咨询与建议

限定检索结果

文献类型

  • 173 篇 期刊文献
  • 170 篇 会议
  • 7 册 图书

馆藏范围

  • 350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 233 篇 工学
    • 183 篇 计算机科学与技术...
    • 144 篇 软件工程
    • 58 篇 信息与通信工程
    • 37 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 122 篇 理学
    • 76 篇 数学
    • 28 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 9 篇 deep learning
  • 9 篇 security
  • 8 篇 data privacy
  • 8 篇 artificial intel...
  • 7 篇 blockchain
  • 7 篇 protocols
  • 7 篇 accuracy
  • 7 篇 privacy
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 college of cyber...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 kumari saru

语言

  • 322 篇 英文
  • 27 篇 其他
  • 3 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
350 条 记 录,以下是321-330 订阅
排序:
On an attack on RSA with small CRT-exponents
收藏 引用
Science China(Information Sciences) 2010年 第8期53卷 1511-1518页
作者: HAN LiDong 1,2 , WANG XiaoYun 3 & XU GuangWu 3,4 1 Key Laboratory of Cryptologic Technology and Information security, Ministry of Education, Shandong University, Jinan 250100, China 2 School of mathematics, Shandong University, Jinan 250100, China 3 Institute for Advanced Study, Tsinghua University, Beijing 100084, China 4 department of Electrical engineering and computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53201, USA 1. Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China2. School of Mathematics Shandong University Jinan 250100 China3. Institute for Advanced Study Tsinghua University Beijing 100084 China4. Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee Milwaukee WI 53201 USA
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac... 详细信息
来源: 评论
A new secret sharing scheme based on commutative encrypted function
A new secret sharing scheme based on commutative encrypted f...
收藏 引用
International Forum on Information Technology and Applications
作者: He, Jun Li, Ximei Li, Lijuan Tang, Chunming Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan 418000 China School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong 510006 China State Key Laboratory of Information Security Institute of Software Science CAS Beijing 100080 China
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ... 详细信息
来源: 评论
A new forward-secure proxy signature scheme
A new forward-secure proxy signature scheme
收藏 引用
2010 International Forum on Information Technology and Applications, IFITA 2010
作者: He, Jun Li, Ximei Li, Lijuan Tang, Chunming Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan 418000 China School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong 510006 China State Key Laboratory of Information Security Institute of Software Science CAS Beijing 100080 China
Based on the shortcomings of WCF scheme, this paper proposed an improved forward-secure proxy signature scheme. The new scheme does not evolve the authorized keys, but the proxy signer's private key, making it hav... 详细信息
来源: 评论
Authenticated Asymmetric Group Key Agreement Protocol and Its Application
Authenticated Asymmetric Group Key Agreement Protocol and It...
收藏 引用
IEEE International Conference on Communications
作者: Lei Zhang Qianhong Wu Bo Qin Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education Wuhan University of China China School of Science Department of Maths Xi''an University of Technology China
A recent primitive known as asymmetric group key agreement allows a group of users to negotiate a common encryption key which is accessible to any entities while each user holds her respective secret decryption key. T... 详细信息
来源: 评论
Hierarchical Certificateless Signatures
Hierarchical Certificateless Signatures
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: Lei Zhang Qianhong Wu Josep Domingo-Ferrer Bo Qin UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Wuhan University of Technology China School of Science Department of Maths Xi'an University of Technology China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
A novel clustering topology control for reliable multi-hop routing in wireless sensor networks
收藏 引用
Journal of Communications 2010年 第9期5卷 654-664页
作者: Du, Ruiying Ai, Chunyu Guo, Longjiang Chen, Jing Liu, Jianwei He, Jing Li, Yingshu School of Computer science Wuhan University Wuhan China State Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China Department of Mathematics Physics Computer Science and Geomatics Troy University Troy AL 36082 United States Department of Computer Science Heilongjiang University Harbin China Department of Computer Science Georgia State University Atlanta GA 30303 United States School of Electronics Information Engineering Beihang University Beijing China
The reliability of wireless sensor networks is significant in certain applications, especially the reliable routing. Most existing routing protocols use multi-paths to improve routing reliability. However, multi-paths... 详细信息
来源: 评论
A New Forward-Secure Proxy Signature Scheme
A New Forward-Secure Proxy Signature Scheme
收藏 引用
International Forum on Information Technology and Applications, IFITA
作者: Jun He Ximei Li Lijuan Li Chunming Tang Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan China School of Computer and Communication Hunan University Changsha Hunan China State Key Laboratory of Information Security CAS State Key Laboratory of Information Security Hunan China CAS Institute of Software Science Beijing China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong China
Based on the shortcomings of WCF scheme, this paper proposed an improved forward-secure proxy signature scheme. The new scheme does not evolve the authorized keys, but the proxy signer's private key, making it hav... 详细信息
来源: 评论
Protection of an intrusion detection engine with watermarking in Ad hoc networks
收藏 引用
International Journal of Network security 2010年 第2期10卷 93-106页
作者: Mitrokotsa, Aikaterini Komninos, Nikos Douligeris, Christos Information and Communication Theory Group Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Mekelweg 4 2628 CD Delft Netherlands Algorithms and Security Group Athens Information Technology GR-19002 Peania Greece Department of Informatics University of Piraeus GR-18534 Piraeus Greece
In this paper we present an intrusion detection engine comprised of two main elements;firstly, a neural network for the actual detection task and secondly watermarking techniques for protecting the related information... 详细信息
来源: 评论
A New Secret Sharing Scheme Based on Commutative Encrypted Function
A New Secret Sharing Scheme Based on Commutative Encrypted F...
收藏 引用
International Forum on Information Technology and Applications, IFITA
作者: Jun He Ximei Li Lijuan Li Chunming Tang Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan China School of Computer and Communication Hunan University Changsha Hunan China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong China State Key Laboratory of Information Security Institute of Software Science Chinese Academy and Sciences Beijing China
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ... 详细信息
来源: 评论
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack
A generic weakness of the k-normal Boolean functions exposed...
收藏 引用
International Symposium on Information Theory and Its Applications, ISITA
作者: Miodrag Mihaljević Sugata Gangopadhyay Goutam Paul Hideki Imai Mathematical Institute Serbian Academy of Arts and Sciences Belgrade Serbia Serbian Academy of Sciences and Arts Mathematical Institute Belgrade Serbia Research Center for Information Security (RCIS) Nat. Inst. Adv. Ind. Sci.&Tech. (AIST) Tokyo Japan Department of Mathematics Indian Institute of Technology Roorkee India Department of Computer Science and Engineering Jadavpur University Kolkata India Faculty of Sciences and Engineering Chuo University Tokyo Japan RCIS-AIST Tokyo Japan
A Boolean function is k-normal if it is constant on a k-dimensional flat of its domain. This paper demonstrates that k-normality of a Boolean function can be exploited to mount a dedicated algebraic attack on a stream... 详细信息
来源: 评论