咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3881-3890 订阅
排序:
security Analysis of Two Password Authentication Schemes
Security Analysis of Two Password Authentication Schemes
收藏 引用
第八届国际移动商务会议(Eighth International Conference on Mobile Business)
作者: Zuowen Tan School of Information Technology Jiangxi University of Finance & EconomicsNanchang 330013JiangxiChina State Key Laboratory of Information Security Institute of Software of Chinese Academy of SciencesBeijing 100080China Key Lab of Network Security and
Recently,Rhee,Kwon and Lee proposed a practical authentication scheme only based on the common storage *** the scheme the remote user does not need to use smart *** is convenient for the users to use a common storage ... 详细信息
来源: 评论
Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP
Research on Man-in-the-Middle Denial of Service Attack in SI...
收藏 引用
International Conference on Networks security, Wireless Communications and Trusted Computing, NSWCTC
作者: Zhe Chen Shize Guo Kangfeng Zheng Haitao Li Key Laboratory of network and information attack & defence technology of MOE National Engineering Laboratory of Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology National Engineering Laboratory of Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as su... 详细信息
来源: 评论
A NOVEL MODEL FOR QUERY OVER ENCRYPTED XML DATABASES
A NOVEL MODEL FOR QUERY OVER ENCRYPTED XML DATABASES
收藏 引用
2009 IEEE International Conference on Network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)
作者: Nian Liu Yajian Zhou Xinxin Niu Yixian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Beijing National Engineering Laboratory for Disaster Backup and RecoveryBeijing University of Posts and Telecommu
In recent years, there has been increasing concern about "Database as a Service"(DAS) architectures. Data security is the overriding concern in DAS, and encryption is a natural solution. However, queries ove... 详细信息
来源: 评论
Extracting Real-Life Log with Data Perspective in PLM System for Business Process Analysis
Extracting Real-Life Log with Data Perspective in PLM System...
收藏 引用
Computer Science and Information engineering, CSIE, WRI World Congress on FLAGGED
作者: Wang Zhaoxia Wang Jianmin Wen Lijie Liu Yingbo School of Software Tsinghua University Beijing China Department of Logistical Information Engineering Logistical Engineering University Chongqing China Key Laboratory of Information System Security Ministry of Education China
Event log is the important starting point of any process analysis technique. Existent business process analysis techniques are applied mainly to manual or simulated logs, considering mainly information about control p... 详细信息
来源: 评论
A real-time schedule method for aircraft landing scheduling problem based on cellular automaton  09
A real-time schedule method for aircraft landing scheduling ...
收藏 引用
2009 World Summit on Genetic and Evolutionary Computation, 2009 GEC Summit - 1st ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC'09
作者: Shenpeng, Yu Xianbin, Cao Maobin, Hu Wenbo, Du Jun, Zhang Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 86-551-3601545 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China School of Engineering Science University of Science and Technology of China Hefei 230026 86-551-3600127 China School of Electronic and Information Engineering Beihang University Beijing 100083 China
The Aircraft Landing Scheduling (ALS) problem is a typical hard multi-constraint optimization problem. In real applications, it is not most important to find the best solution but to provide a feasible landing schedul... 详细信息
来源: 评论
SWSCF: A semantic-based Web service composition framework
收藏 引用
Journal of Networks 2009年 第4期4卷 290-297页
作者: Hu, Jianqiang Li, Juanzi Zeng, Zhiyong State Key Laboratory of Software Engineering Wuhan University Hubei China Department of Computer Science and Technology Tsinghua University Beijing China Software Faculty Fujian Normal University Fuzhou China Department of Computer Science and Technology Tsinghua University Beijing China
Web service composition is gaining a considerable momentum as an approach to the effective integration of distributed, heterogeneous, and autonomous application. Current composed service processes are mostly generated... 详细信息
来源: 评论
Privacy aware engineering: A case study
Journal of Software
收藏 引用
Journal of software 2009年 第3期4卷 218-225页
作者: Ye, Xiaojun Zhu, Zhiwu Peng, Yong Xie, Feng Key Laboratory for Information System Security Ministry of Education School of Software Tsinghua University Beijing 100084 China Evaluation Equipment R and D Lab China Information Technology Security Evaluation Center Building A No. 8 Yard of Shangdi Xilu Haidian District Beijing 100085 China
Privacy is a complex social process that will persist in one form or another as a fundamental feature of software engineering. For successful privacy aware engineering, it is critical to guarantee the alignment and co... 详细信息
来源: 评论
A Service-oriented Programming Platform for Internet-Based Virtual Computing Environment
A Service-oriented Programming Platform for Internet-Based V...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Donggang Cao Zan Xiao Weizhong Shao School of Electronics Engineering and Computer Science Key Laboratory of High Confidence Software Technology Ministry of Education Peking University Beijing China
This paper describes a service oriented programming platform for Internet-based virtual computing environment (iVCE), which is targetted for enabling collaboration among autonomous entities over Internet. This platfor... 详细信息
来源: 评论
Real-Time Rendering of Translucent Objects with Variable Sizes
Real-Time Rendering of Translucent Objects with Variable Siz...
收藏 引用
11th IEEE International Conference on Computer-Aided Design and Computer Graphics(第11届IEEE国际计算机辅助设计与图形学学术会议 IEEE CAD/GRAPHICS 2009)
作者: Chunhui Yao Bin Wang School of Software Tsinghua University Beijing China 100084 Department of Computer Science and Technology Tsinghua University Beijing China 100084 Key Laboratory for Information System Security Ministry of Education Beijing China 100084 Tsinghua
We present a novel technique for real-timely rendering translucent objects. Our technique is mainly based on translucent shadow maps with a new adaptive sampling strategy. In this sampling strategy, the hierarchy le... 详细信息
来源: 评论
Research on Model of Trust Degrees for PKI
Research on Model of Trust Degrees for PKI
收藏 引用
The Fifth International Conference on Information Assurance and security(第五届信息保障与安全国际会议)
作者: Mingde ZHANG Xuefeng ZHENG Wensheng YANG Shuwang LV Qingguo ZHANG School of Information Engineering University of Science and Technology Beijing Beijing China Beijing Itownet Cyber Tech.Ltd.Beijing China State Key Laboratory of Information Security Beijing China University of Science and Technology Beijing Beijing China
In order to improve the accuracy of trust evaluation of subscribers (or key holders) from relying parties'point of view, a new model of trust degrees for PKI is proposed. By analyzing the security risks during the... 详细信息
来源: 评论