咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 17 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 27 篇 security algorit...
  • 5 篇 cryptography
  • 4 篇 encryption
  • 2 篇 internet of thin...
  • 2 篇 cms system
  • 2 篇 enterprise-class...
  • 2 篇 access control
  • 2 篇 md5
  • 2 篇 iot
  • 2 篇 rsa
  • 2 篇 asymmetric
  • 2 篇 web site securit...
  • 2 篇 mrc (maximum rat...
  • 2 篇 application laye...
  • 2 篇 security
  • 2 篇 aes
  • 2 篇 symmetric
  • 2 篇 3des
  • 2 篇 rc6
  • 1 篇 cyber security

机构

  • 2 篇 qatar univ dept ...
  • 2 篇 rajshahi univ en...
  • 2 篇 univ technol syd...
  • 1 篇 univ politecn sa...
  • 1 篇 chinese acad sci...
  • 1 篇 delhi technol un...
  • 1 篇 n china elect po...
  • 1 篇 chinese acad sci...
  • 1 篇 brac univ dept c...
  • 1 篇 shaanxi yanchang...
  • 1 篇 escuela politecn...
  • 1 篇 univ chinese aca...
  • 1 篇 prist univ thanj...
  • 1 篇 ims ghaziabad
  • 1 篇 laval univ dept ...
  • 1 篇 university of pe...
  • 1 篇 mumbai univ thad...
  • 1 篇 henan tech coll ...
  • 1 篇 department of co...
  • 1 篇 infocity tech ma...

作者

  • 2 篇 chen joy iong-zo...
  • 2 篇 akter afifa
  • 2 篇 muyeen s. m.
  • 2 篇 sarker subrata k...
  • 2 篇 zafir ehsanul is...
  • 1 篇 akashdeep bhardw...
  • 1 篇 cui ping
  • 1 篇 ming-quan zhang
  • 1 篇 rajput shyam sin...
  • 1 篇 gupta avadesh ku...
  • 1 篇 sengupta anirban
  • 1 篇 li li
  • 1 篇 zhang zhujun
  • 1 篇 li tian
  • 1 篇 fan wei
  • 1 篇 liu cong
  • 1 篇 hashem m. m. a.
  • 1 篇 malgaonkar saura...
  • 1 篇 wei qinfang
  • 1 篇 hou rui

语言

  • 25 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Security algorithm"
27 条 记 录,以下是21-30 订阅
排序:
A Key Based security Mechanism for Payment Status in Cloud Service Access Control System
A Key Based Security Mechanism for Payment Status in Cloud S...
收藏 引用
International Conference on Advances in Computing, Communications and Informatics ICACCI
作者: Kaur, Gagandeep Kaur, Arvinder Chandigarh Univ Dept Comp Sci Mohali Punjab India
Cloud computing is widely accepted dominant paradigm that provides a number of resources and cost effective software services to their clients as they demand such as Software as a Service, Platform as a Service and In... 详细信息
来源: 评论
security evaluation algorithm for enterprise-class CMS website system
Security evaluation algorithm for enterprise-class CMS websi...
收藏 引用
7th International Conference on Machine Learning and Cybernetics
作者: Mei, Hua-Wei Li, Tian Zhang, Ming-Quan N China Elect Power Univ Dept Comp Sci Baoding 071002 Peoples R China
This paper analyses network security issues for the majority of enterprise-class CMS website's framework, carrying out safety analyses detailed on all servers by using safety testing tools such as X-Scan. After a ... 详细信息
来源: 评论
A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System
收藏 引用
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT 2011年 第3期19卷 319-342页
作者: Sengupta, Anirban Mazumdar, Chandan Bagchi, Aditya Jadavpur Univ Dept Comp Sci & Engn Ctr Distributed Comp Kolkata 700032 W Bengal India Indian Stat Inst Kolkata 700108 W Bengal India
From information security point of view, an enterprise is considered as a collection of assets and their interrelationships. These interrelationships may be built into the enterprise information infrastructure, as in ... 详细信息
来源: 评论
Privacy preservation with X.509 standard certificates
收藏 引用
INFORMATION SCIENCES 2011年 第13期181卷 2906-2921页
作者: Kwon, Taekyoung Sejong Univ Dept Comp Engn Seoul 143747 South Korea
Privacy preservation has become an essential requirement in today's computing environment;abuse based on anonymity and user-controlled pseudonyms is a serious problem. For prompt deployment in legacy information s... 详细信息
来源: 评论
security EVALUATION algorithm FOR ENTERPRISE-CLASS CMS WEBSITE SYSTEM
SECURITY EVALUATION ALGORITHM FOR ENTERPRISE-CLASS CMS WEBSI...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: HUA-WEI MEI TIAN LI MING-QUAN ZHANG Department of Computer Science North China Electric Power University Baoding 071002 China
This paper analyses network security issues for the majority of enterprise-class CMS website's framework, carrying out safety analyses detailed on all servers by using safety testing tools such as X-Scan. After a ... 详细信息
来源: 评论
Applying security algorithms against Cyber Attacks in the Distribution Automation System
Applying Security Algorithms against Cyber Attacks in the Di...
收藏 引用
2008 IEEE/PES Transmission & Distribution Conference & Exposition, part 1
作者: I. H. Lim S. Hong M. S. Choi S. J. Lee S. W. Lee B. N. Ha Next-generation Power Technology Center Department of Electrical Engineering and Computer Software Engineering Myongji University Yongin si South Korea KEPRI Daejeon South Korea
As the communication technology weighs heavily in the power system, so the security issues becomes major concerns. So far most security research has focused on the SCADA system. In this paper we consider the security ... 详细信息
来源: 评论
Design and Analysis of Secure Clustering algorithm for Wireless Sensors Networks
Design and Analysis of Secure Clustering Algorithm for Wirel...
收藏 引用
20th Chinese Control and Decision Conference
作者: Hu Xiangdong Wei Qinfang Cui Ping Zhu Yunbo Cai Dongqiang Zhang Jie Chongqing Univ Posts & Telecommun Automat Inst Chongqing 400065 Peoples R China
Cluster formation of nodes in wireless sensor network is an effective approach and key technology to implement energy saving and flexible management. To improve security and efficiency of clustering network, a secure ... 详细信息
来源: 评论