咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 12 篇 计算机科学与技术...
    • 8 篇 信息与通信工程
    • 7 篇 电气工程
    • 4 篇 软件工程
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 交通运输工程
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 23 篇 distributed secu...
  • 3 篇 authentication
  • 2 篇 proxy
  • 2 篇 open access
  • 2 篇 grid computing e...
  • 2 篇 iot
  • 2 篇 wireless sensor ...
  • 2 篇 internet
  • 2 篇 software-defined...
  • 2 篇 distributed proc...
  • 2 篇 machine learning
  • 2 篇 security
  • 2 篇 edge computing
  • 2 篇 authorization
  • 2 篇 low latency
  • 2 篇 cpri over ethern...
  • 1 篇 threats
  • 1 篇 smart homes
  • 1 篇 jamming
  • 1 篇 data security

机构

  • 1 篇 fraunhofer heinr...
  • 1 篇 the icfai univer...
  • 1 篇 portugal telecom...
  • 1 篇 fraunhofer heinr...
  • 1 篇 ruhr univ bochum...
  • 1 篇 univ london impe...
  • 1 篇 kings coll londo...
  • 1 篇 portugal telecom...
  • 1 篇 univ manitoba de...
  • 1 篇 georgia state un...
  • 1 篇 department of ma...
  • 1 篇 fundacio i2cat c...
  • 1 篇 school of comput...
  • 1 篇 king fahd univ p...
  • 1 篇 kings coll londo...
  • 1 篇 stockholm univ d...
  • 1 篇 univ novi sad fa...
  • 1 篇 university of es...
  • 1 篇 research center ...
  • 1 篇 jahangirnagar un...

作者

  • 1 篇 wijesekera dumin...
  • 1 篇 vijay somers
  • 1 篇 vidya m. s.
  • 1 篇 saxena himali
  • 1 篇 simoes paulo
  • 1 篇 carlos bock
  • 1 篇 parker michael
  • 1 篇 harn l.
  • 1 篇 patil mala c.
  • 1 篇 bock carlos
  • 1 篇 srinivasan anand
  • 1 篇 mahoney william
  • 1 篇 he dk
  • 1 篇 ivanovic mirjana
  • 1 篇 fiore ugo
  • 1 篇 kumbhare ashish
  • 1 篇 mccarthy john
  • 1 篇 cruz tiago
  • 1 篇 droste t
  • 1 篇 he dake

语言

  • 22 篇 英文
  • 1 篇 其他
检索条件"主题词=distributed security"
23 条 记 录,以下是1-10 订阅
排序:
distributed security for multi-agent systems - review and applications
收藏 引用
IET INFORMATION security 2010年 第4期4卷 188-201页
作者: Rashvand, H. F. Salah, K. Calero, J. M. A. Harn, L. Univ Warwick Coventry CV4 7AL W Midlands England IET Sch Engn Coventry CV4 7AL W Midlands England King Fahd Univ Petr & Minerals Dhahran Saudi Arabia Univ Murcia Fac Informat Espinardo 30100 Spain Univ Missouri Dept Comp Sci Elect Engn Kansas City MO 64110 USA
As two major communication technologies, the Internet and wireless, are maturing rapidly to dominate our civilised life, the authors urgently need to re-establish users' confidence to harvest new potential applica... 详细信息
来源: 评论
QoS-Aware distributed security Architecture for 4G Multihop Wireless Networks
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2014年 第6期63卷 2886-2900页
作者: Rengaraju, Perumalraja Lung, Chung-Horng Srinivasan, Anand Velammal Coll Engn & Technol Dept Informat Technol Madurai 625009 Tamil Nadu India Carleton Univ Dept Syst & Comp Engn Ottawa ON K1S 5B6 Canada EION Wireless Inc Ottawa ON K2K 2E3 Canada
Vehicular communications have received a great deal of attention in recent years due to the demand for multimedia applications during travel and for improvements in safety. Safety applications often require fast messa... 详细信息
来源: 评论
A Formal Model of distributed security for Electronic Commerce Transactions Systems
收藏 引用
INTERNATIONAL JOURNAL OF NETWORKED AND distributed COMPUTING 2019年 第2期7卷 68-84页
作者: Ehikioya, Sylvanus A. Olukunle, Adepele A. Baze Univ Dept Comp Sci Abuja Nigeria Univ Manitoba Dept Comp Sci Winnipeg MB R3T 2N2 Canada
Every distributed system requires a secure environment for its users. security becomes even more important if users exchange sensitive information and value, across the network. An e-commerce environment is an example... 详细信息
来源: 评论
DSF - A distributed security Framework for Heterogeneous Wireless Sensor Networks
DSF - A Distributed Security Framework for Heterogeneous Wir...
收藏 引用
MILCOM Military Communications Conference
作者: Saxena, Himali Ai, Chunyu Valero, Marco Li, Yingshu Beyah, Raheem Georgia State Univ Dept Comp Sci Atlanta GA 30303 USA Troy Univ Comp Sci Troy NY 36082 USA
Wireless sensor networks (WSNs) have many applications that handle sensitive information such as surveillance, reconnaissance, and target tracking. Therefore, a WSN deployed in a hostile region should be resilient to ... 详细信息
来源: 评论
An intelligent security architecture for distributed firewalling environments
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2013年 第2期4卷 223-234页
作者: De Santis, Alfredo Castiglione, Aniello Fiore, Ugo Palmieri, Francesco Univ Salerno Dipartimento Informat RM Capocelli I-84084 Fisciano SA Italy Univ Naples Federico II Informat Serv Ctr I-80126 Naples Italy Univ Naples 2 Dipartimento Ingn Informaz I-81031 Aversa CE Italy
Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficul... 详细信息
来源: 评论
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
收藏 引用
SIMULATION MODELLING PRACTICE AND THEORY 2020年 105卷 102125-102125页
作者: Pesic, Sasa Ivanovic, Mirjana Radovanovic, Milos Badica, Costin Univ Novi Sad Fac Sci Trg Dositeja Obradovica 4 Novi Sad Serbia Univ Craiova Craiova Romania
The pervasive integration of 'things' in the Internet of Things together with state-of-the-art computer systems provide a stimulating environment for creativity and business opportunities, but also a large ran... 详细信息
来源: 评论
Resource Consumption Analysis of distributed Machine Learning for the security of Future Networks
收藏 引用
Procedia Computer Science 2024年 251卷 66-74页
作者: Md Muzammal Hoque Ijaz Ahmad Mohammad Tahir VTT Technical Research Centre of Finland Tekniikantie 21 Espoo 02150 Finland Department of Computing University of Turku Turku FI-20014 Finland
As the network continues to become more complex due to the increased number of devices and ubiquitous connectivity, the trend is shifting from a centralized implementation to decentralization. Similarly, strategies to... 详细信息
来源: 评论
IDENTITY AUTHENTICATION IN HETEROGENEOUS COMPUTING ENVIRONMENTS - A COMPARATIVE-STUDY FOR AN INTEGRATED FRAMEWORK
收藏 引用
COMPUTERS & security 1994年 第3期13卷 231-253页
作者: KANUNGO, S Department of Management Science James Monroe Hall Room 203 The George Washington University Washington DC 20052 USA
Identity authentication systems form the basis of many security mechanisms in many distributed computing environments today. All authentication mechanisms are based on some form of secret sharing coupled with some cry... 详细信息
来源: 评论
DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks
收藏 引用
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING 2014年 第1期2014卷 1页
作者: Bellazreg, Ramzi Boudriga, Noureddine Univ Carthage Higher Sch Commun Commun Networks & Secur Res Lab Carthage Tunisia
Wireless sensor networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. Due to the sensitive nature of the data transmitted by these applications, a... 详细信息
来源: 评论
Weighted communication in a security compound
Weighted communication in a security compound
收藏 引用
5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service
作者: Droste, T Ruhr Univ Bochum Fac Elect Engn & Infomat Technol Dept Comp Sci D-44780 Bochum Germany
In a local area network (LAN), the availability of all network components is indispensable. To reach this goal it is necessary to secure a LAN against unwanted communication from outside. If there is an unauthorized a... 详细信息
来源: 评论