咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 7 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 17 篇 计算机科学与技术...
    • 8 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 3 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 系统科学

主题

  • 25 篇 security algorit...
  • 4 篇 encryption
  • 3 篇 privacy
  • 2 篇 database securit...
  • 2 篇 intrusion preven...
  • 2 篇 wireless communi...
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 rsa
  • 2 篇 information secu...
  • 2 篇 aes
  • 2 篇 database
  • 2 篇 cloud computing
  • 1 篇 encryption and k...
  • 1 篇 broadcom
  • 1 篇 internet of thin...
  • 1 篇 threat protectio...
  • 1 篇 backfire
  • 1 篇 security strateg...
  • 1 篇 threat isolation

机构

  • 1 篇 facultad de cien...
  • 1 篇 univ teknol mala...
  • 1 篇 natl polytech sc...
  • 1 篇 univ teknol petr...
  • 1 篇 prince sultan un...
  • 1 篇 vasile goldis we...
  • 1 篇 no kentucky univ...
  • 1 篇 jordan univ sci ...
  • 1 篇 ryazan state rad...
  • 1 篇 menoufia univ fa...
  • 1 篇 scse deptt of cs...
  • 1 篇 nbn sinhgad sch ...
  • 1 篇 cbit dept cse hy...
  • 1 篇 nadimpalli satya...
  • 1 篇 miracle educ soc...
  • 1 篇 univ guadalajara...
  • 1 篇 univ surrey dept...
  • 1 篇 univ bourgogne f...
  • 1 篇 sunway univ fac ...
  • 1 篇 rayalaseema univ...

作者

  • 1 篇 pragya tewari
  • 1 篇 rajalakshmi d.
  • 1 篇 ruchkin v. n.
  • 1 篇 chiacchia matteo
  • 1 篇 máximo giovani t...
  • 1 篇 yejarla prathyus...
  • 1 篇 ebrahim mansoor
  • 1 篇 masrom maslin
  • 1 篇 cordova ronald s...
  • 1 篇 al-azawi rula
  • 1 篇 ibrahim m. sohai...
  • 1 篇 gao yue
  • 1 篇 daniel humberto ...
  • 1 篇 gawali dhanashri...
  • 1 篇 paci andrea
  • 1 篇 ramanamurthy m. ...
  • 1 篇 toapanta toapant...
  • 1 篇 carlos ignacio r...
  • 1 篇 eric s. emrick
  • 1 篇 félix gustavo me...

语言

  • 25 篇 英文
检索条件"主题词=security algorithms"
25 条 记 录,以下是21-30 订阅
排序:
An Adaptive Anomaly-based Intrusion Prevention System for Databases
An Adaptive Anomaly-based Intrusion Prevention System for Da...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Eric S. Emrick Yi Hu Department of Computer Science Northern Kentucky University
Conventional database security can employ a wide range of access controls including database roles, fine-grained object access and virtual private databases. Access controls are used to protect against malicious attac... 详细信息
来源: 评论
Transmission of Unsolicited E-mails with Hidden Sender Identity
Transmission of Unsolicited E-mails with Hidden Sender Ident...
收藏 引用
5th International Workshop Soft Computing Applications (SOFA)
作者: Virag, Ioan Naaji, Antoanela Popescu, Marius Vasile Goldis Western Univ Arad Dept Comp Sci Arad Romania
Terminal communication systems are often confronted with undesired e-mails, which reach their destination, while cloaking the real sender. Thus, in order to develop appropriate security software, it is necessary to kn... 详细信息
来源: 评论
ISSUES AND CHALLENGES OF SCHEDULING AND PROTECTION algorithms FOR PROFICIENT PARALLEL DATA PROCESSING IN CLOUD
ISSUES AND CHALLENGES OF SCHEDULING AND PROTECTION ALGORITHM...
收藏 引用
International Conference on Information Communication and Embedded Systems (ICICES)
作者: Vijayaraj, N. Rajalakshmi, D. Sanoj, C. S. Shri Angalamman Coll Engn & Technol Tiruchirappalli 621105 India
In topical years one of the Cloud Services, Infrastructure-as-a-Service (IaaS) provides a compute resources for demand in various applications like Parallel Data Processing. Major Cloud computing companies have starte... 详细信息
来源: 评论
The research and implementation of 3G terminal authentication service
The research and implementation of 3G terminal authenticatio...
收藏 引用
4th International Conference on Wireless Communications, Networking and Mobile Computing
作者: Fangzhou Zhang Xiaoyu Sheng Daqing Petr Inst Sch Comp & Informat Technol Daqing 163318 Peoples R China
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authenticati... 详细信息
来源: 评论
Implementace síťových bezpečnostních algoritmů v domácím směrovači
Implementace síťových bezpečnostních algoritmů v domá...
收藏 引用
作者: Procházka, Tomáš Brno University of Technology
Tato práce se zabývá minimalistickou linuxovou distribucí OpenWRT a její instalací v směrovači Linksys WAG160Nv2. Popisuje vybraný směrovač a diskutuje postup při měření prop... 详细信息
来源: 评论