RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Novel Forgery Detection Mechanism for Sensitive Data

        Vikas Dhawan,Gurjot Singh Gaba 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.8

        There are some applications of military and e-commerce networks, where security of transmitted data on unfriendly environment requires more concern as compared to other design issues like power and energy consumption. Data alterations in above mentioned applications can lead to irreparable losses; so to avoid such losses, we have to maintain Data Integrity in the communication network. This paper presents a novel and reliable Hash algorithm which inherits the basic architecture of SHA-1. Performance of proposed technique is compared with existing techniques through statistical test suite for random numbers. Results reveal that the suggested technique is more effective in terms of randomness than the existing algorithms. The proposed technique, thus, finds its applicability in the sensitive data environment.

      • More Reliable Approach for Detecting Data Alterations in Communication Networks

        Vikas Dhawan,Gurjot Singh Gaba 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.6

        Security of precious data is the most critical design parameter of a communication network. Applications like online banking and military information exchange requires more concern over security regardless of other design issues like power and energy consumption. Data alterations in some applications can lead to severe irreparable losses. This paper presents a novel and reliable Hash algorithm which inherits the basic architecture of MD5. Performance of proposed technique is compared with existing MD5, SHA-160, SHA-256 and SHA-384 techniques through statistical test suite for random numbers. Results reveal that the suggested technique is more effective in terms of randomness than the MD5, SHA-160, SHA-256 and SHA-384. The proposed technique thus finds its applicability in the sensitive data environment.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼