咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是621-630 订阅
排序:
Compatibility and requirements analysis of distributed pair programming
Compatibility and requirements analysis of distributed pair ...
收藏 引用
2nd International Workshop on Education Technology and computer science, ETCS 2010
作者: Dou, Wanfeng He, Wei School of Computer Science and Technology Jiangsu Research Center of Information Security and Confidential Engineering Nanjing Normal University Nanjing China Department of Mechanical Engineering Nanjing Institute of Industry Technology Nanjing 210046 Jiangsu China
Distributed pair programming (DPP) supports two programmers to work on the same task from different locations. One programmer acting as the driver controls the keyboard and mouse to actively write code or design docum... 详细信息
来源: 评论
Multi-party k-means clustering with privacy consideration
Multi-party k-means clustering with privacy consideration
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing With Applications
作者: Yu, Teng-Kai Lee, D.T. Chang, Shih-Ming Zhan, Justin Department of Computer Science and Information Engineering National Taiwan University Taipei Taiwan National Center for the Protection of the Financial Infrastructure Dakota State University Madison SD United States Institute of Information Science Academia Sinica Nankang Taipei Taiwan Taiwan Information Security Center Research Center for Information Technology Innovation Academia Sinica Nankang Taipei Taiwan
The k-means clustering algorithm is a widely used scheme to solve the clustering problem which classifies a given set of n data points in m-dimensional space into k clusters, whose centers are obtained by the centroid... 详细信息
来源: 评论
Cryptanalysis of a certificateless multi-receiver signcryption scheme
Cryptanalysis of a certificateless multi-receiver signcrypti...
收藏 引用
International Conference on Multimedia information Networking and security
作者: Miao, Songqin Zhang, Futai Zhang, Lei School of Computer Science and Technology Nanjing Normal University Nanjing China Jiangsu Engineering Research Center on Information Security and Privacy Protection Technology Nanjing China Department of Computer Engineering and Mathematics Universitat Rovira I Virgili Av. Països Catalans 26 E-43007 Tarragona Catalonia Spain
Certificateless public key cryptography eliminates certificate management in traditional public key infrastructure and solves the key escrow problem in identity-based cryptography. Certificateless signcryption is one ... 详细信息
来源: 评论
Ontology-Based Context Representation and Reasoning Using OWL and SWRL
Ontology-Based Context Representation and Reasoning Using OW...
收藏 引用
Annual Conference on Communication Networks and Services Research (CNSR)
作者: C.-H. Liu K.-L. Chang Jason J.-Y. Chen S.-C. Hung Department of Computer Science Information Engineering National Central University Jhongli Taiwan Identification and Security Technology Center Hsinchu Taiwan
Recently, quite a few researches upon context-awareness, ubiquitous computing and automatic surveillance have emerged. Their objectives are to appropriately react to current context situation over the web, rather than... 详细信息
来源: 评论
On the security of a certificateless signature scheme
On the security of a certificateless signature scheme
收藏 引用
2010 2nd International Conference on Signal Processing Systems, ICSPS 2010
作者: Miao, Songqin Zhang, Futai Zhang, Lei School of Computer Science and Technology Nanjing Normal University Nanjing China Jiangsu Engineering Research Center on Information Security and Privacy Protection Technology Nanjing China UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Av. Països Catalans 26 E-43007 Tarragona Catalonia Spain
Certificateless public key cryptography (CLPKC) eliminates certificate management in traditional public key infrastructure and solves the problem of the key escrow in identity-based cryptography. Certificateless signa... 详细信息
来源: 评论
Asymmetric encryption and signature method with DNA technology
收藏 引用
science China(information sciences) 2010年 第3期53卷 506-514页
作者: LAI XueJia1, LU MingXin2, QIN Lei3, HAN JunSong4 & FANG XiWen11department of computer science & engineering, Shanghai Jiao Tong University, Shanghai 200030, China 2School of National information security, Nanjing University, Nanjing 210093, China 3BIOCOMPLEX, 4915 Bathurst St. Unit# 209-366, ON M2R 1X9, Canada 4National engineering center for BioChip at Shanghai, Shanghai 201203, China 1. Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200030 China2. School of National Information Security Nanjing University Nanjing 210093 China3. BIOCOMPLEX 4915 Bathurst St. Unit# 209-366 Toronto ON M2R 1X9 Canada4. National Engineering Center for BioChip at Shanghai Shanghai 201203 China
This paper proposes DNA-PKC, an asymmetric encryption and signature cryptosystem by combining the technologies of genetic engineering and cryptology. It is an exploratory research of biological cryptology. Similar to ... 详细信息
来源: 评论
A Secure Proxy Blind Signature Scheme Based on DLP
A Secure Proxy Blind Signature Scheme Based on DLP
收藏 引用
International Conference on Multimedia information Networking and security (MINES)
作者: Binayak Kar Pritam Prava Sahoo Ashok Kumar Das Department of Computer Science and Engineering International Institute of Information Technology Bhubaneswar India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India
In this paper, we aim to improve the recently proposed Yang et al.'s proxy blind signature scheme in order to withstand the security flaw in their scheme. The security of the improved scheme is enhanced in the sig... 详细信息
来源: 评论
On Achieving Maximum Secure Throughput Using Network Coding Against Wiretap Attack
On Achieving Maximum Secure Throughput Using Network Coding ...
收藏 引用
IEEE International Conference on Distributed Computing Systems
作者: Xiangmao Chang Jin Wang Jianping Wang Victor Lee Kejie Lu Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Department of Computer Science University of Science and Technology of China Department of Computer Science City University of Hong Kong Department of Electrical and Computer Engineering University of Puerto Rico at Mayaguez
In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. ... 详细信息
来源: 评论
A Preliminary Design of Distributed Pair Programming System
A Preliminary Design of Distributed Pair Programming System
收藏 引用
International Workshop on Education Technology and computer science, ETCS
作者: Wanfeng Dou Wei He School of Computer Science and Technology Jiangsu research center of Information Security & Confidential Engineering Nanjing Normal University Nanjing China Department of Mechanical Engineering Nanjing Institute of Industry Technology Nanjing Jiangsu China
Distributed Pair Programming (DPP) system is a programming system in which two programmers, the driver and the navigator, work on the same task such as analysis, design and programming of the same program from differe... 详细信息
来源: 评论
A conversation model of collaborative pair programming based on language/action theory
A conversation model of collaborative pair programming based...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Wanfeng Dou Kui Hong Wei He School of Computer Science and Technology Jiangsu research center of Information Security & Confidential Engineering Nanjing Normal University Nanjing China Department of Mechanical Engineering Nanjing Institute of Industry Technology Nanjing Jiangsu China
Pair programming is a programming practice in which two programmers use one computer to work together on the same analysis, design, and programming of the same software. Collaborative Pair Programming (CPP) supports t... 详细信息
来源: 评论