咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是671-680 订阅
排序:
Combinatorial optimization of multicast key management
Combinatorial optimization of multicast key management
收藏 引用
Annual Hawaii International Conference on System sciences (HICSS)
作者: L. Morales I.H. Sudborough M. Eltoweissy M.H. Heydari Department of Computer Science and Information Systems Texas A and M University Commerce TX USA Department of Computer Science Erik Jonsson School of Engineering and Computer Science University of Texas Dallas Richardson TX USA Commonwealth Information Security Center James Madison University Harrisonburg VA USA
There are numerous applications that require secure group communication. Much recent attention has been focused on secure multicasting over the Internet. When such systems are required to manage large groups which und... 详细信息
来源: 评论
A GUI software development system for digital AV applications
收藏 引用
Systems and computers in Japan 2003年 第7期34卷 99-107页
作者: Haruna, Shuusuke Sanada, Norio Kinoh, Hisayuki Sumiya, Kazutoshi Taki, Kazuo Department of Information Grad. Sch. of Science and Technology Kobe University Kobe 657-8501 Japan Core Software Development Center Matsushita Elec. Indust. Co. Ltd. Kadoma 571-8501 Japan Res. Ctr. for Urban Safety/Security Kobe University Kobe 657-8501 Japan Department of Computer Engineering Faculty of Engineering Kobe University Kobe 657-8501 Japan
The scale of software on digital AV appliances that handle large-volume multichannel digital data has been increased by the GUIs (graphical user interfaces) loaded on them in recent years. In addition, the GUIs of AV ... 详细信息
来源: 评论
Privacy-preserving cooperative statistical analysis  17
Privacy-preserving cooperative statistical analysis
收藏 引用
17th Annual computer security Applications Conference, ACSAC 2001
作者: Du, Wenliang Atallah, Mikhail J. Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall SyracuseIN13244 United States Department of Computer Sciences Center for Education and Research in Information Assurance and Security Purdue University 1315 Recitation Building West LafayetteIN47907 United States
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these computations may occur between mutually un... 详细信息
来源: 评论
Privacy-preserving cooperative statistical analysis
Privacy-preserving cooperative statistical analysis
收藏 引用
Annual computer security Applications Conference
作者: Wenliang Du M.J. Atallah Department of Electrical Engineering and Computer Science Syracuse University Syracuse IN USA Department of Computer Science and Center for Education and Research in Information Assurance and Security Purdue University West Lafayette IN USA
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these computations may occur between mutually un... 详细信息
来源: 评论
A TV program generation system using digest video scenes and a scripting markup language
A TV program generation system using digest video scenes and...
收藏 引用
Annual Hawaii International Conference on System sciences (HICSS)
作者: Y. Shirota T. Hashimoto A. Nadamoto T. Hattori A. Iizawa K. Tanaka K. Sumiya Software Research Center Imaging System Business Group Ricoh Company Limited Japan Division of Information and Media Science Graduate School of Science and Technology Kobe University Japan Department of Computer and Systems Engineering Graduate School of Science and Technology Kobe University Japan Division of Urban Information Systems Research Center for Urban Safety and Security Kobe University Japan
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically gene... 详细信息
来源: 评论
ESALP2: Efficient Signature Aggregation with Location Privacy Preservation in Wireless Body Area Networks
收藏 引用
ACM Transactions on Sensor Networks 1000年
作者: Arun Sekar Rajasekaran Azees Maria Basker Palaniswamy Ashok Kumar Das Mohammed J.F. Alenazi Department of Electronics and Communication Engineering SR University Hanamakonda India School of Computer Science and Engineering VIT-AP University Amaravati India Insight Centre for Data Analytics School of Computer Science and Information Technology University College Cork Cork Ireland Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad Hyderabad India Department of Computer Engineering College of Computer and Information Sciences CCIS) King Saud University Riyadh Saudi Arabia
For Wireless Body Area Networks (WBANs), the security of sensitive data of patients is of the utmost importance, particularly in healthcare environments. This study presents a novel methodology for improving the effic... 详细信息
来源: 评论
Applied Soft Computing and Communication Networks  1
收藏 引用
丛书名: Lecture Notes in Networks and Systems
1000年
作者: Sabu M. Thampi Jiankun Hu Ashok Kumar Das Jimson Mathew Shikha Tripathi
来源: 评论
Android Malware Detection using Machine Learning  1
收藏 引用
丛书名: Advances in information security
1000年
作者: ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware cor... 详细信息
来源: 评论
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes  1
收藏 引用
丛书名: Lecture Notes in computer science
1000年
作者: Marc P. C. Fossorier Hideki Imai Shu Lin Alain Poli
来源: 评论
Advances in information security and Its Application  1
收藏 引用
丛书名: Communications in computer and information science
1000年
作者: Jong Hyuk Park Justin Zhan Changhoon Lee Guilin Wang Tai-hoon Kim Sang-Soo Yeo
Welcome to the Third International Conference on information security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused on the various aspects of advances in information security and ass... 详细信息
来源: 评论