咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学

主题

  • 3 篇 end-to-end encry...
  • 1 篇 tetra
  • 1 篇 elliptic curve c...
  • 1 篇 application prog...
  • 1 篇 integrity
  • 1 篇 iot
  • 1 篇 curve25519
  • 1 篇 resource constra...
  • 1 篇 lightweight encr...
  • 1 篇 symmetric crypto...
  • 1 篇 cyber-physical s...
  • 1 篇 confidentiality

机构

  • 1 篇 information secu...
  • 1 篇 beijing forich s...
  • 1 篇 energy materials...
  • 1 篇 computer and aut...
  • 1 篇 school of comput...

作者

  • 1 篇 raja zahilah
  • 1 篇 shafi ullah
  • 1 篇 kom charles hube...
  • 1 篇 zhang zhi-hui
  • 1 篇 atsopmene tango ...
  • 1 篇 yang yi-xian
  • 1 篇 gamom ngounou ew...

语言

  • 3 篇 英文
检索条件"主题词=end-to-end encryption"
3 条 记 录,以下是1-10 订阅
排序:
Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
收藏 引用
Cybersecurity 2021年 第1期4卷 147-159页
作者: Shafi Ullah Raja Zahilah School of Computing Faculty of EngineeringUniversiti Teknologi Malaysia81310 Johor BahruJohorMalaysia
Robust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of genera... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on end-to-end encryption of TETRA
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2006年 第2期13卷 70-73页
作者: ZHANG Zhi-hui YANG Yi-xian Beijing FORICH Software Technology Co. Ltd. Network Security Division Beijing 100083 P. R. China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 P. R. China
The Terrestrial Trunked Radio(TETRA) system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. The TETRA system uses a synchronization technique known as frame steal... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket
收藏 引用
Journal of Information Security 2023年 第4期14卷 437-453页
作者: Atsopmene Tango Vanette Eleonore Gamom Ngounou Ewo Roland Christian Kom Charles Hubert Computer and Automatic Engineering Laboratory Higher Normal School of Technical Education of the University of Douala Douala Cameroun Energy Materials Modeling and Methods Laboratory National Polytechnic School of University of Douala Douala Cameroun
Supermarkets and large-scale retail stores are usually subject to huge monetary transactions for certain customers’ purchases. The computerization of these systems is common in supermarkets but the security of these ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论