咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 5 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 2 篇 电气工程
    • 2 篇 生物工程
    • 1 篇 航空宇航科学与技...
  • 3 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 1 篇 法学
    • 1 篇 法学

主题

  • 3 篇 open source soft...
  • 2 篇 authentication
  • 2 篇 protocols
  • 1 篇 computer science
  • 1 篇 surveys
  • 1 篇 parallel process...
  • 1 篇 deep learning
  • 1 篇 supercomputers
  • 1 篇 software enginee...
  • 1 篇 efficiency
  • 1 篇 grid computing
  • 1 篇 resource managem...
  • 1 篇 laboratories
  • 1 篇 processor schedu...
  • 1 篇 costs
  • 1 篇 bioinformatics
  • 1 篇 information secu...
  • 1 篇 security
  • 1 篇 detectors
  • 1 篇 polynomials

机构

  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 2 篇 jin yinhu labora...
  • 2 篇 national enginee...
  • 1 篇 key laboratory o...
  • 1 篇 systems research...
  • 1 篇 university of co...
  • 1 篇 shenzhen institu...
  • 1 篇 national enginee...
  • 1 篇 guangxi key labo...
  • 1 篇 school of electr...
  • 1 篇 key laboratory o...
  • 1 篇 key laboratory o...
  • 1 篇 institute of net...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 shanghai technol...
  • 1 篇 school of cyber ...
  • 1 篇 state key labora...

作者

  • 2 篇 zhang chao
  • 2 篇 li zhen
  • 2 篇 xu shouhuai
  • 2 篇 zou deqing
  • 2 篇 li yating
  • 2 篇 zhang ruqian
  • 2 篇 jin hai
  • 2 篇 wang ning
  • 1 篇 guo yangyang
  • 1 篇 liu anfeng
  • 1 篇 min luo
  • 1 篇 liu yang
  • 1 篇 ning wang
  • 1 篇 cong peng
  • 1 篇 ruqian zhang
  • 1 篇 xing lining
  • 1 篇 pedrycz witold
  • 1 篇 wang xiuqun
  • 1 篇 lianhai wang
  • 1 篇 huang lican

语言

  • 8 篇 英文
  • 1 篇 其他
检索条件"机构=Institute of Network Computing and Distributed System"
9 条 记 录,以下是1-10 订阅
排序:
k-TEVS: A k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2326-2337页
作者: Liu, Yang He, Debiao Luo, Min Wang, Lianhai Peng, Cong Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shenzhen Institute of Information Technology Institute of Information Technology Shenzhen518172 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Matrix Elements Technologies Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Shanghai200232 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Thee-vote is regarded as a waytoexpress the opinion that the voters ask for. Actually, the e-vote could be applied wildly likequestionnaire,***,thecoexistences of efficiency and security as well as transparency and pr... 详细信息
来源: 评论
Threshold signature scheme based on non-interactive Diffie-Hellman signature
Threshold signature scheme based on non-interactive Diffie-H...
收藏 引用
1st International Conference on networking and distributed computing, ICNDC 2010
作者: Wang, Xiuqun Huang, Lican Key Laboratory for Information System Security Ministry of Education Tsinghua University and Beijing Certification Authority Beijing China Institute of Network and Distributed Computing Zhejiang Sci-Tech University Hangzhou China
We present a threshold signature based on non-interactive Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resiliencen ≥ 3t + 1, where n is the nu... 详细信息
来源: 评论
A Lightweight execution framework for massive independent tasks
A Lightweight execution framework for massive independent ta...
收藏 引用
2008 Workshop on Many-Task computing on Grids and Supercomputers, MTAGS 2008
作者: Hui, Li Huashan, Yu Xiaoming, Li Shenzhen Graduate School of Peking University Shenzhen Guangdong 518055 P.R. China Institute of Network Computing and Distributed System Peking University Beijing 100871 P.R. China State Key Laboratory of Advanced Optical Communication and Network Peking University Beijing 100871 P.R. China
This paper presents a lightweight framework for executing many independent tasks efficiently on grids of heterogeneous computational nodes. It dynamically groups tasks of different granularities and dispatches the gro... 详细信息
来源: 评论
Threshold Signature Scheme Based on Non-internative Diffie-Hellman Signature
Threshold Signature Scheme Based on Non-internative Diffie-H...
收藏 引用
International Conference on networking and distributed computing (ICNDC)
作者: Xiuqun Wang Lican Huang Key Laboratory of Information System Security Ministry of Education Tsinghua University Beijing China Institute of Network and Distributed Computing Zhejiang Science and Technology University Hangzhou China
We present a threshold signature based on non-internative Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resilience n ≥ = 3t + 1, where n is the... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A Distance Similarity-based Genetic Optimization Algorithm for Satellite Ground network Planning Considering Feeding Mode
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Yingying Li, Qiuli Guo, Yangyang Pedrycz, Witold Xing, Lining Liu, Anfeng Song, Yanjie School of Computer Electronics and Information Guangxi University Nanning China Guangxi Key Laboratory of Multimedia Communications and Network Technology China Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University China School of Systems Science Beijing Jiaotong University Beijing China Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Poland Faculty of Engineering and Natural Sciences Department of Computer Engineering Sariyer Istanbul Turkey School of Electronic Engineering Xidian University Xian China School of Electronic Engineering Central South University Changsha China National Engineering Research Center of Maritime Navigation System Dalian Maritime University Dalian China
With the rapid development of the satellite industry, the information transmission network based on communication satellites has gradually become a major and important part of the future satellite ground integration n... 详细信息
来源: 评论