咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是101-110 订阅
排序:
ID-based threshold signcryption and group unsigncryption
ID-based threshold signcryption and group unsigncryption
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Mishra, Prashant Kumar Singh, Kunwar Baruntar, Sudhanshu Department of Computer Science Engineering National Institute of Technology Trichy India
Xiaoyu et. al. [1] presented efficient identity based (K, n) threshold signcryption scheme. In this paper, we present variant of [1] with group shared unsigncryption, which is based on discrete logarithm problem in fi... 详细信息
来源: 评论
A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks
A survey of blackhole attacks and countermeasures in wireles...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Banerjee, Subhashis Majumder, Koushik Department of Computer Science and Engineering West Bengal University of Technology Kolkata India
In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. Such network scenarios cannot rely on centralized and organized connectivity, and ca... 详细信息
来源: 评论
Secure authentication in multimodal biometric systems using cryptographic hash functions
Secure authentication in multimodal biometric systems using ...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Ashok, Aravind Poornachandran, Prabaharan Achuthan, Krishnasree Amrita Center for Cyber Security Amrita University Amritapuri Campus Kollam India
In this Information Age, security of personal data is one of the biggest issues faced by most of the nations. Biometrics provides substantial help in guarding against attempts to establish fraudulent multiple identiti... 详细信息
来源: 评论
Crypto-precision: Testing tool for hash function
Crypto-precision: Testing tool for hash function
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Tiwari, Harshvardhan Luthra, Ankit Goel, Himanshu Sharma, Sambhav Asawa, Krishna Computer Science and Engineering Department Jaypee Institute of Information Technology Noida India
In this paper, we present a new generic cryptographic hash function testing tool called Crypto-Precision. It is designed to be adaptable to various Cryptographic Hash Function algorithms and different hash function co... 详细信息
来源: 评论
security analysis of CAPTCHA
Security analysis of CAPTCHA
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Chandavale, Anjali Avinash Sapkal, A. LMIETE India
CAPTCHA stands for Completely Automated Public Turing test to distinguish computers and Humans apart. CAPTCHA is a program which can generate and grade the tests that it itself cannot pass. The security aspect of CAPT... 详细信息
来源: 评论
Effective implementation of des algorithm for voice scrambling
Effective implementation of des algorithm for voice scrambli...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: John, Jinu Elizabeth Remya Ajai, A.S. Poornachandran, Prabaharan Department of ECE Amrita Vishwavidyapeetham India Center for Cyber Security Amrita Vishwavidyapeetham India
This paper presents a high performance reconfigurable hardware implementation of speech scrambling-descrambling system which can be used for military and high security environments. The scrambling algorithm is based o... 详细信息
来源: 评论
Recent Trends in computer networks and distributed systems security  1
收藏 引用
丛书名: Communications in computer and Information Science
1000年
作者: Gregorio Martínez Pérez Sabu M. Thampi Ryan Ko Lei Shu
This book constitutes the refereed proceedings of the Second international conference on security in computer networks and distributed systems, snds 2014, held in Trivandrum, India, in March 2014. The 32 revised full ... 详细信息
来源: 评论
Biologically inspired computer security system: The way ahead
Biologically inspired computer security system: The way ahea...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Saurabh, Praneet Verma, Bhupendra Sharma, Sanjeev Department of Computer Science and Engineering TIT Bhopal M.P India Department of Information Technology SoIT RGPV M.P India
Last two decades have witnessed tremendous growth of internet and it acts as a centrifugal force for a whole new array of applications and services which drives the e- business/ commerce globally. Millions of applicat... 详细信息
来源: 评论
A Comprehensive security Model for Networking Applications
A Comprehensive Security Model for Networking Applications
收藏 引用
21st international conference on computer Communications and networks (ICCCN)
作者: Chan-Tin, Eric Chen, Tingting Kak, Subhash Oklahoma State Univ Dept Comp Sci Stillwater OK 74078 USA
The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks, cloud computin... 详细信息
来源: 评论
A comparative study on wormhole attack prevention schemes in mobile ad-hoc network
A comparative study on wormhole attack prevention schemes in...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Banerjee, Subhashis Majumder, Koushik Department of Computer Science and Engineering West Bengal University of Technology Kolkata India
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure-less network of mobile devices connected by wireless links. Lack of fixed infrastructure, wireless medium, dynamic topology, rapid deployment pract... 详细信息
来源: 评论