Keywords: تابع هش; Hash function; Image encryption; Fractional Fourier transform; Joint transform correlator;
مقالات ISI تابع هش (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: تابع هش; Hash function; Cyclic shift; Chaotic sequences; PWLCM; Image encryption;
Keywords: تابع هش; Cognitive radio networks; Dynamic spectrum access; Channel hopping; Hadamard matrix; Hash function;
Keywords: تابع هش; Wireless medical sensor network; Password authentication; User anonymity; Hash function; AVISPA tool; BAN logic;
Keywords: تابع هش; Boolean operation; Different sized images; Multiple sharing; Hash function;
Keywords: تابع هش; MD5; digital evidence; hash function; collision; digital forensic; cryptography;
Keywords: تابع هش; Evolutionary algorithm; Hash function; Network filter; Field-programmable gate array; Cuckoo;
Keywords: تابع هش; Collision analysis; Message extension; Aggregation operation; Hash function; Performance analysis
Keywords: تابع هش; Hyper chaotic complex system; Asymmetric cryptosystem; Hash function; Dynamical step length
Keywords: تابع هش; Chaos; Hash function; Variable parameters; Piecewise linear chaotic map; One-way coupled map lattice;
Keywords: تابع هش; Mechanical sensor; Authentication; Hash function; Session Key agreement
Keywords: تابع هش; Hash function; Compression algorithm; Non-iterative structure; Provable security; Birthday attack; Meet-in-the-middle attack;
Keywords: تابع هش; Network coding; Authentication; Hash function; Proxy re-signature
Keywords: تابع هش; Remote user authentication; Biometrics; Smart cards; Hash function; Cryptanalysis; Security
Keywords: تابع هش; Chaotic map; Smartcard; Password; Hash function; Session key; Key exchange protocol
Keywords: تابع هش; VMSS; Hash function
Keywords: تابع هش; Network security and performance; Intrusion detection; Non-critical alarm reduction; Contextual signature; Hash function
Keywords: تابع هش; Remote user authentication; Password; Smart cards; Security; Hash function
Keywords: تابع هش; Access control; Key management; Hierarchy; Hash function; Symmetric-key cryptosystem; Security
Keywords: تابع هش; Stream data mining; Frequent data item; Fading factor; Hash function
Keywords: تابع هش; Digital Signature; Anonymous; Hash Function; Mobile Payment ;
HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs
Keywords: تابع هش; VANETs; Anonymous authentication; Conditional privacy; Hash function; Group key; Chinese remainder theorem;
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs
Keywords: تابع هش; VANET; Group-key; Conditional privacy; Road-side-unit; On-board-unit; Hash function;
Secure pseudonymisation for privacy-preserving probabilistic record linkage
Keywords: تابع هش; Record linkage; Privacy; Bloom filter; Hash function;
Research on a provable security RFID authentication protocol based on Hash function
Keywords: تابع هش; mutual authentication protocol; provable security method; Hash function; RFID system
An improved preimage attack against HAVAL-3
Keywords: تابع هش; Cryptography; Hash function; HAVAL-3; Cryptanalysis; Meet-in-the-middle attack; Splice-and-cut;
A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise
Keywords: تابع هش; One-time S-Box; Complex chaotic system; Environmental noise; Hash function
ASH-160: A novel algorithm for secure hashing using geometric concepts
Keywords: تابع هش; Cryptography; Hash function; Message digest; Authentication; Geometric concepts
ASH-512: Design and implementation of cryptographic hash algorithm using co-ordinate geometry concepts
Keywords: تابع هش; Cryptography; Hash function; Message digest; Message authentication; Co-ordinate geometry concepts
Cryptanalysis of GOST R hash function
Keywords: تابع هش; Cryptography; Hash function; GOST R; Rebound attack; Multi-collision
Security of permutation-based compression function lp231lp231
Keywords: تابع هش; Cryptography; Hash function; Collision resistance; Preimage resistance; Random permutation model; Provable security
PathZip: A lightweight scheme for tracing packet path in wireless sensor networks
Keywords: تابع هش; Wireless sensor networks; Path compression; Hash function; Piece-wise linear approximation
Cryptanalysis of a simple key assignment for access control based on polynomial
Keywords: تابع هش; Access control; Hash function; Hierarchy; Key agreement; Polynomial; Security
Phase mask generation for DRPE method using chaos theory and hash function
Keywords: تابع هش; Double random phase encoding (DRPE); Hash function; SHA-512 algorithm; Chaos theory; Two-dimensional coupled logistic map, phase mask generation
Preimage and pseudo-collision attacks on step-reduced SM3 hash function
Keywords: تابع هش; Cryptography; Preimage attack; Collision attack; Differential meet-in-the-middle; SM3; Hash function
Robust image hash function using local color features
Keywords: تابع هش; Hash function; Image hashing; Color space; Digital watermarking; Image retrieval
FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256
Keywords: تابع هش; SHA-2; Hash function; FPGA
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images
Keywords: تابع هش; Chaos; Triple-image encryption; Hash function; One-time keys
A novel proxy signature scheme based on user hierarchical access control policy
Keywords: تابع هش; Proxy signature; Hierarchical access control; Polynomial interpolation; Security; Discrete logarithm; Hash function
SRFID: A hash-based security scheme for low cost RFID systems
Keywords: تابع هش; RFID; Auhentication; Hash function; Privacy; Security
Rank hash similarity for fast similarity search
Keywords: تابع هش; Similarity search; Hash function; Similarity ranking
A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine
Keywords: تابع هش; Medical imaging; Image authentication; Image integrity; Image compression; Hash function; Security
Collision analysis of a chaos-based hash function with both modification detection and localization capability
Keywords: تابع هش; Collision; Hash function; Chaos
Collision analysis of a parallel keyed hash function based on chaotic neural network
Keywords: تابع هش; Chaotic neural network; Hash function; Collision
A keyed hash function based on the modified coupled chaotic map lattice
Keywords: تابع هش; Coupled map lattice; Spatiotemporal chaos; Hash function
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Keywords: تابع هش; Wireless sensor networks; User authentication; Wireless security; Passwords; Hash function; Smart cards
Coupled map lattice based hash function with collision resistance in single-iteration computation
Keywords: تابع هش; Hash function; Coupled map lattice; Chaos
A bilevel fixed charge location model for facilities under imminent attack
Keywords: تابع هش; Fixed charge facility location; Protection; Interdiction; Bilevel programming; Tabu search; Hash function;
On perfect hashing of numbers with sparse digit representation via multiplication by a constant
Keywords: تابع هش; Magic multiplier; Hash function; Bitboard; Schur function
Parallel hash function construction based on coupled map lattices
Keywords: تابع هش; Hash function; Coupled map lattices; Chaos-based cryptography; Parallel