咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是561-570 订阅
排序:
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Sch...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xu Yang Joseph K. Liu Wei Wu Man Ho Au Willy Susilo Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China and State Key Laboratory of Cryptology Beijing China Faculty of Information Technology Monash University Australia Department of Computing Hong Kong Polytechnic University Hong Kong School of Computer Science and Software Engineering University of Wollongong Australia
Electric Vehicle (EV) infrastructure is relatively new in many countries. Due to the recency of an EV infrastructure, it is important to carry out a series of testing programs. Furthermore, authenticity for collection... 详细信息
来源: 评论
Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
收藏 引用
Journal of Shanghai Jiaotong university(science) 2014年 第4期19卷 398-405页
作者: 王亮亮 陈克非 毛贤平 王永涛 Department of Computer Science and Engineering Shanghai Jiaotong University School of Science Hangzhou Normal University China Information Technology Security Evaluation Center
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry... 详细信息
来源: 评论
Measurement and analysis of burst topic in microblog
International Journal of Database Theory and Application
收藏 引用
International Journal of Database Theory and Application 2015年 第2期8卷 144-156页
作者: Dong, Guozhong Zou, Xin Wang, Wei Hu, Yaxue Shen, Guowei Orkphol, Korawit Yang, Wu Information Security Research Center Harbin Engineering University Harbin Heilongjiang Province China National Computer Network Emergency Response Technical Team/Coordination Center Beijing China Department of Computer Science and Technology Harbin Engineering University China Computer Engineering Department Kasetsart University Si Racha Campus Thailand
Microblog provides the first communication platform for burst event due to the immediacy and interactivity of microblog. In this paper, we research on user-oriented and message-oriented measurements of burst topic in ...
来源: 评论
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices
TrustICE: Hardware-Assisted Isolated Computing Environments ...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: He Sun Kun Sun Yuewu Wang Jiwu Jing Haining Wang Department of Computer Science College of William and Mary Williamsburg VA USA State Key Laboratory of Information Security Data Assurance and Communication Security Research Center Beijing China University of Chinese Academy of Sciences Beijing China Department of Electrical and Computer Engineering University of Delaware Newark DE USA
Mobile devices have been widely used to process sensitive data and perform important transactions. It is a challenge to protect secure code from a malicious mobile OS. ARM TrustZone technology can protect secure code ... 详细信息
来源: 评论
Case Base for Secure Software Development Using Software security Knowledge Base
Case Base for Secure Software Development Using Software Sec...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Atsuo Hazeyama Masahito Saito Nobukazu Yoshioka Azusa Kumagai Takanori Kobashi Hironori Washizaki Haruhiko Kaiya Takao Okubo Department of Information Science Tokyo Gakugei University Tokyo JAPAN GRACE Center National Institute of Informatics Tokyo JAPAN Graduate School of Fundamental Science and Engineering Waseda University Tokyo JAPAN Department of Information Sciences Kanagawa University Hiratsuka JAPAN Graduate School of Education Tokyo Gakugei University Tokyo JAPAN Department of Information Study Tokyo Gakugei University Tokyo JAPAN Department of Computer Science and Engineering Waseda University Tokyo JAPAN Graduate School of Information Security Institute of Information Security (IISEC) Yokohama JAPAN
The importance of software security technologies has been gaining attention due to the increase in services on the Internet. Various technologies regarding software security have been developed. However, we believe kn... 详细信息
来源: 评论
A methodology of component-based modeling for complex digital logic systems
收藏 引用
Journal of Computational information Systems 2014年 第11期10卷 4557-4564页
作者: Chen, Fulong Sun, Yunxiang Zhou, Wen Ye, Heping Qi, Xuemei Department of Computer Science and Technology Anhui Normal University Wuhu 241002 China Network and Information Security Engineering Research Center Anhui Normal University Wuhu 241002 China
The increasing complexity of digital logic systems brings a heavy burden to designers. In order to reduce the gap between the design requirements and design results, it is necessary to model for the expected complex d... 详细信息
来源: 评论
On the security of a forward-backward secure signature scheme
收藏 引用
International Journal of Network security 2015年 第3期17卷 307-310页
作者: Wang, Liangliang Chen, Kefei Mao, Xianping Wang, Yongtao Department of Computer Science and Engineering Shanghai Jiao Tong University No. 800 Dongchuan Road Shanghai200240 China School of Science Hangzhou Normal University No. 16 Xuelin Street Hangzhou310036 China China Information Technology Security Evaluation Center No. 8 Yard of Shangdixilu Beijing100085 China
In a forward-secure signature scheme, a current exposed secret key can be used to obtain future secret keys which can lead to future signatures invalid. Lin et al. proposed a new method called backward-secure detectio... 详细信息
来源: 评论
Mobihydra: Pragmatic and multi-level plausibly deniable encryption storage for mobile devices
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8783卷 555-567页
作者: Yu, Xingjie Chen, Bo Wang, Zhan Chang, Bing Zhu, Wen Tao Jing, Jiwu State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Data Assurance and Communication Security Research Center Chinese Academy of Sciences China University of Chinese Academy of Sciences China Department of Computer Science Stony Brook University United States
Nowadays, smartphones have started being used as a tool to collect and spread politically sensitive or activism information. The exposure of the possession of such sensitive data shall pose a risk in severely threaten... 详细信息
来源: 评论
A research for partition restoration techniques
A research for partition restoration techniques
收藏 引用
8th FTRA International Conference on Future information Technology, FutureTech 2013
作者: Namgung, Jaeung Hong, Il Young Park, Jungheum Lee, Changhoon Lee, Sangjin Center for Information Security Technologies Korea University Seoul Korea Republic of Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
As the capacity of storage is gradually larger, most of the users logically use the storage devices dividing into multiple partitions. Therefore recovering partition stably from artificial partition concealing or part... 详细信息
来源: 评论
A scheduling algorithm with dynamic properties in mobile grid
收藏 引用
Frontiers of computer science 2014年 第5期8卷 847-857页
作者: JongHyuk LEE SungJin CHOI JoonMin GIL Taeweon SUH HeonChang YU Software R&D Center Samsung Electronics Gyeonggi-do 443-742 Republic of Korea Media Solution Center Samsung Electronics Gyeonggi-do 443-742 Republic of Korea School of Information Technology Engineering Catholic University of Daegu Gyeongsangbuk-do 712-702 Republic of Korea Graduate School of Information Security Korea University Seoul 136-701 Republic of Korea Department of Computer Science and Engineering Korea University Seoul 136-701 Republic of Korea
Mobile grid is a branch of grid computing that incorporates mobile devices into the grid infrastructure. It poses new challenges because mobile devices are typically resource-constrained and exhibit unique characteris... 详细信息
来源: 评论