咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是4851-4860 订阅
排序:
CBRBrain: provide content based routing service over Internet backbone
CBRBrain: provide content based routing service over Interne...
收藏 引用
international conference on computer Communications and networks (ICCCN)
作者: Wen-Zhan Song Xiang-Yang Li Department of Computer Science Illinois Institute of Technology Chicago IL USA
Peer-to-peer (P2P) networking came from a family of technologies and techniques for organizing distributed applications that takes advantage of the resources available at the Internet edges. In this paper, we propose ... 详细信息
来源: 评论
GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks
GKMPAN: an efficient group rekeying scheme for secure multic...
收藏 引用
international conference on Mobile and Ubiquitous systems: Networking and Services (MobiQuitous)
作者: S. Zhu S. Setia S. Xu S. Jajodia Center for Secure Information Systems George Mason University Fairfax VA USA Department of Computer Science University of Texas San Antonio San Antonio TX USA
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each member of a group is both a host and a rout... 详细信息
来源: 评论
Towards integrating key distribution with entity authentication for efficient, scalable and secure group communication in MANETs
Towards integrating key distribution with entity authenticat...
收藏 引用
IEEE international conference on Communications (ICC)
作者: M. Striki J.S. Baras Electrical and Computer Engineering and the Institute for Systems Research University of Maryland College Park MD USA
We focus on the design of key management (KM) schemes tailored for the environment of Mobile Ad Hoc networks (MANETs). A MANET is a collection of wireless mobile nodes, communicating among themselves over possibly mul... 详细信息
来源: 评论
Threshold and identity-based key management and authentication for wireless ad hoc networks
Threshold and identity-based key management and authenticati...
收藏 引用
international conference on Information Technology: Coding and Computing (ITCC)
作者: Hongmei Deng A. Mukherjee D.P. Agrawal OBR Center for Distributed and Mobile Computing Department of ECECS University of Cincinnati Cincinnati OH USA
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key manageme... 详细信息
来源: 评论
Reliability of intelligent power routers
Reliability of intelligent power routers
收藏 引用
international conference on Probabilistic Methods Applied to Power systems (PMAPS)
作者: C.M. Torres-Ortolaza A.A. Irizarry-Rivera University of Puerto Rico-Mayagüez Mayagüez Puerto Rico
In this work we seek to determine the reliability of intelligent power routers (IPR). The IPR is our building block to provide scalable coordination in a distributed model for the next generation power network. Our go... 详细信息
来源: 评论
CKDS: an efficient combinatorial key distribution scheme for wireless ad-hoc networks
CKDS: an efficient combinatorial key distribution scheme for...
收藏 引用
IEEE international conference on Performance, Computing and Communications (IPCCC)
作者: M. Moharrum R. Mukkamala M. Eltoweissy Department of Computer Science Old Dominion University Spain Department of Computer Science Virginia Tech
Computing and communications in wireless ad hoc networks (WAHNs) generally require collaboration among groups of peers. This, in addition to a growing number of group applications over WAHNs, have motivated research i... 详细信息
来源: 评论
Parameterized specification and verification of the Chilean electronic invoices system
Parameterized specification and verification of the Chilean ...
收藏 引用
computer Science Society (SCCC) international conference Chilean FLAGGED
作者: I. Attali T. Barros E. Madelaine I.N.R.I.A. Sophia Antipolis France
We present the complete process of a formal specification and verification of the Chilean electronic invoice system which has been defined by the tax agency. We use this case study as a real-world and real-size exampl... 详细信息
来源: 评论
Data management over the GRID: heaven or hell?
Data management over the GRID: heaven or hell?
收藏 引用
international Working conference on Scientific and Statistical Database Management
作者: Y. Ioannidis Department of Informatics and Telecommunications University of Athens (NKUA) Greece
The last decade has seen unprecedented advances in network and distributed-system technologies, which have opened up the way for the construction of global-scale systems based on completely new conceptions of computat... 详细信息
来源: 评论
Probabilistic inference strategy in distributed intrusion detection systems  04
收藏 引用
Proceedings of the Second international conference on Parallel and distributed Processing and Applications
作者: Jianguo Ding Shihao Xu Bernd Krämer Yingcai Bai Hansheng Chen Jun Zhang Shanghai Jiao Tong University Shanghai P.R. China FernUniversität Hagen Hagen Germany East-china Institute of Computer Technology P.R. China
The level of seriousness and sophistication of recent cyber-attacks has risen dramatically over the past decade. This brings great challenges for network protection and the automatic security management. Quick and exa...
来源: 评论
Trellis-SDP: A simple data-parallel programming interface
Trellis-SDP: A simple data-parallel programming interface
收藏 引用
international conference on Parallel Processing Workshops (ICPPW)
作者: Meng Ding P. Lu Department of Computing Science University of Alberta Edmonton AB Canada
Some datasets and computing environments are inherently distributed. For example, image data may be gathered and stored at different locations. Although data parallelism is a well-known computational model, there are ... 详细信息
来源: 评论