咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是631-640 订阅
排序:
Compatibility and Requirements Analysis of Distributed Pair Programming
Compatibility and Requirements Analysis of Distributed Pair ...
收藏 引用
International Workshop on Education Technology and computer science, ETCS
作者: Wanfeng Dou Wei He School of Computer Science and Technology Jiangsu research center of Information Security & Confidential Engineering Nanjing Normal University Nanjing China Department of Mechanical Engineering Nanjing Institute of Industry Technology Nanjing Jiangsu China
Distributed pair programming (DPP) supports two programmers to work on the same task from different locations. One programmer acting as the driver controls the keyboard and mouse to actively write code or design docum... 详细信息
来源: 评论
Development of an on-chip micro shielded-loop probe to evaluate performance of magnetic film to protect a cryptographic LSI from electromagnetic analysis
Development of an on-chip micro shielded-loop probe to evalu...
收藏 引用
IEEE International Symposium on Electromagnetic Compatibility (EMC)
作者: Masahiro Yamaguchi Hideki Toriduka Shoichi Kobayashi Takeshi Sugawara Naofumi Hommaa Akashi Satoh Takafumi Aoki Department of Electrical and Communication Engineering Graduate School of Engineering University of Tohoku Sendai Japan Department of Computer and Mathematical Sciences Graduate School of Engineering University of Tohoku Sendai Japan Research Center of Information Security Advanced Industrial Science and Technology Chiyoda Tokyo Japan
Two types of miniature shielded-loop type magnetic probes were used to analyze RF magnetic near field on the ISO/IEC 18033-3 Standard Cryptographic LSI made by 0.13 μm CMOS process with clock frequency of 24 MHz. The... 详细信息
来源: 评论
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack
A generic weakness of the k-normal Boolean functions exposed...
收藏 引用
International Symposium on information Theory and Its Applications, ISITA
作者: Miodrag Mihaljević Sugata Gangopadhyay Goutam Paul Hideki Imai Mathematical Institute Serbian Academy of Arts and Sciences Belgrade Serbia Serbian Academy of Sciences and Arts Mathematical Institute Belgrade Serbia Research Center for Information Security (RCIS) Nat. Inst. Adv. Ind. Sci.&Tech. (AIST) Tokyo Japan Department of Mathematics Indian Institute of Technology Roorkee India Department of Computer Science and Engineering Jadavpur University Kolkata India Faculty of Sciences and Engineering Chuo University Tokyo Japan RCIS-AIST Tokyo Japan
A Boolean function is k-normal if it is constant on a k-dimensional flat of its domain. This paper demonstrates that k-normality of a Boolean function can be exploited to mount a dedicated algebraic attack on a stream... 详细信息
来源: 评论
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT
收藏 引用
Journal of Electronics(China) 2009年 第5期26卷 631-636页
作者: Han Yanyan Hu Yupu He Wencai Engineering Research Center of Information Security Beijing Electronic Science and Technology Institute Beijing 100070 China Ministry of Education Key Laboratory of Computer Networks & Information Security Xidian University Xi'an 710071 China Department of Scientific Research Beijing Electronic Science and Technology Institute Beijing 100070 China
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... 详细信息
来源: 评论
Mobile agent watermarking (MAW): security properties and attacks revisited  09
Mobile agent watermarking (MAW): Security properties and att...
收藏 引用
6th International Conference on Frontiers of information Technology, FIT '09
作者: Khan, Abid Niu, Xiamu Anwar, Waqas Ahmed, Mansoor Nawaz Khan, Ali Department of Computer Science COMSATS Institute of Information Technology Islamabad Pakistan Information Security Technique Research Center Harbin Institute of Technology Shenzhen Graduate School China Department of Computer Science COMSATS Institute of Information Technology Abbottabad Pakistan Department of Electrical Engineering COMSATS Institute of Information Technology Lahore Pakistan
Providing integrity of execution is considered as the most challenging problem in Mobile Agent System (MAs). Mobile agent watermarking (MAW) is a technique that attempts to provide integrity of execution to a mobile a... 详细信息
来源: 评论
Ideal perfect multilevel threshold secret sharing scheme
Ideal perfect multilevel threshold secret sharing scheme
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Lin, Changlu Harn, Lein Ye, Dingfeng Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences China Key Laboratory of Communication and Information System Beijing Jiaotong University Beijing Municipal Commission of Education China Department of Computer Science Electrical Engineering University of Missouri-Kansas City United States
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
Certificateless partially blind signatures
Certificateless partially blind signatures
收藏 引用
1st International Conference on information science and engineering, ICISE2009
作者: Zhang, Lei Zhang, Futai School of Computer Science and Technology Nanjing Normal University China Department of Computer Engineering and Mathematics Universitat Rovira I Virgili E-43007 Tarragona Catalonia Spain Jiangsu Engineering Research Center on Information Security and Privacy Protection Technology Nanjing China
Partially blind signature is a variant of blind signature. It allows a signer to explicitly include common information in a blind signature under some agreement with a receiver. It provides anonymity of users in appli... 详细信息
来源: 评论
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Changlu Lin Lein Harn Dingfeng Ye Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laborat Department of Computer Science Electrical Engineering University of Missouri-Kansas CityUSA State Key Laboratory of Information Security Graduate University of Chinese Academy of SciencesChin
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
Generic Transformation from Weakly to Strongly Unforgeable Signatures
收藏 引用
Journal of computer science & Technology 2008年 第2期23卷 240-252页
作者: 黄琼 王石 李进 赵一鸣 Department of Computer Science City University of Hong KongHong KongChina International Research Center for Information Security(IRIS) Information and Communications University( ICU)103-6 Munji-DongYuseong-GuDaejeon305-732Korea Department of Computer Science and Engineering Fudan UniversityShanghaiChina
Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed) require supplementary component... 详细信息
来源: 评论
Design of high-speed network intrusion detection system architecture
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology 2009年 第SUPPL. 1期41卷 198-200页
作者: Yao, Wen-Bin Wang, Cong Liu, Jian-Yi Si, Yan-Fang Yang, Yi-Xian National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology Harbin Engineering University Harbin 150001 China
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow par... 详细信息
来源: 评论