咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 9 篇 会议
  • 4 篇 学位论文

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 15 篇 计算机科学与技术...
    • 13 篇 信息与通信工程
    • 12 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 软件工程
    • 2 篇 仪器科学与技术
    • 1 篇 机械工程
    • 1 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 24 篇 distributed comp...
  • 4 篇 user identificat...
  • 4 篇 security
  • 4 篇 key distribution
  • 4 篇 anonymity
  • 3 篇 authentication
  • 2 篇 network planning
  • 2 篇 operating system...
  • 2 篇 real-time proces...
  • 2 篇 survivable netwo...
  • 2 篇 microcomputers
  • 2 篇 microprocessors
  • 2 篇 operating system
  • 1 篇 loaded highspeed...
  • 1 篇 access control
  • 1 篇 user anonymity
  • 1 篇 team formation
  • 1 篇 autonomous agent
  • 1 篇 key establishmen...
  • 1 篇 gigabit network

机构

  • 4 篇 naval postgradua...
  • 1 篇 commonwealth sci...
  • 1 篇 natl chung hsing...
  • 1 篇 int inst informa...
  • 1 篇 off natl etud & ...
  • 1 篇 educom networkin...
  • 1 篇 indian inst tech...
  • 1 篇 vlatacom doo bel...
  • 1 篇 vlatacom d.o.o.
  • 1 篇 hangzhou normal ...
  • 1 篇 vlatacom d.o.o
  • 1 篇 ternopil natl ec...
  • 1 篇 natl chi nan uni...
  • 1 篇 fo guang univ de...
  • 1 篇 inst comp sci pl...
  • 1 篇 chang gung univ ...
  • 1 篇 yuri gagarin sta...
  • 1 篇 volgograd state ...
  • 1 篇 univ wollongong ...
  • 1 篇 asia univ dept a...

作者

  • 2 篇 chien hung-yu
  • 1 篇 roberts mm
  • 1 篇 kudriashov y
  • 1 篇 bianchini rp
  • 1 篇 saleh k
  • 1 篇 mul o
  • 1 篇 klinefelter step...
  • 1 篇 b. tesanovic-sto...
  • 1 篇 yu jiangshan
  • 1 篇 das ashok kumar
  • 1 篇 milicevic s.
  • 1 篇 van phu tran
  • 1 篇 jaragh m
  • 1 篇 calvo rafael
  • 1 篇 penczek w
  • 1 篇 matyja o
  • 1 篇 puzovic s.
  • 1 篇 voronych artur
  • 1 篇 peltier jp
  • 1 篇 oppong jk

语言

  • 20 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"主题词=distributed computer networks"
24 条 记 录,以下是1-10 订阅
排序:
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
收藏 引用
SECURITY AND COMMUNICATION networks 2015年 第9期8卷 1732-1751页
作者: Odelu, Vanga Das, Ashok Kumar Goswami, Adrijit Indian Inst Technol Dept Math Kharagpur 721302 W Bengal India Int Inst Informat Technol Ctr Secur Theory & Algorithm Res Hyderabad 500032 Andhra Pradesh India
A user authentication in the distributed computer networks (DCNs) plays a crucial rule to verify whether the user is a legal user and can therefore be granted access to the requested services to that user. In recent y... 详细信息
来源: 评论
Analysis of Objective Trees in Security Management of distributed computer networks of Enterprises and Organizations  1
收藏 引用
22nd International Conference on computer networks (CN)
作者: Dolinina, Olga Kushnikov, Vadim Kulakova, Ekaterina Yuri Gagarin State Tech Univ Saratov Dept Appl Informat Technol Saratov 410054 Russia
The paper contains the formulation of the problem of situational safety management of distributed computer networks, mathematical models and algorithms, which can help to identify quickly and eliminate the causes of s... 详细信息
来源: 评论
Cryptanalysis of some user identification schemes for distributed computer networks
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 2014年 第11期27卷 2909-2917页
作者: Chen, Yu-Chi Liu, Chao-Liang Horng, Gwoboa Natl Chung Hsing Univ Dept Comp Sci & Engn Taichung 402 Taiwan Asia Univ Dept Appl Informat & Multimedia Taichung Taiwan
User identification plays an important role for access control in networks. Recently, Hsu and Chuang proposed a user identification scheme for distributed computer networks, which can also provide key agreement and us... 详细信息
来源: 评论
Security Analysis of a Single Sign-On Mechanism for distributed computer networks
收藏 引用
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2013年 第1期9卷 294-302页
作者: Wang, Guilin Yu, Jiangshan Xie, Qi Univ Wollongong Sch Comp Sci & Software Engn Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia Hangzhou Normal Univ Sch Informat Sci & Engn Hangzhou 310036 Zhejiang Peoples R China
Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee pr... 详细信息
来源: 评论
Designing a shared access memory and its application in data transmission and protection systems  14
Designing a shared access memory and its application in data...
收藏 引用
14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and computer Engineering (TCSET)
作者: Humenny, Petro Volynskyy, Orest Albanskiy, Ivan Voronych, Artur Ternopil Natl Econ Univ Dept Specialized Comp Syst Ternopol Ukraine IFNTUOG Dept Comp Syst & Networks Ivano Frankivsk Ukraine
The method of parallel access of a large number of subscribers to a shared memory, based on Galois field codes is developed. This method provides parallel data recording into multiport memory of the subscribers' m... 详细信息
来源: 评论
Yet Another Method for Heterogeneous Data Fusion and Preprocessing in Proactive Decision Support Systems: distributed Architecture Approach  20th
Yet Another Method for Heterogeneous Data Fusion and Preproc...
收藏 引用
20th International Conference on distributed and computer and Communication networks (DCCN)
作者: Van Phu Tran Shcherbakov, Maxim Tuan Anh Nguyen Volgograd State Tech Univ Dept Comp Aided Design Lenin Ave 28 Volgograd 400005 Russia
In the multi-sensors environment, the crucial issue is collecting data from different sources. The paper considers the problem of data gathering from different data sources in the framework of proactive intelligent de... 详细信息
来源: 评论
SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING 2016年 第2期4卷 301-315页
作者: Thilakanathan, Danan Chen, Shiping Nepal, Surya Calvo, Rafael Univ Sydney Sch Elect & Informat Engn Sydney NSW 2006 Australia Commonwealth Sci & Ind Res Org Data61 Marsfield NSW 2122 Australia
There are many cloud-based applications consumed by users, which encourage data sharing with not only peers, but also new friends and collaborators. Data are increasingly being stored outside the confines of the data ... 详细信息
来源: 评论
Implementation of Lavia-Manning Algorithm for Network Topology Design
Implementation of Lavia-Manning Algorithm for Network Topolo...
收藏 引用
21st Telecommunications Forum (TELFOR)
作者: Puzovic, S. Milicevic, S. Bozilovic, B. Tesanovic-Stojanovic, B. Vlatacom Doo Belgrade 11000 Serbia
In this work the problem of network topology design is considered. It is crucial that network continues to work even if some nodes or links fail. Survivability criterion poses a demand for a certain number of distinct... 详细信息
来源: 评论
Implementation of Lavia-Manning Algorithm for Network Topology Design
Implementation of Lavia-Manning Algorithm for Network Topolo...
收藏 引用
Telecommunications Forum Telfor
作者: S. Puzovic S. Milicevic B. Bozilovic B. Tesanovic-Stojanovic Vlatacom d.o.o Vlatacom d.o.o.
In this work the problem of network topology design is considered. It is crucial that network continues to work even if some nodes or links fail. Survivability criterion poses a demand for a certain number of distinct... 详细信息
来源: 评论
Practical anonymous user authentication scheme with security proof
收藏 引用
computerS & SECURITY 2008年 第5-6期27卷 216-223页
作者: Chien, Hung-Yu Natl Chi Nan Univ Dept Informat Management Nantou Hsien Taiwan
An authenticated key distribution scheme preserving user anonymity is important to those e-commerce applications where user anonymity is required or desirable. However, the previous works on this issue have security f... 详细信息
来源: 评论