咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3541-3550 订阅
排序:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme
收藏 引用
Journal of computer science & technology 2008年 第2期23卷 265-269页
作者: 刘胜利 陈晓峰 张方国 Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Information SecurityInstitute of SoftwareChinese Academy of Sciences Beijing 100080China Department of Computer Science School of Information Science and TechnologySun Yat-Sen University Guangzhou 510275China Department of Electronics and Communication Engineering School of Information Science and Technology Sun Yat-Sen UniversityGuangzhou 510275China
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPB... 详细信息
来源: 评论
Efficient certificate-based signcryption scheme from bilinear pairings
收藏 引用
International Journal of computers and Applications 2008年 第2期30卷 129-133页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryptio... 详细信息
来源: 评论
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions
Biomapping: Privacy trustworthy biometrics using noninvertib...
收藏 引用
作者: Shi, Jinyang You, Zhiyang Gu, Ming Lam, Kwok-Yan Key Laboratory for Information System Security Ministry of Education Tsinghua University China Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University China
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent association with the user, privacy-prese... 详细信息
来源: 评论
ID-based threshold proxy signcryption scheme from bilinear pairings
收藏 引用
International Journal of security and Networks 2008年 第3期3卷 206-215页
作者: Li, Fagen Xin, Xiangjun Hu, Yupu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 Sichuan China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 Henan China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 Shaanxi China
A (t, n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, a new identit... 详细信息
来源: 评论
A new type of designated confirmer signatures for a group of individuals
收藏 引用
International Journal of Network security 2008年 第2期7卷 293-300页
作者: Wei, Baodian Zhang, Fangguo Chen, Xiaofeng Department of Electronics and Communication Engineering Sun Yat-sen University Guangzhou 510275 China Department of Computer Science Sun Yat-sen University Guangzhou 510275 China Guangdong Key Laboratory of Information Security Technology Guangzhou 510275 China
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and that of the confirmer are both expected ... 详细信息
来源: 评论
Algebraic Construction for Zero-Knowledge Sets
收藏 引用
Journal of computer science & technology 2008年 第2期23卷 166-175页
作者: 薛锐 李宁辉 李江滔 The State Key Laboratory of Information Security Institute of SoftwareChinese Academy of Sciences Beijing 100080China Department of Computer Science Purdue UniversityWest LafayetteU.S.A. Software and Solutions Group Intel CorporationHillsboroU.S.A.
Zero knowledge sets is a new cryptographic primitive introduced by Micali, Rabin, and Kilian in FOCS 2003. It has been intensively studied recently. However all the existing ZKS schemes follow the basic structure by M... 详细信息
来源: 评论
Kernel Parameter Optimization for Kernel-based LDA methods
Kernel Parameter Optimization for Kernel-based LDA methods
收藏 引用
International Joint Conference on Neural Networks
作者: Huang, Jian Chen, Xiaoming Yuen, P. C. Zhang, Jun Chen, W. S. Lai, J. H. School of Information Science and Technology Sun Yat-Sen University China Guangdong Key Laboratory of Information Security China Department of Computer Science Hong Kong Baptist University Institute of Computing Science College of Mathematics and Computational Science Shenzhen University China
Kernel approach has been employed to solve classification problem with complex distribution by mapping the input space to higher dimensional feature space. However, one of the crucial factors in the Kernel approach is... 详细信息
来源: 评论
Analysis and verification of dynamic stock trading systems
收藏 引用
information technology Journal 2008年 第3期7卷 466-473页
作者: Du, Yuyue Zheng, Hong Yu, Shuxia College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
A dynamic stock trading system with a distributed shared memory is analyzed formally based on its temporal Petri net model. The functional correctness of the system is formally verified and some important properties o... 详细信息
来源: 评论
Proxy blind signature scheme and a multi-proxy blind signature scheme based on XTR
收藏 引用
Journal of information and Computational science 2008年 第1期5卷 305-312页
作者: Zhang, Jianhong Ji, Cheng Mao, Jian College of Sciences North China University of Technology Beijing 100041 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Institute of Computer Science and Technology Peking University Beijing 100871 China
The definition of XTR system, which is based on the elements' trace compact denotation in the subgroup of the multiplicative group of the finite field, is a new public key system. We propose two signature schemes ... 详细信息
来源: 评论
Modeling non-repudiation in distributed systems
收藏 引用
information technology Journal 2008年 第1期7卷 228-230页
作者: Zheng, Hong Du, YuYue Yu, ShuXia Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security servi... 详细信息
来源: 评论