咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 247 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 63 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 440 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
471 条 记 录,以下是381-390 订阅
排序:
A study of android application security  20
A study of android application security
收藏 引用
20th USENIX security Symposium
作者: Enck, William Octeau, Damien McDaniel, Patrick Chaudhuri, Swarat Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University United States
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartpho... 详细信息
来源: 评论
Provably Secure Role-Based Encryption with Revocation Mechanism
收藏 引用
Journal of computer Science & Technology 2011年 第4期26卷 697-710页
作者: 朱岩 胡宏新 Gail-Joon Ahn 王怀习 王善标 Institute of Computer Science and Technology Peking University Beijing Key Laboratory of Internet Security Technology Peking University School of Computing Informatics and Decision Systems EngineeringArizona State University School of Mathematical Sciences Peking University
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ... 详细信息
来源: 评论
An Efficient Key Management for Secure Multicast in Sensor-Cloud
An Efficient Key Management for Secure Multicast in Sensor-C...
收藏 引用
ACIS/JNU International Conference on computers, Networks, Systems and Industrial engineering (CNSI)
作者: Tien-Dung Nguyen Eui-Nam Huh Department of Computer Engineering Internet Computing and Security Laboratory Suwon South Korea
Nowadays, in Publish/Subscribe system, the number of subscriptions from customers can be large, the events happening in such a system are more frequent and the notification load is heavy. Combining with cloud computin... 详细信息
来源: 评论
Efficient data transmission scheme for ubiquitous healthcare using wireless body area networks
Efficient data transmission scheme for ubiquitous healthcare...
收藏 引用
2nd International Conference on Software engineering and computer Systems, ICSECS 2011
作者: Kateretse, Cecile Huh, Eui-Nam Internet Computing and Security Lab. Department of Computer Engineering Kyung Hee University Seochon-dong Giheung-gu Yongin-si Gyeonggi-do 446-701 Korea Republic of
Data generated by wireless body area network (WBAN), are heterogeneous as they have different characteristics in terms of priority, transmission rate, required bandwidth, tolerable packet loss, delay demands etc;thus ... 详细信息
来源: 评论
Towards the Development of Personal Cloud computing for Mobile Thin-Clients
Towards the Development of Personal Cloud Computing for Mobi...
收藏 引用
International Conference on Information Science and Applications (ICISA)
作者: Yuan Tian Biao Song Eui-Nam Huh Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University South Korea
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shi... 详细信息
来源: 评论
An IPTV service delivery model using novel virtual network topology  11
An IPTV service delivery model using novel virtual network t...
收藏 引用
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
作者: Song, Biao Hassan, Mohammad Mehedi Huh, Eui Nam Internet Computing and Network Security Lab. Department of Computer Engineering Kyung Hee University 1 Seocheon-dong Giheung-gu Yongin-si Gyeonggi-do 446-701 Korea Republic of
Network Virtualization, as an irresistible trend for building future internet, create a virtual topology on the top of the current network architecture and provide end-to-end quality of service guarantees. By utilizin... 详细信息
来源: 评论
Cost analysis on IPTV hosting service for 3rd party providers  11
Cost analysis on IPTV hosting service for 3rd party provider...
收藏 引用
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
作者: Aldana Diaz, Maria Elizabeth Huh, Eui Nam Department of Computer Engineering Internet Computing and Network Security Lab. Kyung Hee University 1 Seocheon-dong Giheung-gu Yongin-si Gyeonggi-do 446-701 Korea Republic of
3rd party content service expands the variety of contents that IPTV usually distributes and opens the opportunity to create new and attractive content to anyone. However, the hosting service for 3rd party content dema... 详细信息
来源: 评论
Buffer and switch: An efficient road-to-road routing scheme for VANETs
Buffer and switch: An efficient road-to-road routing scheme ...
收藏 引用
2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011
作者: Song, Chao Liu, Ming Wen, Yonggang Cao, Jiannong Chen, Guihai School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Engineering Nanyang Technological University Singapore Singapore Internet and Mobile Computing Laboratory Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong School of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
Vehicular Ad Hoc Networks (VANETs) are getting increasing attention from academic researchers and automotive industries. Timely and cost-efficient multi-hop data delivery among vehicles is essential for VANETs, and va... 详细信息
来源: 评论
A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution
A Rose by Any Other Name or an Insane Root? Adventures in Na...
收藏 引用
European Conference on computer Network Defense, EC2ND
作者: Hayawardh Vijayakumar Joshua Schiffman Trent Jaeger Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University USA
Namespaces are fundamental to computing systems. Each namespace maps the names that clients use to retrieve resources to the actual resources themselves. However, the indirection that namespaces provide introduces ave... 详细信息
来源: 评论
Strong security enabled certificateless aggregate signatures applicable to mobile computation
Strong security enabled certificateless aggregate signatures...
收藏 引用
3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011
作者: Hu, Xiong Wu, Qianhong Chen, Zhong Key Laboratory of Network and Software Security Assurance of the Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Ministry of Education China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Av. Països Catalans 26 E-43007 Tarragona Spain
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论