咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是101-110 订阅
排序:
Protocol for secure submissions into learning management systems
Protocol for secure submissions into learning management sys...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Mattam, Manjunath MSIT Division International Institute of Information Technology Gachibowli Hyderabad Andhra Pradesh 500 032 India
This paper proposes a model (architecture and protocol) that will help in securing assignment submissions into learning management systems. A client server architecture that uses cryptography is proposed to transform ... 详细信息
来源: 评论
snds: A distributed monitoring and protocol analysis system for wireless sensor network
SNDS: A distributed monitoring and protocol analysis system ...
收藏 引用
2nd international conference on networks security, Wireless Communications and Trusted Computing, NSWCTC 2010
作者: Kuang, Xin Shen, Jianhua Department of Computer Science and Technology East China Normal University Shanghai China
Monitoring a large-scale wireless sensor networks (WSN) is very difficult, not only because it is large and complex, much of difficulty comes from the lack of visual analysis tools. This paper describes snds (Sensor N... 详细信息
来源: 评论
Experimental DRM model using mobile code and white-box encryption
Experimental DRM model using mobile code and white-box encry...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Ghita, Stefan-Vladimir Patriciu, Victor-Valeriu Bica, Ion Computer Science Department Military Technical Academy Bucharest 050141 Romania
Due to severe DRM failures and the urgent demand for a better solution to solve the existing DRM systems vulnerabilities, this paper discusses the current DRM status, stressing system security objectives and requireme... 详细信息
来源: 评论
ID-based threshold signcryption and group unsigncryption
ID-based threshold signcryption and group unsigncryption
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Mishra, Prashant Kumar Singh, Kunwar Baruntar, Sudhanshu Department of Computer Science Engineering National Institute of Technology Trichy India
Xiaoyu et. al. [1] presented efficient identity based (K, n) threshold signcryption scheme. In this paper, we present variant of [1] with group shared unsigncryption, which is based on discrete logarithm problem in fi... 详细信息
来源: 评论
A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks
A survey of blackhole attacks and countermeasures in wireles...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Banerjee, Subhashis Majumder, Koushik Department of Computer Science and Engineering West Bengal University of Technology Kolkata India
In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. Such network scenarios cannot rely on centralized and organized connectivity, and ca... 详细信息
来源: 评论
security analysis of CAPTCHA
Security analysis of CAPTCHA
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Chandavale, Anjali Avinash Sapkal, A. LMIETE India
CAPTCHA stands for Completely Automated Public Turing test to distinguish computers and Humans apart. CAPTCHA is a program which can generate and grade the tests that it itself cannot pass. The security aspect of CAPT... 详细信息
来源: 评论
Secure authentication in multimodal biometric systems using cryptographic hash functions
Secure authentication in multimodal biometric systems using ...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Ashok, Aravind Poornachandran, Prabaharan Achuthan, Krishnasree Amrita Center for Cyber Security Amrita University Amritapuri Campus Kollam India
In this Information Age, security of personal data is one of the biggest issues faced by most of the nations. Biometrics provides substantial help in guarding against attempts to establish fraudulent multiple identiti... 详细信息
来源: 评论
Crypto-precision: Testing tool for hash function
Crypto-precision: Testing tool for hash function
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Tiwari, Harshvardhan Luthra, Ankit Goel, Himanshu Sharma, Sambhav Asawa, Krishna Computer Science and Engineering Department Jaypee Institute of Information Technology Noida India
In this paper, we present a new generic cryptographic hash function testing tool called Crypto-Precision. It is designed to be adaptable to various Cryptographic Hash Function algorithms and different hash function co... 详细信息
来源: 评论
Effective implementation of des algorithm for voice scrambling
Effective implementation of des algorithm for voice scrambli...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: John, Jinu Elizabeth Remya Ajai, A.S. Poornachandran, Prabaharan Department of ECE Amrita Vishwavidyapeetham India Center for Cyber Security Amrita Vishwavidyapeetham India
This paper presents a high performance reconfigurable hardware implementation of speech scrambling-descrambling system which can be used for military and high security environments. The scrambling algorithm is based o... 详细信息
来源: 评论
Biologically inspired computer security system: The way ahead
Biologically inspired computer security system: The way ahea...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Saurabh, Praneet Verma, Bhupendra Sharma, Sanjeev Department of Computer Science and Engineering TIT Bhopal M.P India Department of Information Technology SoIT RGPV M.P India
Last two decades have witnessed tremendous growth of internet and it acts as a centrifugal force for a whole new array of applications and services which drives the e- business/ commerce globally. Millions of applicat... 详细信息
来源: 评论