咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 5 篇 计算机科学与技术...
    • 2 篇 软件工程

主题

  • 2 篇 security
  • 1 篇 performance
  • 1 篇 sensor
  • 1 篇 iot
  • 1 篇 message
  • 1 篇 capture
  • 1 篇 smart
  • 1 篇 networks
  • 1 篇 code
  • 1 篇 fpga
  • 1 篇 (sha)
  • 1 篇 information
  • 1 篇 node
  • 1 篇 home
  • 1 篇 authentication
  • 1 篇 cloud
  • 1 篇 attack
  • 1 篇 hash
  • 1 篇 algorithm
  • 1 篇 hardware

机构

  • 1 篇 engineering math...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 director of cryp...
  • 1 篇 computer science...
  • 1 篇 department of ne...

作者

  • 2 篇 lo’ai tawalbeh
  • 2 篇 moad mowafi
  • 2 篇 walid aljoby
  • 2 篇 lo'ai tawalbeh
  • 2 篇 mohammad al-rous...
  • 1 篇 hala tawalbeh
  • 1 篇 hala tawalbeh1
  • 1 篇 abidalrahman moh...
  • 1 篇 debora estrada
  • 1 篇 robert vinaja
  • 1 篇 yaser jararweh1
  • 1 篇 lo’ai tawalbeh2
  • 1 篇 yaser jararweh
  • 1 篇 abidalrahman moh...

语言

  • 3 篇 英文
  • 2 篇 中文
检索条件"作者=Lo’ai tawalbeh"
5 条 记 录,以下是1-10 订阅
排序:
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
收藏 引用
Journal of Information Security 2012年 第2期3卷 69-76页
作者: Yaser Jararweh lo’ai tawalbeh Hala tawalbeh Abidalrahman Moh’d Computer Science Department Jordan University of Science and Technology(CHiS) Irbid Jordan Director of Cryptographic Hardware and Information Security Lab (CHiS) Computer Engineering DepartmentJordan University of Science and Technology Irbid Jordan Engineering Mathematics & Internetworking Dalhousie University Halifax Canada
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace S... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
How Secure Having IoT Devices in Our Homes?
收藏 引用
Journal of Information Security 2020年 第2期11卷 81-91页
作者: Debora Estrada lo’ai tawalbeh Robert Vinaja Department of Computing and Cyber Security Texas A&M University San Antonio Texas USA
Nowadays, technology has evolved to be in our daily lives to assist in making our lives easier. We now have technology helping us in our lives at home. Devices used to create our “smart home” have done a great deal ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
收藏 引用
Journal of Information Security 2012年 第4期3卷 272-280页
作者: Moad Mowafi lo'ai tawalbeh Walid Aljoby Mohammad Al-Rousan Department of Computer Engineering Jordan University of Science and Technology Irbid Jordan Department of Network Engineering and Security Jordan University of Science and Technology Irbid Jordan
Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is sus... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
收藏 引用
Journal of Information Security(信息安全) 2012年 第4期
作者: Moad Mowafi lo'ai tawalbeh Walid Aljoby Mohammad Al-Rousan
来源: 评论
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
收藏 引用
Journal of Information Security(信息安全) 2012年 第2期
作者: Yaser Jararweh1 lo’ai tawalbeh2 Hala tawalbeh1 Abidalrahman Moh’d3
来源: 评论