点,本文设计了Biline... 车型识别对于智能交通系统具有重要的意义.目前基于深度学习的车型识别技术通常采用卷积神经网络来进行图像分类,这一类方法对于已训练的车型类别具有较好的识别效果,但是对于未训练数据类型就无能为力了.针对这一缺点,本文设计了Bilinear-HashNet网络,该网络以Hash Net为基础,使用双线性模块替换Hash Net中的AlexNet部分,使网络具有提取精细粒度特征的能力;并根据提取到的特征生成哈希码,再通过哈希码的匹配实现车型识别.实验证明,基于Bilinear-HashNet的车型识别方法对已训练和未训练的车辆类型都能取得较好的效果. 展开更多
关键词 车型识别 深度哈希 hash net 卷积神经网络
在线阅读 下载PDF
One-way hash function based on hyper-chaotic cellular neural network 被引量:1
10
作者 杨群亭 高铁杠 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第7期2388-2393,共6页
The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos ... The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corre- sponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. 展开更多
关键词 one-way hash function HYPER-CHAOS cellular neural network Runge Kutta formula
原文传递
Hash-area-based data dissemination protocol in wireless sensor networks 被引量:1
11
作者 王田 王国军 +1 位作者 过敏意 贾维嘉 《Journal of Central South University of Technology》 EI 2008年第3期392-398,共7页
HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The se... HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks. 展开更多
关键词 wireless sensor networks hash function data dissemination query processing mobile sinks
在线阅读 下载PDF
NET框架下采用HASH算法的口令管理
12
作者 杨波 《兵工自动化》 2006年第10期33-33,39,共2页
VS.NET框架下的口令管理,可通过MD5及SHA-1两种HASH算法实现。当用户向数据库注册新用户记录时,用MD5算法加密用户名,用SHA-1加密密码,并将这对加密后的口令插入数据库。当用户登录信息系统时,用同样的方法对用户输入的口令进行加密,然... VS.NET框架下的口令管理,可通过MD5及SHA-1两种HASH算法实现。当用户向数据库注册新用户记录时,用MD5算法加密用户名,用SHA-1加密密码,并将这对加密后的口令插入数据库。当用户登录信息系统时,用同样的方法对用户输入的口令进行加密,然后将它与从数据库中的加密口令进行比较,由此实现口令管理。 展开更多
关键词 VS.net框架 hash算法 MD5 SHA-1 口令管理
在线阅读 下载PDF
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing 被引量:1
13
作者 Siti-Hajar-Aminah Ali Seiichi Ozawa +2 位作者 Junji Nakazato Tao Ban Jumpei Shimamura 《Journal of Intelligent Learning Systems and Applications》 2015年第2期42-57,共16页
In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by ... In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in the email contents and the Uniform Resource Locator (URL) links leading to malicious websites by updating the system daily. We introduce an autonomous function for a server to generate training examples, in which double-bounce emails are automatically collected and their class labels are given by a crawler-type software to analyze the website maliciousness called SPIKE. In general, since spammers use botnets to spread numerous malicious emails within a short time, such distributed spam emails often have the same or similar contents. Therefore, it is not necessary for all spam emails to be learned. To adapt to new malicious campaigns quickly, only new types of spam emails should be selected for learning and this can be realized by introducing an active learning scheme into a classifier model. For this purpose, we adopt Resource Allocating Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with a data selection function. In RAN-LSH, the same or similar spam emails that have already been learned are quickly searched for a hash table in Locally Sensitive Hashing (LSH), in which the matched similar emails located in “well-learned” are discarded without being used as training data. To analyze email contents, we adopt the Bag of Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency (TF-IDF). We use a data set of double-bounce spam emails collected at National Institute of Information and Communications Technology (NICT) in Japan from March 1st, 2013 until May 10th, 2013 to evaluate the performance of the proposed system. The results confirm that the proposed spam email detection system has capability of detecting with high detection rate. 展开更多
关键词 MALICIOUS SPAM EMAIL Detection System INCREMENTAL Learning Resource Allocating network LOCALITY Sensitive hashING
在线阅读 下载PDF
基于AES和Hash算法的生物信息数据库混合加密方法 被引量:4
14
作者 严汉池 苏春林 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2024年第10期2994-2999,共6页
针对生物信息数据库入侵攻击行为越来越隐蔽、严重威胁数据安全性,本文设计了一种基于AES和Hash算法的生物信息数据库混合加密方法。采用AES算法将生物数据信息映射至状态矩阵中得出密钥,经过多轮的字节替换、行位移、列混淆与轮密钥加... 针对生物信息数据库入侵攻击行为越来越隐蔽、严重威胁数据安全性,本文设计了一种基于AES和Hash算法的生物信息数据库混合加密方法。采用AES算法将生物数据信息映射至状态矩阵中得出密钥,经过多轮的字节替换、行位移、列混淆与轮密钥加运算,完成加密运算,得到密文。使用Hash算法中MD5函数、二进制方式认证密文数据信息,发现错误信息时触发阅读器对其修改,保证数据的完整性。当访问者向数据库发出访问请求时,通过阅读器审查其身份信息,若审查通过,则可以访问此数据库;反之,不能访问。采用AES算法解密密文,查找此文件访问权限身份中是否有此身份信息,若有,读取此数据;反之,禁止读取,实现二者的混合加密。实验结果表明,本文方法能保证生物数据信息的完整性,且数据加密、数据解密和身份认证时间极短。 展开更多
关键词 AES算法 hash算法 生物信息数据库 密文明文 加密运算
原文传递
Second-Order Side-Channel Attacks on Kyber: Targeting the Masked Hash Function 被引量:2
15
作者 WANG Ya-Qi HUANG Fan +1 位作者 DUAN Xiao-Lin HU Hong-Gang 《密码学报(中英文)》 CSCD 北大核心 2024年第6期1415-1436,共22页
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P... Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks. 展开更多
关键词 side-channel attack plaintext-checking oracle post-quantum cryptography masked Kyber masked hash function
在线阅读 下载PDF
Lung Nodule Image Retrieval Based on Convolutional Neural Networks and Hashing
16
作者 Yan Qiang Xiaolan Yang +2 位作者 Juanjuan Zhao Qiang Cui Xiaoping Du 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期17-26,共10页
Lung medical image retrieval based on content similarity plays an important role in computer-aided diagnosis of lung cancer.In recent years,binary hashing has become a hot topic in this field due to its compressed sto... Lung medical image retrieval based on content similarity plays an important role in computer-aided diagnosis of lung cancer.In recent years,binary hashing has become a hot topic in this field due to its compressed storage and fast query speed.Traditional hashing methods often rely on highdimensional features based hand-crafted methods,which might not be optimally compatible with lung nodule images.Also,different hashing bits contribute to the image retrieval differently,and therefore treating the hashing bits equally affects the retrieval accuracy.Hence,an image retrieval method of lung nodule images is proposed with the basis on convolutional neural networks and hashing.First,apre-trained and fine-tuned convolutional neural network is employed to learn multilevel semantic features of the lung nodules.Principal components analysis is utilized to remove redundant information and preserve informative semantic features of the lung nodules.Second,the proposed method relies on nine sign labels of lung nodules for the training set,and the semantic feature is combined to construct hashing functions.Finally,returned lung nodule images can be easily ranked with the query-adaptive search method based on weighted Hamming distance.Extensive experiments and evaluations on the dataset demonstrate that the proposed method can significantly improve the expression ability of lung nodule images,which further validates the effectiveness of the proposed method. 展开更多
关键词 LUNG NODULE image retrieval convolutional neural networks INFORMATIVE SEMANTIC features hashING
在线阅读 下载PDF
Homomorphic Hashing Verification for Wireless Sensor Networks Rateless Codes Over-the-Air Programming
17
作者 Hao He Weidong Yi +1 位作者 Ming Li Yongrui Chen 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期109-118,共10页
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of... The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates. 展开更多
关键词 wireless sensor network(WSN) over-the-air PROGRAMMING rateless CODES homomorphic hashING security
在线阅读 下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells 被引量:1
18
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
在线阅读 下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm 被引量:1
19
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
在线阅读 下载PDF
Hash function construction using weighted complex dynamical networks
20
作者 宋玉蓉 蒋国平 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期172-177,共6页
A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then... A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then, each block is divided into components, and the nodes and weighted edges are well defined from these components and their relations. Namely, the WCDN closely related to the original message is established. Furthermore, the node dynamics of the WCDN are chosen as a chaotic map. After chaotic iterations, quantization and exclusive-or operations, the fixed-length hash value is obtained. This scheme has the property that any tiny change in message can be diffused rapidly through the WCDN, leading to very different hash values. Analysis and simulation show that the scheme possesses good statistical properties, excellent confusion and diffusion, strong collision resistance and high efficiency. 展开更多
关键词 hash function weighted complex dynamical networks chaotic map CRYPTOGRAPHY
原文传递
上一页 1 2 79 下一页 到第
使用帮助 返回顶部