咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是4971-4980 订阅
排序:
TweetHood: Agglomerative clustering on fuzzy k-closest friends with variable depth for location mining
TweetHood: Agglomerative clustering on fuzzy k-closest frien...
收藏 引用
IEEE International conference on Social Computing
作者: Abrol, Satyen Khan, Latifur Department of Computer Science University of Texas at Dallas 800 W Campbell Road Richardson TX 75083 United States
According to a recent report by research firm ABI Research, location-based social networks could reach revenues as high as $13.3 billion by 2014 [1]. Social Networks like Foursquare and Gowalla are in a dead heat in t... 详细信息
来源: 评论
Dark gold: Statistical properties of clandestine networks in massively multiplayer online games
Dark gold: Statistical properties of clandestine networks in...
收藏 引用
IEEE International conference on Social Computing
作者: Keegan, Brian Ahmed, Muhammad Aurangzeb Williams, Dmitri Srivastava, Jaideep Contractor, Noshir School of Communication Northwestern University Evanston IL 60201 United States Dept. of Computer Science and Engineering University of Minnesota Minneapolis MN 55455 United States Annenberg School of Communication University of Southern California Los Angeles CA 90089 United States
Gold farming is a set of illicit practices in which players in massively multiplayer online games gather and distribute virtual goods for real money. Using anonymized data from a popular online game to construct netwo... 详细信息
来源: 评论
An advanced cloaking algorithm using Hilbert curves for anonymous location based service
An advanced cloaking algorithm using Hilbert curves for anon...
收藏 引用
IEEE International conference on Social Computing
作者: Um, Jung-Ho Kim, Hee-Dae Chang, Jae-Woo Dept. of Computer Engineering Chonbuk National University Chonju Chonbuk 561-756 Korea Republic of
Location Based Services (LBSs) have recently attracted much attention due to the advancement of GPS facilitates. In LBS, the private and confidential information of user may disclose to others since LBS need a user... 详细信息
来源: 评论
Cross-domain authentication model in SOA based on Enterprise Service Bus
Cross-domain authentication model in SOA based on Enterprise...
收藏 引用
2010 2nd International conference on computer Engineering and Technology, ICCET 2010
作者: Xiaorong, Zheng Department of Computer Science Chongqing Vocational Instituteof Engineering Chongqing China
To solve the security issues of cross-domain authentication in SOA, the paper proposed a Cross-Domain Authentication Model in SOA based on Enterprise Service Bus. The CDAM-ESB took use of Enterprise Service Bus as a t... 详细信息
来源: 评论
security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds
Security Audits of Multi-tier Virtual Infrastructures in Pub...
收藏 引用
Cloud Computing security Workshop (CCSW)
作者: Bleikertz, Soren Schunter, Matthias Probst, Christian W. Pendarakis, Dimitrios Eriksson, Konrad IBM Res Zurich Zurich Switzerland Tech Univ Denmark Lyngby Denmark IBM TJ Watson Res Ctr Yorktown Hts NY USA InfraSight Labs Malmo Sweden
Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low up... 详细信息
来源: 评论
Scalable pseudo random RFID private mutual authentication
Scalable pseudo random RFID private mutual authentication
收藏 引用
2010 2nd International conference on computer Engineering and Technology, ICCET 2010
作者: Fu, Jianqing Wu, Chunming Chen, Xiaoping Fan, Rong Ping, Lingdi College of Computer Science and Technology Zhejiang University Hang Zhou China
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present problems that may discourage potential users. Hence, high confidence... 详细信息
来源: 评论
Formal description for trusted application environment
Formal description for trusted application environment
收藏 引用
International conference on Information Engineering and computer Science
作者: Gong, Lei Zhao, Yong Institute of Electronic Technology Information Engineering University Zhengzhou China Key Lab of Information Network Security Ministry of Public Security Shanghai China Institute of Computer Science Beijing University of Technology Beijing China
Application environment is the necessary condition for an application system running. If the application environment can be trusted, then the application system could run safely and reliably. This paper firstly analyz... 详细信息
来源: 评论
A distributed node self-monitoring mechanism in wireless sensor networks
A distributed node self-monitoring mechanism in wireless sen...
收藏 引用
2nd International conference on Information Science and Engineering, ICISE2010
作者: Wei, Guiyi Zhu, Zhiqiang Mao, Yunxin Xiong, Naixue School of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou 310018 China Department of Computer Science Georgia State Universit Atlanta United States
Self-monitoring is an important mechanism for the security of wireless sensor networks. In this work we propose a novel distributed node self-monitoring mechanism for wireless sensor networks. Assuming a sensor node c... 详细信息
来源: 评论
Service and cloud computing oriented web GIS for labor and social security applications
Service and cloud computing oriented web GIS for labor and s...
收藏 引用
2nd International conference on Information Science and Engineering, ICISE2010
作者: Lu, Xiaolin College of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou 310012 China
The service and cloud computing oriented architecture is a very promising architecture for practical implementation of the next generation geographical information systems. This paper investigated the service and clou... 详细信息
来源: 评论
An improved provably secure three-party key exchange protocol
An improved provably secure three-party key exchange protoco...
收藏 引用
2010 2nd International conference on computer Engineering and Technology, ICCET 2010
作者: Tsaur, Maw-Jinn Ku, Wei-Chi Lin, Jenn-Wei Shen, Yu-Ze Graduate Institute of Applied Science and Engineering Fu Jen Catholic University Taipei 242 Taiwan Department of Computer and Information Science National Taichung University Taichung 403 Taiwan Department of Computer Science and Information Engineering Fu Jen Catholic University Taipei 242 Taiwan
Recently, Chung and Ku showed that the S-3PAKE (simple three-party password-based authenticated key exchange) protocol proposed by Lu and Cao is vulnerable to an impersonation-of-initiator attack, an impersonation-of-... 详细信息
来源: 评论