咨询与建议

限定检索结果

文献类型

  • 173 篇 期刊文献
  • 170 篇 会议
  • 7 册 图书

馆藏范围

  • 350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 233 篇 工学
    • 183 篇 计算机科学与技术...
    • 144 篇 软件工程
    • 58 篇 信息与通信工程
    • 37 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 122 篇 理学
    • 76 篇 数学
    • 28 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 9 篇 deep learning
  • 9 篇 security
  • 8 篇 data privacy
  • 8 篇 artificial intel...
  • 7 篇 blockchain
  • 7 篇 protocols
  • 7 篇 accuracy
  • 7 篇 privacy
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 college of cyber...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 kumari saru

语言

  • 322 篇 英文
  • 27 篇 其他
  • 3 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
350 条 记 录,以下是271-280 订阅
排序:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks
On the design of a secure user authentication and key agreem...
收藏 引用
作者: Kumari, Saru Das, Ashok Kumar Wazid, Mohammad Li, Xiong Wu, Fan Choo, Kim-Kwang Raymond Khan, Muhammad Khurram Department of Mathematics Chaudhary Charan Singh University MeerutUttar Pradesh250 005 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411 201 China Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science and Engineering Xiamen Institute of Technology Xiamen361021 China Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX78249 United States School of Computer Science China University of Geosciences Wuhan China School of Information Technology & Mathematical Sciences University of South Australia AdelaideSA Australia Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia
A wireless sensor network (WSN) typically consists of a large number of resource-constrained sensor nodes and several control or gateway nodes. Ensuring the security of the asymmetric nature of WSN is challenging, and... 详细信息
来源: 评论
Local voting: Optimal distributed node scheduling algorithm for multihop wireless networks
arXiv
收藏 引用
arXiv 2017年
作者: Vergados, Dimitrios J. Amelina, Natalia Jiang, Yuming Kralevska, Katina Granichin, Oleg School of Electrical and Computer Engineering National Technical University of Athens Faculty of Mathematics and Mechanics Saint-Petersburg State University Department of Information Security and Communication Technology Norwegian University of Science and Technology
An efficient and fair node scheduling is a big challenge in multihop wireless networks. In this work, we propose a distributed node scheduling algorithm, called Local Voting. The idea comes from the finding that the s... 详细信息
来源: 评论
SMoNt: An ontology for crime solving through social media
收藏 引用
International Journal of Metadata, Semantics and Ontologies 2017年 第2-3期12卷 71-81页
作者: Kalemi, Edlira Yildirim-Yayilgan, Sule Domnori, Elton Elezaj, Ogerta Process and Information Systems Engineering Research Centre University of Surrey Guildford SurreyGU2 7XH United Kingdom Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik2815 Norway Department of Computer Engineering Epoka University Tirana1039 Albania Department of Mathematics Statistics and Applied Informatics University of Tirana Tirana1000 Albania
There are numerous social networks such as Facebook, LinkedIn, Google Plus and Twitter whose data sources are becoming larger every day holding an abundance of valuable information. Among these data, digital crime evi... 详细信息
来源: 评论
New efficient padding methods secure against padding oracle attacks  18th
New efficient padding methods secure against padding oracle ...
收藏 引用
18th International Conference on Information security and Cryptology, ICISC 2015
作者: Kang, HyungChul Park, Myungseo Moon, Dukjae Lee, Changhoon Kim, Jongsung Kim, Kimoon Kim, Juhyuk Hong, Seokhie Korea University Seoul Korea Republic of The Affiliated Insutitude of ETRI Seoul Korea Republic of Department of Computer Science and Engineering Seoul University of Science and Technology Seoul Korea Republic of Department of Mathematics Department of Financial Information Security Kookmin University Seoul Korea Republic of Korea Security and Internet Agency Seoul Korea Republic of
This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle’s characteristic of checking the pad... 详细信息
来源: 评论
A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit
A sharp condition for exact support recovery of sparse signa...
收藏 引用
2016 IEEE International Symposium on Information Theory, ISIT 2016
作者: Wen, Jinming Zhou, Zhengchun Wang, Jian Tang, Xiaohu Mo, Qun College of Information Engineering Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China ENS de Lyon LIP Lyon69007 France School of Mathematics Southwest Jiaotong University Chengdu610031 China Dept. of Electrical and Computer Engineering Seoul National University Seoul151742 Korea Republic of Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China Department of Mathematics Zhejiang University Hangzhou310027 China
Support recovery of sparse signals from noisy measurements with orthogonal matching pursuit (OMP) has been extensively studied in the literature. In this paper, we show that for any K-sparse signal x, if the sensing m... 详细信息
来源: 评论
Survey on cyberspace security
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 5-47页
作者: ZHANG HuanGuo HAN WenBao LAI XueJia LIN DongDai MA JianFeng LI JianHua Computer School of Wuhan University State Key Laboratory of Mathematics Engineering and Advanced Computing Department of Computer Shanghai Jiaotong University Institute of Information Engineering Chinese Academy of Sciences School of Cyber Engineering Xidian University School of Information Security Engineering Shanghai Jiaotong University
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. Cyberspace is the collection of all info... 详细信息
来源: 评论
Big Data Analytics study «Third Wave»
Big Data Analytics study «Third Wave»
收藏 引用
International Conference on Confluence The Next Generation Information Technology Summit (Confluence)
作者: Olga Kolesnichenko Gennady Smorodin Victor Dashonok Oleg Zhurenkov Lev Mazelis Dariya Yakovleva Security Analysis Bulletin Moscow Russia CIS EMC Academic Alliance Russia St. Petersburg Russia Department of Mathematics and Engineering computer science in Economics Altai Academy of Economics and Law Barnaul Russia Department of Mathematics and Modeling Vladivostok State University of Economics and Service Vladivostok Russia Department of Information Technology and Systems Vladivostok State University of Economics and Service Vladivostok Russia
In this study EMC Academic Alliance for the first time has applied the new approach to organize the Big Data Analytics study. The Multicenter Study "Third Wave" was presented at the EMC Academic Forum Russia... 详细信息
来源: 评论
A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit
A sharp condition for exact support recovery of sparse signa...
收藏 引用
IEEE International Symposium on Information Theory
作者: Jinming Wen Zhengchun Zhou Jian Wang Xiaohu Tang Qun Mo College of Information Engineering Shenzhen University Shenzhen China ENS de Lyon LIP Lyon France School of Mathematics Southwest Jiaotong University Chengdu China Dept. of Electrical & Computer Engineering Seoul National University Seoul Korea Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu China Department of Mathematics Zhejiang University Hangzhou China
Support recovery of sparse signals from noisy measurements with orthogonal matching pursuit (OMP) has been extensively studied in the literature. In this paper, we show that for any K-sparse signal x, if the sensing m... 详细信息
来源: 评论
Multicast adaptive logic for Dynamic Adaptive Streaming over HTTP network
Multicast adaptive logic for Dynamic Adaptive Streaming over...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2015
作者: Dubin, Ran Dvir, Amit Hadar, Ofer Harel, Nissim Barkan, Refael Communication Systems Engineering Ben-Gurion University of the Negev Israel Cyber Security Center Department of Computer Science and Mathematics Ariel University Israel Computer Science Department Holon Institute of Technology Israel Computer Science School College of Management Academic Studies Israel
Video streaming constitutes the vast majority of Internet traffic and the DASH protocol has become the de-facto standard in the industry of multimedia delivery. The multicast method for information distribution has th... 详细信息
来源: 评论
Review of one-time signatures for multicast authentication in smart grid
Review of one-time signatures for multicast authentication i...
收藏 引用
International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)
作者: Cheongmin Ji Jimin Kim Jae-Young Lee Manpyo Hong Department of Computer Engineering Ajou University Suwon Republic of Korea Department of Mathematics Seoul International School Seongnam Republic of Korea Department of Cyber Security Ajou University Suwon Republic of Korea
One-time signatures are known to be one of the most promising solution for time-critical multicast authentication in environments with resource-constrained devices such as smart grid. There have been several solutions... 详细信息
来源: 评论