咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 12 篇 计算机科学与技术...
    • 8 篇 信息与通信工程
    • 7 篇 电气工程
    • 4 篇 软件工程
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 交通运输工程
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 24 篇 distributed secu...
  • 3 篇 authentication
  • 2 篇 proxy
  • 2 篇 open access
  • 2 篇 grid computing e...
  • 2 篇 iot
  • 2 篇 wireless sensor ...
  • 2 篇 internet
  • 2 篇 software-defined...
  • 2 篇 distributed proc...
  • 2 篇 machine learning
  • 2 篇 security
  • 2 篇 edge computing
  • 2 篇 authorization
  • 2 篇 low latency
  • 2 篇 cpri over ethern...
  • 1 篇 internet of thin...
  • 1 篇 threats
  • 1 篇 smart homes
  • 1 篇 intrusion detect...

机构

  • 1 篇 fraunhofer heinr...
  • 1 篇 the icfai univer...
  • 1 篇 portugal telecom...
  • 1 篇 fraunhofer heinr...
  • 1 篇 ruhr univ bochum...
  • 1 篇 univ london impe...
  • 1 篇 kings coll londo...
  • 1 篇 portugal telecom...
  • 1 篇 univ manitoba de...
  • 1 篇 georgia state un...
  • 1 篇 department of co...
  • 1 篇 department of ma...
  • 1 篇 fundacio i2cat c...
  • 1 篇 school of comput...
  • 1 篇 king fahd univ p...
  • 1 篇 kings coll londo...
  • 1 篇 stockholm univ d...
  • 1 篇 univ novi sad fa...
  • 1 篇 university of es...
  • 1 篇 research center ...

作者

  • 1 篇 wijesekera dumin...
  • 1 篇 vijay somers
  • 1 篇 vidya m. s.
  • 1 篇 saxena himali
  • 1 篇 simoes paulo
  • 1 篇 carlos bock
  • 1 篇 parker michael
  • 1 篇 harn l.
  • 1 篇 patil mala c.
  • 1 篇 bock carlos
  • 1 篇 srinivasan anand
  • 1 篇 mahoney william
  • 1 篇 he dk
  • 1 篇 ivanovic mirjana
  • 1 篇 fiore ugo
  • 1 篇 kumbhare ashish
  • 1 篇 mccarthy john
  • 1 篇 cruz tiago
  • 1 篇 droste t
  • 1 篇 he dake

语言

  • 23 篇 英文
  • 1 篇 其他
检索条件"主题词=distributed security"
24 条 记 录,以下是11-20 订阅
排序:
IDENTITY AUTHENTICATION IN HETEROGENEOUS COMPUTING ENVIRONMENTS - A COMPARATIVE-STUDY FOR AN INTEGRATED FRAMEWORK
收藏 引用
COMPUTERS & security 1994年 第3期13卷 231-253页
作者: KANUNGO, S Department of Management Science James Monroe Hall Room 203 The George Washington University Washington DC 20052 USA
Identity authentication systems form the basis of many security mechanisms in many distributed computing environments today. All authentication mechanisms are based on some form of secret sharing coupled with some cry... 详细信息
来源: 评论
Qualitative Study of security Resiliency Towards Threats in Future Internet Architecture  2nd
Qualitative Study of Security Resiliency Towards Threats in ...
收藏 引用
2nd Conference on Computational Methods in Systems and Software (CoMeSySo)
作者: Vidya, M. S. Patil, Mala C. BMSIT & M Dept Comp Sci & Engn Bengaluru India Univ Hort Sci COHB Dept Comp Sci Bagalkot India
With the consistent evolution of distributed networks and cloud computing, the communication process of existing Internet architecture are not at par to offer comprehensive security;thereby fails to cater up the dynam... 详细信息
来源: 评论
Weighted communication in a security compound
Weighted communication in a security compound
收藏 引用
5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service
作者: Droste, T Ruhr Univ Bochum Fac Elect Engn & Infomat Technol Dept Comp Sci D-44780 Bochum Germany
In a local area network (LAN), the availability of all network components is indispensable. To reach this goal it is necessary to secure a LAN against unwanted communication from outside. If there is an unauthorized a... 详细信息
来源: 评论
security issues in National High Performance Computing Environment
Security issues in National High Performance Computing Envir...
收藏 引用
4th International Conference on Parallel and distributed Computing, Applications and Technologies (PDCAT 2003)
作者: Wang, JB He, DK Yang, SY SW Jiaotong Univ Sch Comp & Commun Engn Chengdu Peoples R China
It is the purpose of this paper to present some practical security issues related to National High Performance Computing Environment (NHPCE), the computational grid. Based on the security requirements of NHPCE we disc... 详细信息
来源: 评论
Trust in Internet of Things: An architecture for the future IoT network
Trust in Internet of Things: An architecture for the future ...
收藏 引用
International Conference on Innovation in Engineering and Technology (ICIET)
作者: Sadique, Kazi Masum Rahmani, Rahim Johannesson, Paul Stockholm Univ Dept Comp & Syst Sci Stockholm Sweden
Current technology driven world is moving forward with massive implementation of smart objects. These smart objects or Internet of Things (IoT) nodes are involved in sensing of real time critical data from surrounding... 详细信息
来源: 评论
Software-Defined Open Architecture for Front-and Backhaul in 5G Mobile Networks
Software-Defined Open Architecture for Front-and Backhaul in...
收藏 引用
16th International Conference on Transparent Optical Networks (ICTON)
作者: Jungnickel, Volker Habel, Kai Parker, Michael Walker, Stuart Bock, Carlos Riera, Jordi Ferrer Marques, Victor Levi, David Fraunhofer Heinrich Hertz Inst Einsteinufer 37 D-10587 Berlin Germany Univ Essex Colchester C04 3SQ Essex England Fundacio i2CAT E-08034 Barcelona Spain Portugal Telecom Inovacao P-3810106 Aveiro Portugal Ethern Networks Ltd IL-71520 Lod Israel
New software-defined open network concepts are proposed in this paper to enable an efficient implementation of front-and backhaul solutions for future 5G mobile networks. Main requirements for 5G front-and backhaul ar... 详细信息
来源: 评论
SEVA: A Smart Electronic Voting Application Using Blockchain Technology  4
SEVA: A Smart Electronic Voting Application Using Blockchain...
收藏 引用
4th IEEE International Conference on Blockchain (Blockchain)
作者: Abegunde, Jacob Spring, Joseph Xiao, Hannan Univ Hertfordshire Hatfield Herts England Kings Coll London London England
The development of electronic voting applications remains an active area of research and this has led to the proposal and implementation of many models based on blockchains. However, most of the proposed models are pa... 详细信息
来源: 评论
Towards SDN and Blockchain based IoT Countermeasures: A Survey  2
Towards SDN and Blockchain based IoT Countermeasures: A Surv...
收藏 引用
2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)
作者: Zaman, Shakila Kaiser, M. Shamim Khan, Risala Tasin Mahmud, Mufti Brac Univ Dept CSE Dhaka Bangladesh Jahangirnagar Univ Inst Informat Technol Dhaka Bangladesh Nottingham Trent Univ Dept Comp Sci Nottingham England
security vulnerabilities have become significant concerns due to growing demand of Internet of Things (IoT) not only for home automation systems, but also for various industrial applications. Central security technolo... 详细信息
来源: 评论
SCADA Threats in the Modern Airport
SCADA Threats in the Modern Airport
收藏 引用
8th International Conference on Information Warfare and security (ICIW)
作者: McCarthy, John Mahoney, William Cranfield Univ Cranfield MK43 0AL Beds England
Critical infrastructures are ubiquitous in the modern world and include electrical power systems, water, gas, and other utilities, as well as trains and transportation systems including airports. This work is concerne... 详细信息
来源: 评论
A Framework for Improved Home Network security  18
A Framework for Improved Home Network Security
收藏 引用
18th European Conference on Cyber Warfare and security (ECCWS)
作者: Craveiro, Antonio Oliveira, Ana Proenca, Jorge Cruz, Tiago Simoes, Paulo Univ Coimbra Dept Informat Engn Coimbra Portugal
modern home networks constitute a diverse ecosystem of devices and services, whose management is mostly handled by means of specific service or device provider mechanisms, with only a minority of customers possessing ... 详细信息
来源: 评论