咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是431-440 订阅
排序:
Defending Against Attacks on Main Memory Persistence
Defending Against Attacks on Main Memory Persistence
收藏 引用
Annual computer security Applications Conference
作者: William Enck Kevin Butler Thomas Richardson Patrick McDaniel Adam Smith Systems and Internet Infrastructure Security (SIIS) Laboratory Department of Computer Science and Engineering Pennsylvania State University USA
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such as passwords and keys can be extracted.... 详细信息
来源: 评论
A Resource Utilization Framework Using Partial State Information on Grid
A Resource Utilization Framework Using Partial State Informa...
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Mohammad Mehedi Hassan Eui-Nam Huh Jai-Ho Oh Kyoung-Min Lee Ok-Hwan Byeon Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University Suwon South Korea Department of Environmental Atmospheric Sciences Pukyong National University South Korea KISTI Daejeon South Korea
Now-a-days, many high-end applications are turning to grid computing to meet their computational and data storage needs. High-end applications require a wide variety of computational resources as well as long time to ... 详细信息
来源: 评论
Untitled
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE computing 2008年 第1期5卷 4-5页
作者: Gligor, Virgil D. Formal Methods Section Center for High Assurance Computer Systems Naval Research Laboratory NRL Protocol Analyzer Internet Engineering Task Force IFIP Working Group 1.7 on Foundations of Security Analysis and Design University of Texas Austin United States Boston University IFIP WG 10.4 on Dependability Microsoft's Trustworthy Computing Academic Advisory Board
来源: 评论
Efficient certificate-based signcryption scheme from bilinear pairings
收藏 引用
International Journal of computers and Applications 2008年 第2期30卷 129-133页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryptio... 详细信息
来源: 评论
Editorial: Dependability and security
收藏 引用
IEEE Transactions on Dependable and Secure computing 2008年 第1期5卷 1-3页
作者: Iyer, Ravishankar K. Gligor, Virgil D. Kalbarczyk, Zbigniew T. Kanoun, Karama Katzenbeisser, Stefan Mukherjee, Shubu Shieh, Shiuhpyng Zorian, Yervant Department of Electrical and Computer Engineering Carnegie Mellon University Microsoft's Trusted Computing Academic Advisory Board Center for Reliable and High-Performance Computing Coordinated Science Laboratory University of Illinois Urbana-Champaign United States IEEE IEEE Computer Society LAAS CNRS IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance Special Interest Group on Dependability Benchmarking IFIP Working Group 10.4 French SEE Technical Committee on Trustworthy Computer Systems SEE Working Group Design and Validation for Dependability Technical University Munich Germany Darmstadt University of Technology ACM IACR Intel's SER Tech Council Intel's Architecture Patent Committee Taiwan Information Security Center NCTU IEEE Reliability Society Taipei and Tainan IACR United States Virage Logic Corp. AT and T Bell Laboratories Logic Vision Inc. University of British Columbia IEEE Test Technology Technical Council
来源: 评论
ID-based threshold proxy signcryption scheme from bilinear pairings
收藏 引用
International Journal of security and Networks 2008年 第3期3卷 206-215页
作者: Li, Fagen Xin, Xiangjun Hu, Yupu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 Sichuan China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 Henan China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 Shaanxi China
A (t, n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, a new identit... 详细信息
来源: 评论
Resource-aware video multicasting via access gateways in wireless mesh networks
Resource-aware video multicasting via access gateways in wir...
收藏 引用
International Conference on Network Protocols
作者: Wanqing Tu Cormac J. Sreenan Chun Tung Chou Archan Misra Sanjay Jha School of Computing and Communication Technology Glyndŵr University Wrexham UK The Mobile & Internet Systems Laboratory Department of Computer University College Cork Cork Ireland School of Computer Science and Engineering University of New South Wales Sydney Australia IBM Thomas J. Watson Research Center Hawthorne NY USA
This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of internet access gateways that allow a choice of alternative routes to avoid potentially lengthy multi... 详细信息
来源: 评论
Leveraging identity-based cryptography for node ID assignment in structured P2P systems
Leveraging identity-based cryptography for node ID assignmen...
收藏 引用
21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07
作者: Ryu, Sunam Butler, Kevin Traynor, Patrick McDaniel, Patrick Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University University Park PA 16802
Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes all... 详细信息
来源: 评论
Protecting users from "themselves"
Protecting users from "themselves"
收藏 引用
1st ACM computer security Architectures Workshop, CSAW'07, held in association with the 14th ACM computer and Communications security Conference, CCS'07
作者: Enck, William Rueda, Sandra Schiffman, Joshua Sreenivasan, Yogesh St. Clair, Luke Jaeger, Trent McDaniel, Patrick Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University University Park PA 16802 United States
computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each user has many devices with their own stor... 详细信息
来源: 评论
Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor Networks
Optimal Selection and Activation of Intrusion Detection Agen...
收藏 引用
International Conference on Future Generation Communication and Networking (FGCN)
作者: Tran Hoang Hai Eui Nam Huh Internet Computing and Security Laboratory Department of Computer Engineering Kyung Hee University South Korea
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection ag... 详细信息
来源: 评论