咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 46 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 50 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 24 篇 信息与通信工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 6 篇 控制科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 光学工程
  • 31 篇 理学
    • 14 篇 数学
    • 14 篇 物理学
    • 5 篇 生物学
    • 3 篇 化学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 3 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学

主题

  • 27 篇 computer science
  • 24 篇 cities and towns
  • 13 篇 cryptography
  • 13 篇 telecommunicatio...
  • 12 篇 routing
  • 11 篇 bandwidth
  • 11 篇 quality of servi...
  • 10 篇 intelligent netw...
  • 10 篇 costs
  • 9 篇 traffic control
  • 8 篇 delay
  • 7 篇 computer archite...
  • 7 篇 algorithm design...
  • 6 篇 computational mo...
  • 6 篇 protocols
  • 5 篇 data security
  • 5 篇 hardware
  • 5 篇 local area netwo...
  • 5 篇 communication sy...
  • 4 篇 computer network...

机构

  • 11 篇 computer science...
  • 10 篇 telecommunicatio...
  • 8 篇 department of co...
  • 8 篇 computer science...
  • 5 篇 computer science...
  • 5 篇 department of co...
  • 5 篇 telecommunicatio...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 computer science...
  • 3 篇 department of co...
  • 3 篇 telecommunicatio...
  • 3 篇 computer science...
  • 3 篇 department of el...
  • 2 篇 donostia interna...
  • 2 篇 infn gruppo coll...
  • 2 篇 university of ge...
  • 2 篇 institute for th...
  • 2 篇 dept. of electri...
  • 2 篇 computer science...

作者

  • 8 篇 harn l
  • 8 篇 t.f. znati
  • 6 篇 d. medhi
  • 6 篇 znati taieb f.
  • 6 篇 nedjah nadia
  • 5 篇 jing chen
  • 4 篇 a. van de liefvo...
  • 4 篇 nery alexandre s...
  • 4 篇 hui yu
  • 4 篇 jianping wang
  • 4 篇 xiaojun shen
  • 4 篇 zhou mu
  • 4 篇 xu kunjie
  • 4 篇 tian zengshan
  • 4 篇 j.p. agrawal
  • 3 篇 frança felipe m....
  • 3 篇 l. harn
  • 3 篇 s. q. zheng
  • 3 篇 alexandre s. ner...
  • 3 篇 znati taieb

语言

  • 150 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Science Telecommunications Program"
153 条 记 录,以下是1-10 订阅
排序:
MODIFIED KEY AGREEMENT PROTOCOL BASED ON THE DIGITAL SIGNATURE STANDARD
收藏 引用
ELECTRONICS LETTERS 1995年 第6期31卷 448-449页
作者: HARN, L Computer Science Telecommunications Program University of Missouri Kansas City USA
Arazi proposed a scheme to integrate a key exchange protocol into the DSS (digital signature standard) to authenticate two public keys exchanged between two users and then one corresponding secret session key can be s... 详细信息
来源: 评论
A UNIFIED APPROACH TO NETWORK SURVIVABILITY FOR TELETRAFFIC NETWORKS - MODELS, ALGORITHMS AND ANALYSIS
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 1994年 第2-4期42卷 534-548页
作者: MEDHI, D Computer Science Telecommunications Program University of Missouri Kansas City MO USA
In this paper, we address the problem of network survivability by presenting a unified approach where the wide-area circuit-switched teletraffic network and the underlying transmission facility network are considered ... 详细信息
来源: 评论
DSA TYPE SECURE INTERACTIVE BATCH VERIFICATION PROTOCOLS
收藏 引用
ELECTRONICS LETTERS 1995年 第4期31卷 257-258页
作者: HARN, L Computer Science Telecommunications Program University of Missouri Kansas City USA
The author proposes some DSA type secure interactive batch verification protocols, where the signer generates n signatures through interactions with the verifier, and the verifier validates all these n signatures.
来源: 评论
KEY MANAGEMENT FOR DECENTRALIZED computer NETWORK SERVICES
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 1993年 第12期41卷 1777-1779页
作者: HARN, L LIN, HY Computer Science Telecommunications Program University of Missouri Kansas City MO USA
When a computer network grows larger and adds more services offered by different providers, each user may have to keep many keys for different services. Incorporating smart card technologies and master key concept, th... 详细信息
来源: 评论
INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
收藏 引用
IEE PROCEEDINGS-E computerS AND DIGITAL TECHNIQUES 1992年 第2期139卷 139-143页
作者: HARN, L LIN, HY Computer Science Telecommunications Program University of Missouri—Kansas City Kansas City USA
User authentication and access control are both necessary mechanisms for data protection in a computer system. Traditionally, they are implemented in different modules. In this paper, a new solution is presented to pr... 详细信息
来源: 评论
A PROTOCOL FOR ESTABLISHING SECURE COMMUNICATION CHANNELS IN A LARGE NETWORK
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 1994年 第1期6卷 188-191页
作者: HARN, L HUANG, D Computer Science Telecommunications Program University of Missouri Kansas City Kansas City MO USA
Knowledge exchange and information access in a truly distributed network often require transmitting of data through an open media. Consequently, data presented through such an environment are vulnerable to attacks. To... 详细信息
来源: 评论
REALIZATION OF AN ARBITRARY PERMUTATION ON A HYPERCUBE
收藏 引用
INFORMATION PROCESSING LETTERS 1994年 第5期51卷 237-243页
作者: SHEN, XJ HU, Q LIANG, WF Computer Science Telecommunications Program University of Missouri - Kansas City 5100 Rockhill Road Kansas City MO 64110 USA
We present an explicit combinatorial algorithm for constructing a 2-realization for any given permutation on a circuit-switched d-dimensional hypercube (d-cube) such that the total number of directed edges used in the... 详细信息
来源: 评论
Cryptographic key generation scheme for multilevel data security
收藏 引用
computers & Security 1990年 第6期9卷 539-546页
作者: Harn, Lein Lin, Hung-Yu Computer Science Telecommunications Program University of Missouri-Kansas City Kansas City MO U.S.A.
In 1982, Akl and Taylor proposed an elegant solution to the partially ordered multilevel key distribution problem, using a cryptographic approach. Since then, continuing research has been conducted to try to realize a... 详细信息
来源: 评论
THE WAITING-TIME DISTRIBUTION AND ITS MOMENTS OF THE PH/PH/1 QUEUE
收藏 引用
OPERATIONS RESEARCH LETTERS 1990年 第4期9卷 261-269页
作者: VANDELIEFVOORT, A Computer Science Telecommunications Program University of Missouri-Kansas City 5100 Rockhill Road Kansas City MO 64110-2499 USA
Performance characteristics for the stable PH/PH/1 queue are usually given in terms of the geometric generator matrix R . The waiting-time distribution, however, can be computed with a formalism that does not make use... 详细信息
来源: 评论
FAIR RECONSTRUCTION OF A SECRET
收藏 引用
INFORMATION PROCESSING LETTERS 1995年 第1期55卷 45-47页
作者: LIN, HY HARN, L Computer Science Telecommunications Program University of Missouri — Kansas City 5100 Rockhill Road Kansas City MO 64110 USA
After gathering sufficient shadows from honest participants and deriving the secret exclusively, a participant, in the process of reconstruction a secret, can turn dishonest and withhold his own shadow (or present a f... 详细信息
来源: 评论