咨询与建议

限定检索结果

文献类型

  • 173 篇 期刊文献
  • 170 篇 会议
  • 7 册 图书

馆藏范围

  • 350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 233 篇 工学
    • 183 篇 计算机科学与技术...
    • 144 篇 软件工程
    • 58 篇 信息与通信工程
    • 37 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 122 篇 理学
    • 76 篇 数学
    • 28 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 9 篇 deep learning
  • 9 篇 security
  • 8 篇 data privacy
  • 8 篇 artificial intel...
  • 7 篇 blockchain
  • 7 篇 protocols
  • 7 篇 accuracy
  • 7 篇 privacy
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 college of cyber...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 kumari saru

语言

  • 322 篇 英文
  • 27 篇 其他
  • 3 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
350 条 记 录,以下是291-300 订阅
排序:
Simultaneous Stochastic Approximation for the spectroscopic reconstruction of neutron distributions
Simultaneous Stochastic Approximation for the spectroscopic ...
收藏 引用
IEEE Conference on Decision and Control
作者: Neveen Shlayan David Costa Pushkin Kachroo Eric Machorro Aaron Luttman Department of Electrical Engineering State University of New York-Maritime USA Department of Mathematics University of Nevada Las Vegas Department of Electrical and Computer Engineering University of Nevada Las Vegas National Security Technologies Las Vegas NV
Various aspects of the neutron spectroscopy problem are studied in this research. Theoretically, the neutron emission problem transforms into a limited angle Radon transform problem. In order to solve this ill posed p... 详细信息
来源: 评论
A Secure Communication Approach for Mobile Intelligent Terminal
A Secure Communication Approach for Mobile Intelligent Termi...
收藏 引用
International Conference on computer Sciences and Applications (CSA)
作者: Fan Zhang Cong Zhang Mingdi Xu Minghui Yang School of Mathematics & Computer Science Wuhan Polytechnic University Wuhan China System Software Department Wuhan Digital Engineering Institute Wuhan China Third Research Institute of Ministry of Public Security Shanghai China
Currently, various mobile intelligent terminals have penetrated into our daily life. But at the same time, security and privacy issues of mobile intelligent terminals become a serious problem. In this paper, we presen... 详细信息
来源: 评论
Abstracts from the 3rd International Genomic Medicine Conference (3rd IGMC 2015) : Jeddah, Kingdom of Saudi Arabia. 30 November - 3 December 2015
收藏 引用
BMC genomics 2016年 第6期17 Suppl 6卷 487页
作者: Jerry W. Shay Noriko Homma Ruyun Zhou Muhammad Imran Naseer Adeel G. Chaudhary Mohammed Al-Qahtani Nobutaka Hirokawa Maryam Goudarzi Albert J. Fornace Saleh Baeesa Deema Hussain Mohammed Bangash Fahad Alghamdi Hans-Juergen Schulten Angel Carracedo Ishaq Khan Hanadi Qashqari Nawal Madkhali Mohamad Saka Kulvinder S. Saini Awatif Jamal Jaudah Al-Maghrabi Adel Abuzenadah Adeel Chaudhary Mohammed Al Qahtani Ghazi Damanhouri Heba Alkhatabi Anne Goodeve Laura Crookes Nikolas Niksic Nicholas Beauchamp Adel M. Abuzenadah Jim Vaught Bruce Budowle Mourad Assidi Abdelbaset Buhmeida Leena Merdad Sudhir Kumar Sayaka Miura Karen Gomez Mahmood Rasool Ahmed Rebai Sajjad Karim Hend F. Nour Eldin Heba Abusamra Elham M. Alhathli Nada Salem Mohammed H. Al-Qahtani Hossam Faheem Ashok Agarwa Eberhard Nieschlag Joachim Wistuba Oliver S. Damm Mohd A. Beg Taha A. Abdel-Meguid Hisham A. Mosli Osama S. Bajouh Serdar Coskun Muhammad Abu-Elmagd Ashraf Dallol Sahar Hakamy Wejdan Al-Qahtani Asia Al-Harbi Shireen Hussain Burak Ozkosem Rick DuBois Safia S. Messaoudi Maryam T. Dandana Touhami Mahjoub Wassim Y. Almawi S. Abdalla M. Nabil Al-Aama Asmaa Elzawahry Tsuyoshi Takahashi Sachiyo Mimaki Eisaku Furukawa Rie Nakatsuka Isao Kurosaka Takahiko Nishigaki Hiromi Nakamura Satoshi Serada Tetsuji Naka Seiichi Hirota Tatsuhiro Shibata Katsuya Tsuchihara Toshirou Nishida Mamoru Kato Sajid Mehmood Naeem Mahmood Ashraf Awais Asif Muhammad Bilal Malik Siddique Mehmood Aadil Hussain Qazi Mohammad Sajid Jamal Mughees Uddin Siddiqui Mohammad A. Alzohairy Mohammad A. Al Karaawi Taoufik Nedjadi Heba Al-Khattabi Adel Al-Ammari Ahmed Al-Sayyad Hédia Zitouni Nozha Raguema Marwa Ben Ali Wided Malah Raja Lfalah Wassim Almawi Mohammed Elanbari Andrey Ptitsyn Sana Mahjoub Rabeb El Ghali Bechir Achour Nidhal Ben Amor Brahim N’siri Hamid Morjani Esam Azhar Vera Chayeb Maryam Dendena Hedia Zitouni Khedija Zouari-Limayem Bassem Refaat Ahmed M. Ashshi Sarah A. Batwa Hazem Ramadan Amal Awad Ahmed Ateya Adel Galal Ahmed El-Shemi Ahmad Ashshi Mohammed Basalamah Youjin Na Cha University of Texas Southwestern Medical Center Dallas USA Department of Cell Biology and Anatomy Graduate School of Medicine the University of Tokyo Tokyo Japan Center of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Department of Biochemistry and Molecular & Cellular Biology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Oncology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Radiation Medicine Lombardi Comprehensive Cancer Center Georgetown University Washington USA Center of Excellence in Genomic Medicine Research (CEGMR) King Abdulaziz University Jeddah Kingdom of Saudi Arabia King Fahd Medical Research Centre King Abdulaziz University Jeddah Saudi Arabia Centre of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Sheffield Diagnostic Genetic Service Sheffield Children’s NHS Foundation Trust Western Bank Sheffield UK Center of Innovations in Personalized Medicine King Abdulaziz University Jeddah Saudi Arabia President ISBER Editor-in-Chief Biopreservation & Biobanking ᅟ USA Institute of Applied Genetics Department of Molecular and Medical Genetics University of North Texas Health Science Center Fort Worth USA Department of Dental Public Health Faculty of Dentistry King Abdulaziz University Jeddah Saudi Arabia Institute for Genomics and Evolutionary Medicine Temple University Philadelphia USA Center of Excellence in Genomic Medicine King Abdulaziz University Jeddah Kingdom of Saudi Arabia Laboratory of Molecular and Cellular Screening Processes (Bioinformatics Group) Centre of Biotechnology of Sfax Sfax Tunisia Fujitsu Technology Solutions International ᅟ ᅟ Case Western Reserve University School of Medicine and Lerner College of Medicine Cleveland Clinic Foundation Cleveland USA American Center for Reproductive Medicine Andrology Center Cleveland USA Center for Reproductive Medicine and
O1 Regulation of genes by telomere length over long distances Jerry W. Shay O2 The microtubule destabilizer KIF2A regulates the postnatal establishment of neuronal circuits in addition to prenatal cell survival, cell ...
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论
Efficient escrow-free identity-based signature
Efficient escrow-free identity-based signature
收藏 引用
6th International Conference on Provable security, ProvSec 2012
作者: Zhang, Yunmei Liu, Joseph K. Huang, Xinyi Au, Man Ho Susilo, Willy School of Computer Science and Software Engineering University of Wollongong Australia Cryptography and Security Department Institute for Infocomm Research Singapore School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian China
The notion of identity-based signature scheme (IBS) has been proven useful in some scenarios where relying on the validity of the certificates is impractical. Nevertheless, one remaining inherent problem that hinders ... 详细信息
来源: 评论
A novel security architecture for a space-data DTN
A novel security architecture for a space-data DTN
收藏 引用
10th International Conference on Wired / Wireless Internet Communications, WWIC 2012
作者: Clarke, Nathan L. Katos, Vasilis Menesidou, Sofia-Anna Ghita, Bogdan Furnell, Steven School of Computing and Mathematics Plymouth University Plymouth United Kingdom School of Computing and Security Edith Cowan University WA Australia Department of Electrical and Computer Engineering Democritus University of Thrace Greece
In this paper we reflect upon the challenges and constraints of a DTN infrastructure handling space data and propose a suitable security architecture for offering security services. The security requirements are expre... 详细信息
来源: 评论
Unconditionally secure multi-secret sharing scheme
Unconditionally secure multi-secret sharing scheme
收藏 引用
2012 IEEE International Conference on computer Science and Automation engineering, CSAE 2012
作者: Lin, Changlu Harn, Lein School of Mathematics and Computer Science Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China Department of Computer Science Electrical Engineering University of Missouri Kansas City MO 64110-2499 United States
In Shamir's (t, n) secret sharing (SS) scheme, a master secrets is divided into n shares by a dealer and is shared among n shareholders in such a way that any t or more than t shares can reconstruct this master se... 详细信息
来源: 评论
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
收藏 引用
Journal of Information security 2012年 第2期3卷 69-76页
作者: Yaser Jararweh Lo’ai Tawalbeh Hala Tawalbeh Abidalrahman Moh’d Computer Science Department Jordan University of Science and Technology(CHiS) Irbid Jordan Director of Cryptographic Hardware and Information Security Lab (CHiS) Computer Engineering DepartmentJordan University of Science and Technology Irbid Jordan Engineering Mathematics & Internetworking Dalhousie University Halifax Canada
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace S... 详细信息
来源: 评论
Related-key boomerang and rectangle attacks: Theory and experimental analysis
Related-key boomerang and rectangle attacks: Theory and expe...
收藏 引用
作者: Kim, Jongsung Hong, Seokhie Preneel, Bart Biham, Eli Dunkelman, Orr Keller, Nathan Division of E-Business Kyungnam University Kyungnam 630-701 Korea Republic of Center for Information Security and Technologies Korea University Seoul 136-701 Korea Republic of Department of Electrical Engineering Katholieke Universiteit Leuven B-3001 Leuven-Heverlee Belgium Department of Computer Science Technion Haifa 32000 Israel Department of Computer Science University of Haifa 31905 Haifa Israel Department of Mathematics Bar Ilan University Ramat-Gan 52900 Israel
In 2004, we introduced the related-key boomerang/rectangle attacks, which allow us to enjoy the benefits of the boomerang attack and the related-key technique, simultaneously. The new attacks were used since then to a... 详细信息
来源: 评论
Unconditionally secure multi-secret sharing scheme
Unconditionally secure multi-secret sharing scheme
收藏 引用
IEEE International Conference on computer Science and Automation engineering (CSAE)
作者: Changlu Lin Lein Harn School of Mathematics and Computer Science Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Computer Science Electrical Engineering University of Missouri Kansas City MO USA
In Shamir's (t, n) secret sharing (SS) scheme, a master secrets is divided into n shares by a dealer and is shared among n shareholders in such a way that any t or more than t shares can reconstruct this master se... 详细信息
来源: 评论