咨询与建议

限定检索结果

文献类型

  • 1,026 篇 会议
  • 990 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,023 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,295 篇 工学
    • 836 篇 计算机科学与技术...
    • 646 篇 软件工程
    • 330 篇 信息与通信工程
    • 156 篇 电气工程
    • 136 篇 电子科学与技术(可...
    • 127 篇 控制科学与工程
    • 95 篇 生物工程
    • 82 篇 机械工程
    • 82 篇 核科学与技术
    • 72 篇 光学工程
    • 63 篇 生物医学工程(可授...
    • 61 篇 网络空间安全
    • 57 篇 动力工程及工程热...
    • 56 篇 仪器科学与技术
    • 51 篇 化学工程与技术
    • 46 篇 交通运输工程
    • 40 篇 安全科学与工程
  • 705 篇 理学
    • 301 篇 物理学
    • 288 篇 数学
    • 115 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 51 篇 化学
    • 44 篇 系统科学
  • 338 篇 管理学
    • 207 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 76 篇 医学
    • 57 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 56 篇 semantics
  • 48 篇 feature extracti...
  • 43 篇 accuracy
  • 38 篇 computational mo...
  • 35 篇 federated learni...
  • 34 篇 robustness
  • 32 篇 protocols
  • 32 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 27 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 25 篇 internet
  • 24 篇 wireless communi...
  • 24 篇 higgs bosons
  • 24 篇 wireless sensor ...
  • 22 篇 data mining

机构

  • 148 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 national and kap...
  • 147 篇 yerevan physics ...
  • 146 篇 university of sp...
  • 145 篇 universidad iber...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 141 篇 department of ph...
  • 140 篇 university of de...
  • 138 篇 imperial college...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 indian institute...
  • 134 篇 infn sezione di ...
  • 132 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 130 篇 centro de invest...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,821 篇 英文
  • 164 篇 其他
  • 40 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2023 条 记 录,以下是1791-1800 订阅
排序:
How to construct forward secure single-server, multi-server and threshold-server assisted signature schemes using Bellare-Miner scheme
How to construct forward secure single-server, multi-server ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Hao, Rong Zhang, Dexiang Li, Guowen College of Information Engineering Qingdao University Qingdao China Institute of Network Security Shandong University Jinan China Network Center Qingdao University Qingdao China School of Computer Science and Technology Shandong Jianzhu University Jinan China
Server-assisted signature plays an important role in all kinds of applications in electronic commerce. It can be applied to the settings where a user employs public network servers to help her execute digital signatur... 详细信息
来源: 评论
Publicly verifiable secret sharing member-join protocol for threshold signatures
Publicly verifiable secret sharing member-join protocol for ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Hao, Rong Li, Xuliang Li, Guowen College of Information Engineering Qingdao University Qingdao China Institute of Network Security Shandong University Jinan China Network Center Qingdao University Qingdao China School of Computer Science and Technology Shandong Jianzhu University Jinan China
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electronic applications. In this paper, we pro... 详细信息
来源: 评论
A Logic for Multi-domain Authorization Considering Administrators
A Logic for Multi-domain Authorization Considering Administr...
收藏 引用
International Workshop on Policies for Distributed Systems and networks
作者: Zeinab Iranmanesh Morteza Amini Rasool Jalili Network Security Center Department of Computer Engineering Sharif University of Technology Tehran Iran
In multi-domain environments, authorization policies for each administrative domain are determined by either one administrator or through cooperation of multiple administrators. Proposed logic-based models for multi-d... 详细信息
来源: 评论
A history based semantic aware access control model using logical time
A history based semantic aware access control model using lo...
收藏 引用
International Conference on computer and Information technology (ICCIT)
作者: Ali Noorollahi Ravari Morteza Amini Rasool Jalili Jafar Haadi Jafarian Network Security Center Computer Engineering Department Sharif University of Technology Tehran Iran
With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. The SBAC... 详细信息
来源: 评论
A Semantic aware Access Control model with real time constraints on history of accesses
A Semantic aware Access Control model with real time constra...
收藏 引用
International Multiconference on computer Science and Information technology, IMCSIT
作者: Ali Noorollahi Ravari Morteza Amini Rasool Jalili Network Security Center Computer Engineering Department Sharif University of Technology Tehran Iran
With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. SBAC mod... 详细信息
来源: 评论
A Strategy Selection Model for network Survivability Based on Fuzzy Matrix Game
A Strategy Selection Model for Network Survivability Based o...
收藏 引用
International Conference on Web-Age Information Management Workshops (WAIM)
作者: Guosheng Zhao Huiqiang Wang Jian Wang Center of Computer Network and Information Harbin Normal University China School of Computer Science and Technology Harbin Engineering of Technology China
Survivability has emerged as a new phase for the development of network security technique, and how to improve the system survivability using effective strategy is an important problem. In this paper, by analyzing the... 详细信息
来源: 评论
FLMAP: A fast lightweight mutual authentication protocol for RFID systems
FLMAP: A fast lightweight mutual authentication protocol for...
收藏 引用
IEEE International Conference on networks
作者: Alireza Sadighian Rasool Jalili Network Security Center Department of Computer Engineering Sharif University of Technology Tehran Iran Department of Computer Engineering Sharif University of Technology Tehran Iran
Numerous authentication protocols for RFID systems were proposed as attempt to prevent unauthorized tracking and monitoring, impersonation or cloning, and information leakage. Many of such attempts cannot establish es... 详细信息
来源: 评论
Content and Overlay-Aware Transmission Scheduling in Peer-to-Peer Streaming
Content and Overlay-Aware Transmission Scheduling in Peer-to...
收藏 引用
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
作者: Jiaming Li Chai Kiat Yeo Bu Sung Lee Center for Multimedia and Network Technology (CeMNet) School of Computer Engineering Nanyang Technological University Singapore
A critical problem for P2P streaming applications is to construct and maintain the overlay such that it continues to efficiently distribute data stream even in dynamic network environment. A common solution to this pr... 详细信息
来源: 评论
Storage requirements for key distribution in sensor networks
Storage requirements for key distribution in sensor networks
收藏 引用
2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008
作者: Liu, Zhihong Jianfeng, Ma Huang, Qiping Moon, SangJae Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University Korea Republic of
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
A Comprehensive Assessment Method for network Survivability
A Comprehensive Assessment Method for Network Survivability
收藏 引用
International Conference on Internet Computing in Science and engineering (ICICSE)
作者: Huiqiang Wang Jian Wang Guosheng Zhao School of Computer Science and Technology Harbin Engineering of Technology Harbin China Center of Computer Network and Information Harbin Normal University Harbin China
Quantifying survivability for network system helps to give more accurate evaluation and compare different system or monitor the change of system survivability. This paper puts forward a new method that combines uncert... 详细信息
来源: 评论