咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是601-610 订阅
排序:
Improved Differential Fault Analysis on Block Cipher SEED-128
Improved Differential Fault Analysis on Block Cipher SEED-12...
收藏 引用
International Conference on Network-Based information Systems (NBIS)
作者: Yuseop Lee Jongsung Kim Seokhie Hong Changhoon Lee Center for Information Security Technologies(CIST) Korea University Seoul South Korea Department of E-Business Kyungnam University Changwon South Korea Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul South Korea
SEED is a 128-bit block cipher supporting 128, 192 and 256-bit secret keys. It has been adopted as a national industrial association standard (TTAS KO-12.0004) at 1999 and ISO/IEC 18033-3 and IETF RFC 4269 at 2005. Th... 详细信息
来源: 评论
Searching in Internet of Things: Vision and challenges
Searching in Internet of Things: Vision and challenges
收藏 引用
9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011
作者: Zhang, Daqiang Yang, Laurence T. Huang, Hongyu School of Computer Science Nanjing Normal University Nanjing China Jiangsu Research Center of Information Security and Confidential Engineering Nanjing China Department of Computer Science St. Francis Xavier University Antigonish Canada Department of Computer Science Chongqing University Chongqing China
This paper discusses the challenges in searching imposed by the burgeoning field of Internet of Things (IoT). It first overviews the evolution of the new field to its predecessors: searching in the mobile computing, u... 详细信息
来源: 评论
A trust evaluation model based on fuzzy theory in P2P networks
收藏 引用
Journal of computers 2011年 第8期6卷 1634-1638页
作者: Zhou, Zhengzhen Luo, Yonglong Guo, Liangmin Ji, Meijing Department of Computer Science Engineering Technology Research Center of Network and Information Security Anhui Normal University Wuhu China
In this paper, we apply two-stage fuzzy comprehensive evaluation of fuzzy theory to evaluate the recommendation trust vector of P2P network nodes, which fully reflects the effect of various factors on trust evaluation... 详细信息
来源: 评论
Extended Fingerprint-Based User Authentication Scheme Using Smart Cards in Education IPTV
Extended Fingerprint-Based User Authentication Scheme Using ...
收藏 引用
International Conference on information science and Applications (ICISA)
作者: Eun-A Jun Jeom Goo Kim Seok Won Jung Dong Hoon Lee Center of Information Security and Technologies(CIST) Korea University Seoul South Korea Department of Computer Science Namseoul University Chonan South Korea Department of Information Security Engineering Mokpo National University Mokpo South Korea
In modern society, there exist many different types of authentication processes that we are unaware of not only in IT fields but also in our daily lives. Many recent issues of cyber crimes target weak passwords or car... 详细信息
来源: 评论
The DEVS model of computation - a foundation for a novel embedded systems design methodology
The DEVS model of computation - a foundation for a novel emb...
收藏 引用
International Conference on computer engineering and Systems
作者: Sorin Alexander Huss Computer Science Department Electrical Engineering and Information Technology Department CASED-Center for Advanced Security Research Darmstadt Technische Universität Darmstadt Darmstadt Germany
Summary form only given. In the recent past the abstraction in system-level design has been significantly increased to manage the increasing complexity of modern embedded systems. To establish such higher abstraction ...
来源: 评论
3-3 Multimedia information hiding
收藏 引用
Journal of the National Institute of information and Communications Technology 2011年 第1-2期58卷 183-194页
作者: Takizawa, Osamu Sonoda, Kotaro Yoshioka, Katsunari Suzuki, Jouji Disaster Management and Mitigation Group Japan Security Fundamentals Group Information Security Research Center Japan Computer and Information Science Program Faculty of Engineering Nagasaki University Japan Disaster Management and Mitigation Group Information Security Research Center Japan Interdisciplinary Research Center Yokohama National University Japan Network Security Incident Response Group Information Security Research Center Japan Technology Transfer Promotion Office Outcome Promotion Department Japan Graduate School Research Institute of Environment and Information Sciences Yokohama National University Japan
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we h... 详细信息
来源: 评论
A practical framework for formalizing and extracting Chinese collocations
A practical framework for formalizing and extracting Chinese...
收藏 引用
7th International Conference on Natural Language Processing and Knowledge engineering, NLP-KE 2011
作者: Qu, Weiguang Tang, Xuri Zhou, Junsheng Gu, Yanhui Li, Bin School of Computer Science Nanjing Normal University Nanjing 210046 China Research Center of Information Security and Confidentiality Technology of Jiangsu Province Nanjing 210097 China College of Foreign Studies Wuhan Textile University Wuhan 430073 China Department of Information and Communication Engineering University of Tokyo Japan School of Chinese Language and Literature Nanjing Normal University Nanjing 210097 China
In this paper we argue for a word-sense based formalization for collocation, and proposes a seed-based approach for collocation extraction for specific purposes. The approach uses RFR-SUM model to iteratively classify... 详细信息
来源: 评论
Spam filter based on incremental Bayes arithmetic
Spam filter based on incremental Bayes arithmetic
收藏 引用
2nd Annual Conference on Electrical and Control engineering, ICECE 2011
作者: Yan, Han-Bing Liu, Ya-Shu National Computer Network Emergency Response Technical Team/Coordination Center of China National Institute of Network and Information Security Beijng China Department of Computer Science Beijing University of Civil Engineering and Architecture Beijing China
With the development of Internet, Email has become an important interaction manner. At the same time, spam becomes a boring thing in our life, and people pay more and more attention to spam filter. In this paper, we p... 详细信息
来源: 评论
Spam filter based on incremental Bayes arithmetic
Spam filter based on incremental Bayes arithmetic
收藏 引用
International Conference on Electrical and Control engineering (ICECE)
作者: Han-Bing Yan Ya-Shu Liu National Computer Network Emergency Response Technical Team/Coordination Center of China National Institute of Network and Information Security Beijing China Department of Computer Science Beijing University of Civil Engineering and Architecture Beijing China
With the development of Internet, Email has become an important interaction manner. At the same time, spam becomes a boring thing in our life, and people pay more and more attention to spam filter. In this paper, we p... 详细信息
来源: 评论
Research on secure multi-party ranking problem and secure selection problem
Research on secure multi-party ranking problem and secure se...
收藏 引用
2010 International Conference on Web information Systems and Mining, WISM 2010
作者: Cheng, Chao Luo, Yong-Long Chen, Cai-Xia Zhao, Xiao-Kong Department of Computer Science and Technology Engineering Technology Research Center of Network and Information Security Anhui Normal University Wuhu 241003 China
In this paper, the problems of secure multi-party ranking and secure selection were studied. Two protocols were proposed. They were both based on Secure Sum protocol. Secure multi-party ranking problem is an extended ... 详细信息
来源: 评论