咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是241-250 订阅
排序:
QoS Aware Services Discovery in a P2P Grid Environment
QoS Aware Services Discovery in a P2P Grid Environment
收藏 引用
international conference on Pervasive Computing and Applications (ICPCA)
作者: Antonella Di Stefano Giovanni Morana Daniele Zito Dipartimento di Ingegneria Informatica e Telecomunicazioni Universitá di Catania Italy
In recent years, grid systems and peer to peer networks are the most used solutions to achieve the same goal: sharing resources and services in heterogeneous, dynamic, distributed environments. Grid systems have well ... 详细信息
来源: 评论
OASiS: A Programming Framework for Service-Oriented Sensor networks
OASiS: A Programming Framework for Service-Oriented Sensor N...
收藏 引用
international conference on Communication systems Software and Middleware (COMSWARE)
作者: Manish Kushwaha Isaac Amundson Xenofon Koutsoukos Sandeep Neema Janos Sztipanovits Institute for Software Integrated Systems (ISIS) Vanderbilt University Nashville TN USA
Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in order to monitor spatio-temporal phenomena. Thes... 详细信息
来源: 评论
Fusion of Multi-Modal Credentials for Authentication in Digital Identity Management systems
Fusion of Multi-Modal Credentials for Authentication in Digi...
收藏 引用
international conference on Wireless Broadband and Ultra Wideband Communications (AusWireless)
作者: Jackson Phiri Johnson I. Agbinya Department of Computer Science University of Technology Sydney Australia Department of Computer Science University of Western Cape South Africa
The recent years have seen an increase in identity fraud and accessing online services when communication devices such as computers, mobile phones and card based credentials (e.g. credit cards) are involved. This has ... 详细信息
来源: 评论
An efficient ID-based bilinear key predistribution scheme for distributed sensor networks
收藏 引用
2nd international conference on High Performance Computing and Communications (HPCC 2006)
作者: Dai, Tran Thanh Hieu, Cao Trong Hong, Choong Seon Kyung Hee Univ Dept Comp Engn Networking Lab Yongin 449701 Gyeonggi South Korea
security requirements are very pressing in distributed sensor networks due to exploitation purposes of these networks in human life, especially in military tasks. To obtain security in these sorts of networks, it is c... 详细信息
来源: 评论
Fighting intrusions in wireless LANs: A need for the reference model
Fighting intrusions in wireless LANs: A need for the referen...
收藏 引用
2nd IEEE/IFIP international conference in Central Asia on Internet
作者: Pakstas, A. Salekzamankhani, S. Virdee, B. London Metropolitan Univ Dept Comp Commun Technol & Math 166-220 Holloway Rd London N7 8DB England
A traditional way to improve security of wired computer network can be achieved by applying access control policies to the front door of network. However these policies may be not sufficient and effective any more whe... 详细信息
来源: 评论
Defending against distributed Denial of Service (DDoS) attacks with queue traffic differentiation over micro-MPLS-based wireless networks
Defending against Distributed Denial of Service (DDoS) attac...
收藏 引用
2nd international conference on systems and networks Communications, ICSNC 2006
作者: Fowler, Scott Zeadally, Sherali Department of Computer Science Wayne State University Detroit MI 48202 United States Department of Computer Science and Information Technology University of the District of Columbia Washington DC 20008 United States
Traditional security research has been on privacy or authentication. Unfortunately, attacks on wireless media cannot be simply addressed using traditional security methods [1]. An example of a security threat which is... 详细信息
来源: 评论
Autonomically improving the security and robustness of structured P2P overlays
Autonomically improving the security and robustness of struc...
收藏 引用
2nd international conference on systems and networks Communications, ICSNC 2006
作者: Kunzmann, Gerald Binzenhöfer, Andreas Institute of Computer Science University of Würzburg
Recent research efforts have shown that peer-topeer (p2p) mechanisms incorporate a potential that goes well beyond simple file sharing. Compared to the classic client-server architecture, these systems do not suffer f... 详细信息
来源: 评论
COTA: A robust multi-hop localization scheme in wireless sensor networks
收藏 引用
2nd IEEE international conference on distributed Computing in Sensor systems
作者: Wei, Yawen Yu, Zhen Guan, Yong Iowa State Univ Dept Elect & Comp Engn Ames IA 50011 USA
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a robust multi-hop localization scheme, na... 详细信息
来源: 评论
2nd international conference on Information systems security, ICISS 2006
收藏 引用
2nd international conference on Information systems security, ICISS 2006
The proceedings contain 32 papers. The special focus in this conference is on Information systems security. The topics include: Privacy in the electronic society;a data sharing agreement framework;network monitoring f...
来源: 评论
security considerations in space and delay tolerant networks
Security considerations in space and delay tolerant networks
收藏 引用
IEEE international conference on Space Mission Challenges for Information Technology, SMC-IT
作者: S. Farrell V. Cahill Distributed Systems Group Department of Computer Science Trinity College Dublin Ireland
This paper reviews the Internet-inspired security work on delay tolerant networking, in particular, as it might apply to space missions, and identifies some challenges arising, for both the Internet security community... 详细信息
来源: 评论