咨询与建议

限定检索结果

文献类型

  • 173 篇 期刊文献
  • 170 篇 会议
  • 7 册 图书

馆藏范围

  • 350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 233 篇 工学
    • 183 篇 计算机科学与技术...
    • 144 篇 软件工程
    • 58 篇 信息与通信工程
    • 37 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 122 篇 理学
    • 76 篇 数学
    • 28 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 9 篇 deep learning
  • 9 篇 security
  • 8 篇 data privacy
  • 8 篇 artificial intel...
  • 7 篇 blockchain
  • 7 篇 protocols
  • 7 篇 accuracy
  • 7 篇 privacy
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 college of cyber...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 kumari saru

语言

  • 322 篇 英文
  • 27 篇 其他
  • 3 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
350 条 记 录,以下是331-340 订阅
排序:
Certificateless partially blind signatures
Certificateless partially blind signatures
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Zhang, Lei Zhang, Futai School of Computer Science and Technology Nanjing Normal University China Department of Computer Engineering and Mathematics Universitat Rovira I Virgili E-43007 Tarragona Catalonia Spain Jiangsu Engineering Research Center on Information Security and Privacy Protection Technology Nanjing China
Partially blind signature is a variant of blind signature. It allows a signer to explicitly include common information in a blind signature under some agreement with a receiver. It provides anonymity of users in appli... 详细信息
来源: 评论
The role of semantics in games and simulations
收藏 引用
computers in Entertainment 2008年 第4期6卷 57-57页
作者: Tutenel, Tim Bidarra, Rafael Smelik, Ruben M. De Kraker, Klaas Jan D. Delft University of Technology Netherlands TNO Defense Safety and Security Netherlands Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Netherlands Modeling and Simulation Department TNO Defense Safety and Security Netherlands
Powerful graphics hardware is enabling strong improvements in both the appearance and the complexity of virtual worlds for games and simulations. However, current practices in the design and development of virtual wor... 详细信息
来源: 评论
security Analysis of CIKS-128 and CIKS-128H Using Key Schedule Weaknesses
Security Analysis of CIKS-128 and CIKS-128H Using Key Schedu...
收藏 引用
International Symposium on computer Science and its Applications, CSA
作者: Changhoon Lee Jongsung Kim Seokhie Hong Sangjin Lee Jaechul Sung Hwa-Min Lee Center for Information Security Technologies Korea University Seoul South Korea Department of Mathematics University of Seoul Seoul South Korea Department of Computer and Engineering Soonchunhyang University Asan Chungnam South Korea
In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabiliti... 详细信息
来源: 评论
A "medium-field" multivariate public-key encryption scheme
A "medium-field" multivariate public-key encryption scheme
收藏 引用
Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
作者: Wang, Lih-Chung Yang, Bo-Yin Hu, Yuh-Hua Lai, Feipei Department of Applied Mathematics National Donghua University Hualien Taiwan Department of Mathematics Tamkang University Tamsui Taiwan Taiwan Information Security Center Taipei Taiwan Department of Computer Science and Engineering National Taiwan University Taipei Taiwan
Electronic commerce fundamentally requires two different public-key cryptographical primitives, for key agreement and authentication. We present the new encryption scheme MFE, and provide a performance and security re... 详细信息
来源: 评论
3D CAD Drawing Watermarking Based on Three Components
3D CAD Drawing Watermarking Based on Three Components
收藏 引用
IEEE International Conference on Image Processing
作者: Ki-ryong Kwon Hey-jung Chang Gwang S. Jung Kwang-seok Moon Suk-hwan Lee Divisiorn of Electronic Computer and Telecommuication Engineering Pukyong National University South Korea Department of Mathematics and Computer Science CUNY USA Department of Information Security Tongmyong University South Korea
This paper proposed a watermarking for copyright protection of 3D CAD design drawing based on 3 basic components that are Line, ARC, and 3DFACE. The watermark is embedded into the length in Line, the radius of curvatu... 详细信息
来源: 评论
Image authentication based on modular embedding
Image authentication based on modular embedding
收藏 引用
作者: Lee, Moon Ho Korzhik, Valery Morales-Luna, Guillermo Lusse, Sergei Kurbatov, Evgeny Department of Information and Communication Chonbuk National University Korea Republic of State University of Telecommunications St. Petersburg Russia Computer Science CINVESTAV-IPN Mexico City Mexico Departments of Information and Communication Korea Republic of Chonbuk National University Korea Republic of National Academy of Engineering Korea Republic of Mathematics Institute Polish Academy of Sciences Poland Department of Information Security St. Petersburg State Telecomunication University Russia Siemens Company Department of Information Security
We consider a watermark application to assist in the integrity maintenance and verification of the associated images. There is a great benefit in using WM in the context of authentication since it does not require any... 详细信息
来源: 评论
Multi-template ASM method for feature points detection of facial image with diverse expressions
Multi-template ASM method for feature points detection of fa...
收藏 引用
FGR 2006: 7th International Conference on Automatic Face and Gesture Recognition
作者: Li, Ying Lai, J.H. Yuen, Pong C. Department of Mathematics SUN YAT-SEN University China School of Informatics Guangdong University of Foreign Studies China Department of Electronics and Communication Engineering School of Information Science and Technology SUN YAT-SEN University China Guangdong Province Key Laboratory of Information Security China Department of Computer Science Hong Kong Baptist University Hong Kong Hong Kong
This paper proposed a multi-template ASM algorithm addressing facial feature points detection under nonlinear shape variation of facial images with various kinds of expression. By adding texture information, adopting ... 详细信息
来源: 评论
Analysis of resonant behavior in planar line arrays of rings by the eigencurrent approach
Analysis of resonant behavior in planar line arrays of rings...
收藏 引用
European Conference on Microwave
作者: D.J. Bekers S.J.L. van Eijndhoven A.A.F. van de Ven P.-P. Borsboom A.G. Tijhuis TNO Defence security and safety Observation Systems The Hague Netherlands Department of Mathematics and Computer Science Technische Universiteit Eindhoven Eindhoven Netherlands SARA Computing and Networking Services Amsterdam Netherlands Department of Electrical Engineering Technische Universiteit Eindhoven Eindhoven Netherlands
Resonant behavior in a finite array that appears as (modulated) impedance or current-amplitude oscillations may limit its bandwidth substantially. Therefore, simulations should predict such behavior. Recently, a new a... 详细信息
来源: 评论
Electronic national lotteries
收藏 引用
8th International Conference on Financial Cryptography, FC 2004
作者: Konstantinou, Elisavet Liagkou, Vasiliki Spirakis, Paul Stamatiou, Yannis C. Yung, Moti Research and Academic Computer Technology Institute P.O. Box 1122 Patras26110 Greece Department of Computer Engineering and Informatics University of Patras Patras26500 Greece Department of Mathematics University of the Aegean Karlovassi Samos83200 Greece on Communications and Information Systems Security University of the Aegean and Athens University of Economics and Business Greece Computer Science Columbia University New YorkNY United States
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost effective alternative to mechanical ones... 详细信息
来源: 评论
Efficient and secure conference-key distribution
收藏 引用
International Workshop on security Protocols, 1996
作者: Burmester, Mike Desmedt, Yvo G. Information Security Group Department of Mathematics University of London Royal Holloway Egham SurreyTW20 OEX United Kingdom Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee WI53201-0784 United States
Key distribution is a major cryptographic component for secure communication. For privacy data must be encrypted with keys which are distributed securely. In this paper we focus on conference key distribution. Our app... 详细信息
来源: 评论