咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 电气工程
    • 4 篇 计算机科学与技术...
    • 2 篇 电子科学与技术(可...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 3 篇 理学
    • 2 篇 物理学
    • 1 篇 数学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 9 篇 security coding
  • 1 篇 educate
  • 1 篇 digital communic...
  • 1 篇 fountain code
  • 1 篇 teaching
  • 1 篇 cesium
  • 1 篇 message secrecy
  • 1 篇 gender issue
  • 1 篇 nested codes
  • 1 篇 alike
  • 1 篇 coding sequence
  • 1 篇 pedagogy
  • 1 篇 software develop...
  • 1 篇 degree distribut...
  • 1 篇 computer aided i...
  • 1 篇 scheme
  • 1 篇 error control co...
  • 1 篇 computer crime
  • 1 篇 humanoid robots
  • 1 篇 secret key

机构

  • 1 篇 princeton univ d...
  • 1 篇 nanjing normal u...
  • 1 篇 tata inst fundam...
  • 1 篇 swiss fed inst t...
  • 1 篇 air force commun...
  • 1 篇 univ calif los a...
  • 1 篇 computer science...
  • 1 篇 univ london impe...
  • 1 篇 national univers...
  • 1 篇 res ctr informat...
  • 1 篇 north carolina s...
  • 1 篇 radar nco school...
  • 1 篇 kannur univ sch ...
  • 1 篇 rutgers state un...
  • 1 篇 universud cnrs e...

作者

  • 1 篇 aardhra m.
  • 1 篇 thomas everson
  • 1 篇 gao si-dan
  • 1 篇 poor h. vincent
  • 1 篇 shilpa c. k.
  • 1 篇 jing lei
  • 1 篇 czap laszlo
  • 1 篇 nissamudeen k. m...
  • 1 篇 barbot jean-pier...
  • 1 篇 ankur chattopadh...
  • 1 篇 liang yingbin
  • 1 篇 jing tu
  • 1 篇 thi huyen trang ...
  • 1 篇 liu ruoheng
  • 1 篇 fragouli christi...
  • 1 篇 hui shi
  • 1 篇 sajith s. v.
  • 1 篇 chen bo
  • 1 篇 jason ruckel
  • 1 篇 gongda qiu

语言

  • 9 篇 英文
检索条件"主题词=security coding"
9 条 记 录,以下是1-10 订阅
排序:
Cultivating the Ability of security coding for Undergraduates in Programming Teaching
Cultivating the Ability of Security Coding for Undergraduate...
收藏 引用
4th International Conference on Computer Science and Education
作者: Chen Bo Xu Da-wei Gao Si-dan Yu Ling Nanjing Normal Univ Sch Comp Sci & Technol Nanjing 210097 Jiangsu Prov Peoples R China Res Ctr Informat Secur & Confidential Technol Jia Nanjing 210097 Jiangsu Peoples R China North Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
To address the problems existing in current college programming education, we consider that the cultivation of security coding ability may be combined within existing courses, such as programming courses, operating sy... 详细信息
来源: 评论
Dynamic secret key generation for joint error control and security coding
Dynamic secret key generation for joint error control and se...
收藏 引用
IEEE Wireless Communications and Networking Conference (WCNC)
作者: Thi Huyen Trang Nguyen Barbot, Jean-Pierre UniverSud CNRS ENS Cachan SATIE 61 Av President Wilson F-94235 Cachan France
security and error control coding are two crucial aspects of the digital communication systems. The deployment of data transmission systems easy to eavesdrop, such as wireless systems, makes strategic the protection o... 详细信息
来源: 评论
Secure coding: Building security into the software development life cycle
收藏 引用
Information Systems security 2004年 第5期13卷 29-39页
作者: Jones, Russell L. Rastogi, Abhinav A Principal in Deloitte's Security Services Group. He specializes in integrating third-party security products with complex e-business and ERP applications and related infrastructures. With more than 13 years of experience he has a strong focus on the design architecture implementation and deployment of Identity Management solutions (i.e. Web Access Management User Provisioning) encryption solutions and distributed architecture application solutions. Russell also has significant experience with the development of security architectures network security analysis and design and role-based access control (RBAC) design and deployment. Russell has practical experience applying security frameworks such as ISO17799 and ISO15408 against real world environments. Russell is a key member of Deloitte's Identity Management Council A Sun-certified Java engineer with more than seven years of experience in designing and developing enterprise-level applications. He has extensive training and experience in installation configuration and integration of Identity Management Single Sign-On and Web Security products. He has experience in Java Security framework in JCE and JSSE as well as in Server-side Java Technologies such as EJBs Java Servlets JavaServerPages JDBC Java Beans and XML. Abhinav also has sound knowledge of Web Protocols and Web Technologies including TCP/IP HTTP/HTTPS SSL JavaScript and DHTML
Many of the security properties that are outlined repeatedly in the newer regulations and standards can easily be side-stepped. Too often the culprits are unsophisticated software development techniques, a lack of sec... 详细信息
来源: 评论
Secure Network coding With Erasures and Feedback
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2015年 第4期61卷 1667-1686页
作者: Czap, Laszlo Fragouli, Christina Prabhakaran, Vinod M. Diggavi, Suhas Swiss Fed Inst Technol CH-1015 Lausanne Switzerland Univ Calif Los Angeles Los Angeles CA 90095 USA Tata Inst Fundamental Res Bombay 400005 Maharashtra India
Secure network coding assumes that the underlying network channels are error-free;thus, if our channels introduce errors, we need to first apply a channel code to correct them, and then build security on top of the re... 详细信息
来源: 评论
Laser surface authentication - reading Nature's own security code
收藏 引用
CONTEMPORARY PHYSICS 2008年 第5期49卷 331-342页
作者: Cowburn, Russell Univ London Imperial Coll Sci Technol & Med Blackett Phys Lab London England
A laser-based security technique called Laser Surface Authentication (LSA) is described in which diffuse laser scattering is used as a probe of the naturally-occurring randomness present in virtually all surfaces. LSA... 详细信息
来源: 评论
Secure nested codes for type II wiretap channels
Secure nested codes for type II wiretap channels
收藏 引用
IEEE Information Theory Workshop
作者: Liu, Ruoheng Liang, Yingbin Poor, H. Vincent Spasojevic, Predrag Princeton Univ Dept Elect Engn Princeton NJ 08544 USA Rutgers State Univ WINLAB ECE North Brunswick NJ 08902 USA
This paper considers the problem of secure coding design for a type H wiretap channel, where the main channel is noiseless and the eavesdropper channel is a general binary-input symmetric-output memoryless channel. Th... 详细信息
来源: 评论
Multimodal responsive Dy3+, Li+ activated Gd2MgTiO6 phosphors for ideal wLED, potent anti-counterfeiting, fingerprint visualization, and encryption coding
收藏 引用
MATERIALS SCIENCE IN SEMICONDUCTOR PROCESSING 2024年 179卷
作者: Veena, V. P. Sajith, S. V. Thasneem, A. M. Huda Aardhra, M. Shilpa, C. K. Jasira, S. V. Nissamudeen, K. M. Kannur Univ Sch Pure & Appl Phys Payyanur Campus Kannur 670327 Kerala India
The Gd2MgTiO6 is an infant luminescence host that portrays eclectic applications in displays, security devices, and forensic studies. The perovskites are synthesized by facile combustion method, decreasing the synthes... 详细信息
来源: 评论
An Optimized Algorithm on the Design of Degree Distribution for Fountain Code based on Physical Layer security  20
An Optimized Algorithm on the Design of Degree Distribution ...
收藏 引用
Proceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering
作者: Hui Shi Jing Lei Jing Tu Gongda Qiu Radar NCO School Air force early warning Academy Wuhan China National University of Defense Technology Changsha China Air Force Communication NCO Academy Dalian China
In this paper, we propose an improved algorithm on the design of degree distribution on the basis of the security coding system model of fountain code concatenation and coset precoding. The algorithm is an improved gl... 详细信息
来源: 评论
Secure coding and Ethical Hacking Workshops with NAO for Engaging K-12 Female Students in CS
Secure Coding and Ethical Hacking Workshops with NAO for Eng...
收藏 引用
Research in Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)
作者: Ankur Chattopadhyay Kevin Grondahl Jason Ruckel Thomas Everson Computer Science Univ of Wisconsin - Green Bay Green Bay USA
This research work is based upon the new Microsoft DigiSpark outreach project initiated by the computer science (CS) program at the University of Wisconsin - Green Bay (UWGB) in an effort to engage K-12 female learner... 详细信息
来源: 评论