Keywords: Cryptography; Security Algorithm; Symmetric; Asymmetric; RSA; RC6; AES; 3DES; MD5
مقالات ISI ترجمه شده
مقالات ISI (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: MD5; digital evidence; hash function; collision; digital forensic; cryptography;
Keywords: Two-level Load-balance Monitoring Strategy; Parallel PCA-ICA Algorithm; Dynamically Variable Time Interval; A2F500; MD5;
Efficient many-core architecture design for cryptanalytic collision search on FPGAs
Keywords: Collision search; FPGAs; Elliptic curves; MD5; Pollard rho; Birthday search;
Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5
Keywords: ASIP; AES; Crypto Processor; IDEA; MD5;
GSR: Geographic Secured Routing using SHA-3 algorithm for node and message authentication in wireless sensor networks
Keywords: GSR; MAC; MD5; Routing; Security; SHA-3; WMSN;
TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET
Keywords: Cryptographic hash function; VANET; Secure data dissemination; MD5; SHA-1 ;
A Novel and Efficient De-duplication System for HDFS
Keywords: De-duplication; Hadoop; Bigdata; HDFS(Hadoop Distributed File System); MD5; SHA-1
A secure and efficient cryptographic hash function based on NewFORK-256
Keywords: Cryptographic hash function; Digital signature; MD5; SHA-1; NewFORK-256
Hashing and data integrity: Reliability of hashing and granularity size reduction
Keywords: MD5; Data assurance Data recovery; Forensic integrity Hashcode
Mass image classification
Keywords: Mass image classification; Hash; MD5; Indecent images of children; Thumbnails; Skin tone analysis
Identifying an existing file via KaZaA artefacts
Keywords: KaZaA; P2P; FastTrack; MD5; Hash; Peer to peer
Unique file identification in the National Software Reference Library
Keywords: Computer forensics; National Software Reference Library; File hashing; MD5; SHA-1; Digital fingerprint; Collisions; File signature
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
Keywords: Security performance; Computational overhead; Space overhead; IPsec; DES; AES; MD5; SHA-1; Mobile devices
A crisscross checking technique for tamper detection in halftone images
Keywords: Tamper detection; Halftone image; RSA; MD5; Crisscross technique;