咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是141-150 订阅
排序:
Performance analysis and improvement using LFSR in the pipelined key scheduling section of DES
Performance analysis and improvement using LFSR in the pipel...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Sruthi, P.V. Poornachandran, Prabaharan Remya Ajai, A.S. Dept. of ECE Amrita University Amritapuri India Amrita Centre for Cyber Security Amrita University Amritapuri India
In this paper, DES algorithm is implemented by applying pipelining concept to the key scheduling part. Using this implementation, it is possible to have the key length equal to data length;which further improves the s... 详细信息
来源: 评论
Comparing Symmetric-key and Public-key based security Schemes in Sensor networks: A Case Study of User Access Control
Comparing Symmetric-key and Public-key based Security Scheme...
收藏 引用
28th international conference on distributed Computing systems
作者: Wang, Haodong Sheng, Bo Tan, Chiu C. Li, Qun Coll William & Mary Williamsburg VA 23187 USA
While symmetric-key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may introduce large memory and communication overhead. On the contrary, public... 详细信息
来源: 评论
A similarity model to estimate attack strategy based on intentions analysis for network forensics
A similarity model to estimate attack strategy based on inte...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Jantan, Aman Rasmi, Mohammad Ibrahim, Mohd Izham Rahman, Azri H. A. School of Computer Sciences University Sciences Malaysia Penang 11800 Malaysia
Attack analysis acts as a center of gravity in network forensics to resolve the cyber crime cases. Nowadays, the cyber crime strategies have increasingly become more complicated in the digital world. This paper propos... 详细信息
来源: 评论
Analysis of Semantic Attacks in Online Social networks
Analysis of Semantic Attacks in Online Social Networks
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Kumar, K.P.Krishna Geethakumari, G. BITS-Pilani Hyderabad Campus Hyderabad India
The emergence of online social networks as an important media for communication and information dissemination during the last decade has also seen the increase in abuse of the media to spread misinformation, disinform... 详细信息
来源: 评论
Multi-agent peer-to-peer intrusion detection
收藏 引用
4th international conference on Mathematical Methods, Models, and Architectures for computer Network security
作者: Gorodetsky, Vladimir Karsaev, Oleg Samoylov, Vladimir Serebryakov, Sergey St Petersburg Inst Informat & Automat 39 St Petersburg 199718 Russia
Ever increasing use of heterogeneous networks including mobile devices and ad-hoc sensor networks signifies the role of such information systems' properties as openness, autonomy, cooperation, coordination, etc. A... 详细信息
来源: 评论
A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc networks
A Trust Model for Directory-Based Service Discovery in Mobil...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Deepa, R. Swamynathan, S. Department of Information Science and Technology College of Engineering Anna University Chennai India
Trust computation and management are significant areas of research in mobile ad hoc networks, since the mobile nodes are vulnerable to security threats. A trust mechanism allows the participating nodes to maintain tru... 详细信息
来源: 评论
An adaptive distributed intrusion detection system for cloud computing framework
An adaptive distributed intrusion detection system for cloud...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Krishnan, Deepa Chatterjee, Madhumita Pillai's Institute of Information Technology New Panvel Mumbai India
Cloud Computing is the recent buzz word in computing which has enormous potential to revolutionize the IT industry. Cloud opened up new computing scenarios coupled with many significant benefits, however they also tur... 详细信息
来源: 评论
Parallel and distributed Computing and networks  2011
收藏 引用
丛书名: Communications in computer and Information Science
2011年
作者: Luo Qi
This book constitutes the refereed proceedings of the international conference on Parallel and distributed Computing and networks, PDCN 2011, held in Chongqing, China, in December 2010. The 19 revised full papers pres...
来源: 评论
Three-way handshake-based OTP using random host-side keys for effective key transfer in symmetric cryptosystems
Three-way handshake-based OTP using random host-side keys fo...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Mahalingam, P.R. Department of Computer Science Rajagiri School of Engineering and Technology Rajagiri Valley Cochin India
Vernam cipher is said to be one of the most secure cipher systems in use, based on the key size. It is derived from the One-Time Pad (OTP) method. One of the main features of the cipher is that it is completely revers... 详细信息
来源: 评论
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree
Secure group key management scheme for simultaneous multiple...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
作者: Purushothama, B.R. Shirisha, Kusuma Amberker, B.B. Department of Computer Science and Engineering National Institute of Technology Warangal Andhra Pradesh 506004 India
The rich literature available for key management schemes for Secure Group Communication focuses on operating only a single group. We consider the operation of simultaneous/concurrent multiple groups in the Secure Grou... 详细信息
来源: 评论