咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 51 篇 期刊文献

馆藏范围

  • 128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 61 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 20 篇 信息与通信工程
    • 11 篇 电气工程
    • 8 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 化学工程与技术
    • 2 篇 石油与天然气工程
  • 44 篇 理学
    • 26 篇 数学
    • 14 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 4 篇 系统科学
    • 2 篇 化学
  • 20 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 9 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 3 篇 医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学

主题

  • 6 篇 deep learning
  • 5 篇 computational mo...
  • 3 篇 conferences
  • 3 篇 support vector m...
  • 3 篇 public key crypt...
  • 3 篇 accuracy
  • 3 篇 quantum cryptogr...
  • 3 篇 privacy
  • 3 篇 cryptography
  • 2 篇 learning systems
  • 2 篇 scalability
  • 2 篇 sustainable deve...
  • 2 篇 telecommunicatio...
  • 2 篇 temperature meas...
  • 2 篇 genes
  • 2 篇 5g mobile commun...
  • 2 篇 medical services
  • 2 篇 quality of servi...
  • 2 篇 adversarial mach...
  • 2 篇 monitoring

机构

  • 7 篇 state key labora...
  • 6 篇 science and tech...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 care college of ...
  • 5 篇 institute of sys...
  • 5 篇 department of co...
  • 5 篇 saveetha institu...
  • 5 篇 saveetha institu...
  • 5 篇 tianjin key labo...
  • 4 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 amrita vishwa vi...
  • 4 篇 research center ...
  • 3 篇 center for cyber...
  • 3 篇 shandong provinc...
  • 3 篇 state key labora...
  • 3 篇 center for intel...
  • 3 篇 department of mu...
  • 3 篇 school of comput...

作者

  • 6 篇 zhang yichen
  • 5 篇 guo hong
  • 5 篇 yu song
  • 5 篇 prabhakar krishn...
  • 5 篇 krishnan prabhak...
  • 5 篇 kharchenko vyach...
  • 5 篇 xu bingjie
  • 4 篇 lingjun pu
  • 4 篇 yang yang
  • 4 篇 chen ziyang
  • 4 篇 jingdong xu
  • 4 篇 fesenko herman
  • 4 篇 xinjing yuan
  • 4 篇 balakrishnan t. ...
  • 4 篇 u. samson ebenez...
  • 4 篇 ebenezar u. sams...
  • 4 篇 guan xiaohong
  • 4 篇 t. suresh balakr...
  • 3 篇 zeng bo
  • 3 篇 hongli zhang

语言

  • 114 篇 英文
  • 12 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Networks and Systems Security"
128 条 记 录,以下是111-120 订阅
排序:
A parallel encryption algorithm of the logistic map for multicore with OpenMP
A parallel encryption algorithm of the logistic map for mult...
收藏 引用
8th International Forum on Strategic Technology, IFOST 2013
作者: Liu, Jiahui Zhang, Hongli Song, Dahua Sun, Guanglu Bi, Wenchong Buza, M.K. Harbin University of Science and Technology College of Computer Science and Technology Harbin China Harbin Institute of Technology Research Center of Computer Network and Information Security Technology Harbin China Mudanjiang Medical University Center of Educational Technology and Information Mudanjiang China Belarusian State University Department of Multiprocessor Systems and Networks Minsk Belarus
The multicore structure has been mainstreamed. The paper introduces a parallel chaos-based encryption approach in order to take advantage of the multicore processor. The chaotic cryptosystem is based on the logistic m... 详细信息
来源: 评论
Elastic correction of altitude errors in indoor location system
Elastic correction of altitude errors in indoor location sys...
收藏 引用
Computing, Communications and Applications Conference (ComComAp)
作者: Yingzheng Hong Yang Yang Chunhui Sun Shanghai Fire Research Institute Ministry of Public Security Shanghai China College of Mathematics and Computer Science Key Lab of Information Security of Networks Systems Fuzhou University Fuzhou Fujian China
Firefigher indoor location system is crucial for determining firefighter's precise position in a burning building. When a firefighter encounters dangerous, the commander could immediately obtain his position infor... 详细信息
来源: 评论
Proxy re-encryption conjunctive keyword search against keyword guessing attack
Proxy re-encryption conjunctive keyword search against keywo...
收藏 引用
Computing, Communications and Applications Conference (ComComAp)
作者: Yang Yang Maode Ma Bogang Lin College of Mathematics and Computer Science Key Lab of Information Security of Networks Systems Fuzhou University Fuzhou Fujian China School of Electrical & Electronic Engineering Nanyang Technological University Singapore Singapore
Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword... 详细信息
来源: 评论
A parallel encryption algorithm of the logistic map for multicore with OpenMP
A parallel encryption algorithm of the logistic map for mult...
收藏 引用
International Forum on Strategic Technology, IFOST
作者: Jiahui Liu Hongli Zhang Dahua Song Guanglu Sun Wenchong Bi M. K. Buza Harbin University of Science and Technology Harbin Heilongjiang CN Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin China Center of Educational Technology and Infonnation Mudanjiang Medical University Mudanjiang China College of Computer Science and Technology Harbin University of Science and Technology Harbin China Department of Multiprocessor Systems and Networks Belarusian State University Minsk Belarus
The multicore structure has been mainstreamed. The paper introduces a parallel chaos-based encryption approach in order to take advantage of the multicore processor. The chaotic cryptosystem is based on the logistic m... 详细信息
来源: 评论
A communication efficient group key distribution scheme for MANETs
A communication efficient group key distribution scheme for ...
收藏 引用
6th International Conference on Network and System security, NSS 2012
作者: Yang, Yang College of Mathematics and Computer Science Fuzhou University Fuzhou 350002 China Key Lab. of Information Security of Networks Systems Fuzhou University Fujian Province 350002 China
To secure the group communication in wireless ad hoc networks, a group key shared between participants is required. The special nature and the constraints posed by wireless ad hoc networks make the establishment of a ... 详细信息
来源: 评论
A lightweight privacy preserving approach for analyzing communication records to prevent voip attacks using toll fraud as an example
A lightweight privacy preserving approach for analyzing comm...
收藏 引用
11th IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom-2012
作者: Hofbauer, Stefan Beckers, Kristian Quirchmayr, Gerald Sorge, Christoph Network Department Danube Data Center GmbH Vienna Austria Software Engineering Paluno University of Duisburg-Essen Dusiburg Germany Multimedia Information Systems Research Group University of Vienna Vienna Austria School of Computer and Information Security University of South Australia Adelaide SA Australia Security in Networks University of Paderborn Paderborn Germany
Voice-over-IP systems are quite frequently attacked with the intent of service theft. While VoIP security has been intensively researched in the past, devised solutions often demand significant changes to the VoIP sys... 详细信息
来源: 评论
A new property of logistic map with scalable precision
A new property of logistic map with scalable precision
收藏 引用
5th International Workshop on Chaos-Fractals Theories and Applications, IWCFTA 2012
作者: Liu, Jiahui Zhang, Hongli Song, Dahua Buza, M.K. Yang, Bo Guo, Cong College of Computer Science and Technology Harbin University of Science and Technology Harbin China Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin China Center of Educational Technology and Information Mudanjiang Medical University Mudanjiang China Department of Multiprocessor Systems and Networks Belarusian State University Minsk Belarus
In this paper, iteration method of logistic map with low positions is introduced in order to investigate property of logistic map. Basic structure of logistic map is proposed, which consists of common gene positions (... 详细信息
来源: 评论
A new property of logistic map with scalable precision
A new property of logistic map with scalable precision
收藏 引用
2012 Fifth International Workshop on Chaos-Fractals Theories and Applications
作者: Jiahui Liu Hongli Zhang Dahua Song M.K.Buza Bo Yang Cong Guo College of Computer Science and Technology Harbin University of Science and Technology Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Center of Educational Technology and Information Mudanjiang Medical University Department of Multiprocessor Systems and Networks Belarusian State University
In this paper, iteration method of logistic map with low positions is introduced in order to investigate property of logistic map. Basic structure of logistic map is proposed, which consists of common gene positions (... 详细信息
来源: 评论
A New Property of Logistic Map with Scalable Precision
A New Property of Logistic Map with Scalable Precision
收藏 引用
International Workshop on Chaos-Fractals Theories and Applications (IWCFTA)
作者: Jiahui Liu Hongli Zhang Dahua Song M.K. Buza Bo Yang Cong Guo Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin China College of Computer Science and Technology Harbin University of Science and Technology Harbin China Center of Educational Technology and Information Mudanjiang Medical University Mudanjiang China Department of Multiprocessor Systems and Networks Belarusian State University Minsk Belarus
In this paper, iteration method of logistic map with low positions is introduced in order to investigate property of logistic map. Basic structure of logistic map is proposed, which consists of common gene positions (... 详细信息
来源: 评论
Assessing Measurements of QoS for Global Cloud Computing Services
Assessing Measurements of QoS for Global Cloud Computing Ser...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Jens Myrup Pedersen M. Tahir Riaz Joaquim Celestino Junior Bozydar Dubalski Damian Ledzinski Ahmed Patel Department of Electronic Systems Aalborg University Aalborg Denmark Computer Networks & Security Laboratory (LARCES) State University of Ceara (UECE) Fortaleza Ceara Brazil Institute of Telecommunications University of Technology & Life Sciences Bydgoszcz Poland Software Technology & Management Research Center Faculty of Information Science & Technology University Kebangsaan Malaysia Bangi Selangor Darul Ehsan Malaysia Software Technology & Management Research Center UKM Bangi Sengalor Malaysia
Many global distributed cloud computing applications and services running over the Internet, between globally dispersed clients and servers, will require certain levels of Quality of Service (QoS) in order to deliver ... 详细信息
来源: 评论