咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是131-140 订阅
排序:
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement
A Hybrid Encryption Technique for Securing Biometric Image D...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Kester, Quist-Aphetsi Nana, Laurent Pascu, Anca Christine Gire, Sophie Eghan, Jojo Moses Quaynnor, Nii Narku Ghana Technology University College Accra Ghana European University of Brittany UBO France European University of Brittany France Department of Computer Science University of Cape Coast Cape Coast Ghana
Biometric data in a form of images collected from biometric devices and surveillance devices needed to be protected during storage and transmission. Due to the Nature of biometric data, information of the evidence or ... 详细信息
来源: 评论
Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes
Computationally Perfect Secret Sharing Scheme Based on Error...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Tentu, Appala Naidu Paul, Prabal Venkaiah, V.Ch. CR Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Hyderabad 500046 India Birla Institute of Technology and Science Pilani Goa Campus Goa 403726 India Department of Computer and Information Sciences University of Hyderabad Hyderabad 500046 India
In this paper, we propose a secret sharing scheme for compartmented access structure with lower bounds. Construction of the scheme is based on the Maximum Distance Separable (MDS) codes. The proposed scheme is ideal a... 详细信息
来源: 评论
A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique
A Simple and Efficient Key-Dependent S-Box Design Using Fish...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Ahmad, Musheer Khan, Parvez Mahmood Ansari, Mohd Zeeshan Department of Computer Engineering Jamia Millia Islamia New Delhi 110025 India Department of Computer Science and Engineering Integral University Lucknow 226026 India
The substitution boxes are the only components in most of symmetric encryption systems that induce nonlinearity to provide efficacious data confusion. The cryptographic potency of these systems primarily depends upon ... 详细信息
来源: 评论
Improved Detection of P2P Botnets through Network Behavior Analysis
Improved Detection of P2P Botnets through Network Behavior A...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Garg, Shree Sarje, Anil K. Peddoju, Sateesh Kumar Indian Institute of Technology Roorkee Roorkee Uttrakhand India
Botnets are becoming powerful threats on the Internet because they launch targeted attacks towards organizations and the individuals. P2P botnets are resilient and more difficult to detect due to their nature of using... 详细信息
来源: 评论
Enhancing E-Payment security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS
Enhancing E-Payment Security through Biometric Based Persona...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Chelliah, Balasubramanian Geetha, S. Department of Computer Science and Engineering P.S.R. Rengasamy College of Engineering Sivakasi Tamil Nadu India Department of Information Technology Thiagarajar College of Engineering Madurai 625 015 Tamil Nadu India
Biometrics (or biometric authentication) which is more secure than conventional password based scheme, consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits... 详细信息
来源: 评论
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Ga...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Prasad, Munaga V.N.K. Kavati, Ilaiah Adinarayana, B. Castle Hills Masab Tank Hyderabad 57 India
Palmprint technology is a new branch of biometrics used to identify an individual. Palmprint has rich set of features like palm lines, wrinkles, minutiae points, texture, ridges etc. Several line and texture extractio... 详细信息
来源: 评论
Seamless Handoff of Ping-Pong Calls in Mobile Wimax networks
Seamless Handoff of Ping-Pong Calls in Mobile Wimax Networks
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Sridevi, Balu Julia, G.V.Shirley Rajaram, S. Department of ECE Velammal College of Engineering and Technology India Department of ECE Thiagarajar College of Engineering India
Wireless Networking is a promising technology that allows users to access a broad range of information and applications. The global boom in the number of users of the global internet has led to the development of fixe... 详细信息
来源: 评论
Clustering Based Routing Strategies for Energy Management in Ad-Hoc networks
Clustering Based Routing Strategies for Energy Management in...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Karia, Deepak C. Shinde, Shravanee Sardar Patel Institute of Technology Mumbai University Mumbai India
Clustering is an energy efficient routing technique which is used for ad-hoc network optimization in terms of energy and lifetime. A clustering technique takes into consideration only two parameters that of node-ID an... 详细信息
来源: 评论
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment
A Genetic Algorithm for Scheduling Workflow Applications in ...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Singh, Lovejit Singh, Sarbjeet Computer Science and Engineering UIET Panjab University Chandigarh India
Cloud Computing refers to application and services offered over Internet using pay-as-you-go model. The services are offered from data centers all over the world, which jointly are referred to as the "Cloud"... 详细信息
来源: 评论
Emergency Aware, Non-invasive, Personalized Access Control Framework for IMDs
Emergency Aware, Non-invasive, Personalized Access Control F...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Darji, Monika Trivedi, Bhushan H. LJ Institute of Computer Application Ahmedabad India GLS Institute of Computer Technology Ahmedabad India
Implantable Medical Devices have helped patients suffering from chronic diseases by providing continuous diagnosis, treatment and remote monitoring without hospitalization and at a less expense with increased flexibil... 详细信息
来源: 评论