咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是121-130 订阅
排序:
A new approach towards segmentation for breaking CAPTCHA
A new approach towards segmentation for breaking CAPTCHA
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Chandavale, Anjali Avinash Sapkal, A. LMIETE India
CAPTCHAs (Completely Automated Public Turing test to tell computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. CAPTCHAs are d... 详细信息
来源: 评论
Lightweight cryptographic primitives for mobile ad hoc networks
Lightweight cryptographic primitives for mobile ad hoc netwo...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Kumar, Adarsh Aggarwal, Alok Computer Science Engineering and Information Technology Department Jaypee Institute of Information Technology Noida India
The tight computing constraints of low capacity mobile devices require lightweight cryptographic implementations.A software and hardware based performance analysis of cryptographic primitives: lightweight encryption/d... 详细信息
来源: 评论
A security Framework for Multi-authority Based e-Sealed Bid Auction System
A Security Framework for Multi-authority Based e-Sealed Bid ...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Sinha, Sourav Jenamani, Mamata Department of Industrial Engineering and Management Indian Institute of Technology Kharagpur India
In a typical organization multiple authorities may participate in purchasing process. Online implementation of such system should properly distribute security control over multiple-authorities to ensure trust among th... 详细信息
来源: 评论
Efficient Weighted innovative Routing Protocol (EWiRP) to balance load in Mobile Ad Hoc networks (MANETs): Simulation and feasibility analysis
Efficient Weighted innovative Routing Protocol (EWiRP) to ba...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Goel, Nitin Sangwan, Shruti Jangra, Ajay Associate-Solutions Decimal Technologies Pvt. Ltd. Gurgaon Haryana India CSE Department UIET Kurukshetra University Kurukshetra Haryana India
Mobile Ad Hoc networks (MANETs) are vulnerable to having their optimality in variety of operations and calculations, compromised by various challenges. After an analysis on MANET routing, a load balancing and resource... 详细信息
来源: 评论
Provably secure single sign-on scheme in distributed systems and networks
Provably secure single sign-on scheme in distributed systems...
收藏 引用
11th IEEE international conference on Trust, security and Privacy in Computing and Communications, TrustCom-2012
作者: Yu, Jiangshan Wang, Guilin Mu, Yi Center for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia
distributed systems and networks have been adopted by telecommunications, remote educations, businesses, armies and governments. A widely applied technique for distributed systems and networks is the single sign-on (S... 详细信息
来源: 评论
distributed ROUTING AND RELAY MANAGEMENT IN MOBILE PACKET RADIO networks.
Proceedings - IEEE Computer Society International Conference
收藏 引用
Proceedings - IEEE computer Society international conference 1980年 235-243页
作者: Liu, Jane W.S.
This report contains an analysis of the current states of art in the areas of vehicle location techniques, traffic handling protocols, network stability control, and security/authentication schemes. In particular, per... 详细信息
来源: 评论
Collaborative Approach for Data Integrity Verification in Cloud Computing
Collaborative Approach for Data Integrity Verification in Cl...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Saxena, Rajat Dey, Somnath Department of Computer Science and Engineering Indian Institute of Technology Indore India
High security is one of leading restriction for shining up bright eras and vision of Cloud computing. In latest trend of Cloud, all the sensitive applications and data are moved towards cloud infrastructure and data c... 详细信息
来源: 评论
Publicly auditable provable data possession scheme for outsourced data in the public cloud using polynomial interpolation
Publicly auditable provable data possession scheme for outso...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Purushothama, B.R. Amberker, B.B. Department of Computer Science and Engineering National Institute of Technology Warangal Andhra Pradesh 506004 India
Cloud computing paradigm provides computing and storage infrastructure for the clients to outsource their data and computation. This new computing paradigm poses several security challenges. We focus on the problem of... 详细信息
来源: 评论
Secure leader election algorithm optimized for power saving using mobile agents for intrusion detection in MANET
Secure leader election algorithm optimized for power saving ...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Darji, Monika Trivedi, Bhushan L.J Institute of Computer Application Ahmedabad India GLS Institute of Computer Technology Ahmedabad India
In this paper we reduce the communication and computation overhead involved in Leader Election for running Intrusion Detection System (IDS) for a cluster of nodes in mobile ad hoc networks using Mobile Agents. To redu... 详细信息
来源: 评论
Providing secrecy in key management protocols for large wireless sensors networks
收藏 引用
Ad Hoc networks 2003年 第4期1卷 455-468页
作者: Pietro, Roberto Di Mancini, Luigi V. Jajodia, Sushil Dipartimento di Informatica Univ. di Roma La Sapienza Via Salaria 113 00198 Roma Italy Ctr. for Secure Information Systems George Mason University University Drive VA 22030 United States
This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if... 详细信息
来源: 评论