咨询与建议

限定检索结果

文献类型

  • 176 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 184 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 电气工程
    • 32 篇 控制科学与工程
    • 23 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 12 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 119 篇 理学
    • 74 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 329 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
349 条 记 录,以下是81-90 订阅
排序:
Quality and Reliability Metrics for IoT Systems: A Consolidated View  6th
Quality and Reliability Metrics for IoT Systems: A Consolida...
收藏 引用
6th EAI International Conference on Science and Technologies for Smart Cities, SmartCity 2020
作者: Klima, Matej Rechtberger, Vaclav Bures, Miroslav Bellekens, Xavier Hindy, Hanan Ahmed, Bestoun S. Department of Computer Science FEE Czech Technical University in Prague Prague Czech Republic Department of Electronic and Electrical Engineering University of Strathclyde Glasgow United Kingdom Division of Cyber Security Abertay University Dundee United Kingdom Department of Mathematics and Computer Science Karlstad University Karlstad Sweden
Quality and reliability metrics play an important role in the evaluation of the state of a system during the development and testing phases, and serve as tools to optimize the testing process or to define the exit or ... 详细信息
来源: 评论
New efficient padding methods secure against padding oracle attacks  18th
New efficient padding methods secure against padding oracle ...
收藏 引用
18th International Conference on Information security and Cryptology, ICISC 2015
作者: Kang, HyungChul Park, Myungseo Moon, Dukjae Lee, Changhoon Kim, Jongsung Kim, Kimoon Kim, Juhyuk Hong, Seokhie Korea University Seoul Korea Republic of The Affiliated Insutitude of ETRI Seoul Korea Republic of Department of Computer Science and Engineering Seoul University of Science and Technology Seoul Korea Republic of Department of Mathematics Department of Financial Information Security Kookmin University Seoul Korea Republic of Korea Security and Internet Agency Seoul Korea Republic of
This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle’s characteristic of checking the pad... 详细信息
来源: 评论
Bilateral Contract for Load Frequency and Renewable Energy Sources Using Advanced Controller
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3165-3180页
作者: Krishan Arora Gyanendra Prasad Joshi Mahmoud Ragab Muhyaddin Rawa Ahmad H.Milyani Romany F.Mansour Eunmok Yang School of Electronics and Electrical Engineering Lovely Professional UniversityPhagwara144001PunjabIndia School of Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Centre for Artificial Intelligence in Precision Medicines King Abdulaziz UniversityJeddah21589Saudi Arabia Mathematics Department Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Center of Research Excellence in Renewable Energy and Power Systems King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Electrical and Computer Engineering Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia King Abdullah City for Atomic and Renewable Energy(K.A.CARE) RiyadhSaudi Arabia Department of Mathematics Faculty of ScienceNew Valley UniversityEl-Kharga72511Egypt Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoul02707Korea
Reestablishment in power system brings in significant transformation in the power sector by extinguishing the possession of sound consolidated ***,the collaboration of various manufacturing agencies,autonomous power m... 详细信息
来源: 评论
Improved impossible differential attacks on large-block Rijndael
Improved impossible differential attacks on large-block Rijn...
收藏 引用
15th International Conference on Information security and Cryptology, ICISC 2012
作者: Wang, Qingju Gu, Dawu Rijmen, Vincent Liu, Ya Chen, Jiazhe Bogdanov, Andrey Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China KU Leuven ESAT/COSIC iMinds Belgium Key Laboratory of Cryptologic Technology and Information Security School of Mathematics Shandong University Jinan 250100 China Technical University of Denmark Department of Mathematics Denmark
In this paper, we present more powerful 6-round impossible differentials for large-block Rijndael-224 and Rijndael-256 than the ones used by Zhang et al. in ISC 2008. Using those, we can improve the previous impossibl... 详细信息
来源: 评论
Efficient and secure conference-key distribution
收藏 引用
International Workshop on security Protocols, 1996
作者: Burmester, Mike Desmedt, Yvo G. Information Security Group Department of Mathematics University of London Royal Holloway Egham SurreyTW20 OEX United Kingdom Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee WI53201-0784 United States
Key distribution is a major cryptographic component for secure communication. For privacy data must be encrypted with keys which are distributed securely. In this paper we focus on conference key distribution. Our app... 详细信息
来源: 评论
Discovering High Utility Episodes in Sequences
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第3期4卷 473-486页
作者: Gan, Wensheng Lin, Jerry Chun-Wei Chao, Han-Chieh Yu, Philip S. Jinan University College of Cyber Security Guangzhou510632 China Pazhou Lab Guangzhou510330 China Western Norway University of Applied Sciences Department of Computing Mathematics and Physics Bergen5063 Norway National Dong Hwa University Department of Electrical Engineering Hualien974 Taiwan University of Illinois at Chicago Department of Computer Science ChicagoIL60607 United States
Sequence data are more commonly seen than other types of data (e.g., transaction data) in real-world applications. For the mining task from sequence data, several problems have been formulated, such as sequential patt... 详细信息
来源: 评论
Image Forgery Detection using Convolutional Neural Networks and Blockchain Technology  24
Image Forgery Detection using Convolutional Neural Networks ...
收藏 引用
2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024
作者: Khalaf, Luay Ibrahim Jumaili, Mustafa Lateef Fadhil Almashhadany, Mohammed Thakir Mahmood Aljanabi, Mohammed S. Hasan, Taif S. Algburi, Sameer Department of Computer Science College of Computer Science and Mathematics Tikrit University Iraq Computer Engineering Techniques Dept Al-Maarif University College Al Anbar Iraq Artificial Intelligence Engineering Department College of Engineering Al-Ayen University Thi-Qar Iraq Computer Science Department Bayan University Erbil Kurdistan Iraq Department of Computer Engineering Techniques Al Hikma University College Baghdad Iraq Department of Cyber Security and Cloud Computing Al-Ma'moon University College Al-Washash Baghdad Iraq Al-Kitab University Kirkuk36015 Iraq
In the era of digital media, the growth of picture forgeries poses a huge threat to content validity and reliability. Previous techniques for picture forgery detection have found constraints in accuracy and scalabilit... 详细信息
来源: 评论
Privacy engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices
收藏 引用
IEEE Transactions on Software engineering 2023年 第9期49卷 4324-4348页
作者: Iwaya, Leonardo Horn Babar, Muhammad Ali Rashid, Awais JoondalupWA6027 Australia Research Group Department of Mathematics and Computer Science Karlstad65188 Sweden The University of Adelaide Centre for Research on Engineering Software Technologies AdelaideSA5005 Australia University of Bristol Bristol Cyber Security Group REPHRAIN: National Research Centre on Privacy Harm Reduction and Adversarial Influence Online Department of Computer Science BristolBS8 1QU United Kingdom
Privacy engineering, as an emerging field of research and practice, comprises the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working syste... 详细信息
来源: 评论
Improved meet-in-the-middle attacks on reduced-round Piccolo
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 95-107页
作者: Ya LIU Liang CHENG Zhiqiang LIU Wei LI Qingju WANG Dawu GU Department of Computer Science and Engineering University of Shanghai for Science and Technology State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University School of Computer Science and Technology Donghua University Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Department of Applied Mathematics and Computer Science Technical University of Denmark
Piccolo is a lightweight block cipher that adopts a generalized Feistel network structure with4 branches, each of which is 16 bit long. The key length is 80 or 128 bit, denoted by Piccolo-80 and Piccolo-128, respectiv... 详细信息
来源: 评论
Strong security enabled certificateless aggregate signatures applicable to mobile computation
Strong security enabled certificateless aggregate signatures...
收藏 引用
3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011
作者: Hu, Xiong Wu, Qianhong Chen, Zhong Key Laboratory of Network and Software Security Assurance of the Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Ministry of Education China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Av. Països Catalans 26 E-43007 Tarragona Spain
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论