咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2561-2570 订阅
排序:
An efficient intruder deduction system with XOR
收藏 引用
Journal of Computational information Systems 2010年 第11期6卷 3535-3540页
作者: Yang, Yuanyuan Ma, Wenping Bai, Xiaofeng Liu, Weibo School of Telecommunications Engineering Xidian University Xi'an 710071 China Ministry of Education Key Lab. of Computer Networks and Information Security China
We propose a new intruder deduction system with XOR named IDX. By introducing the concept of abstract XOR term and its operation rules, IDX is able to eliminate complex equational reasoning of XOR. Moreover, it reduce... 详细信息
来源: 评论
TinyStream: A lightweight and novel stream cipher scheme for wireless sensor networks
TinyStream: A lightweight and novel stream cipher scheme for...
收藏 引用
International Conference on Computational Intelligence and security
作者: Chen, Tieming Ge, Liang Wang, Xiaohao Cai, Jiamei College of Computer Sci. and Tech. Zhejiang University of Technology Hangzhou 310023 China State Key Lab. of Software Development Environment Beihang University Beijing 100191 China Zhejiang Key Laboratory of Information Security Hangzhou 310012 China College of Computer Sci. and Tech. Zhejiang University of Technology Hangzhou 310012 China
Implementation performance and key randomness are two key issues for stream cipher systems. In this paper, a lightweight stream cipher with good randomness of key stream is firstly proposed. It utilizes a novel propos... 详细信息
来源: 评论
An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
收藏 引用
Journal of Convergence information Technology 2010年 第4期5卷
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange ... 详细信息
来源: 评论
A privacy-preserving mutual authentication protocol for vehicle Ad Hoc networks
收藏 引用
Journal of Convergence information Technology 2010年 第7期5卷 24-24页
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authent... 详细信息
来源: 评论
A watermark-aware trusted running environment for software clouds
A watermark-aware trusted running environment for software c...
收藏 引用
5th Annual ChinaGrid Conference, ChinaGrid 2010
作者: Fu, Junning Wang, Chaokun Yu, Zhiwei Wang, Jianmin Sun, Jia-Guang School of Software Tsinghua University Beijing 100084 China Tsinghua University Key Lab. for Information System Security School of Software TNLIST Beijing 100084 China Dept. of Computer Sci. and Tech. Tsinghua University Beijing 100084 China
A software cloud is ready-made for software delivery or Software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats... 详细信息
来源: 评论
Cloud storage as the infrastructure of Cloud Computing
Cloud storage as the infrastructure of Cloud Computing
收藏 引用
2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 2010
作者: Wu, Jiyi Ping, Lingdi Ge, Xiaoping Ya, Wang Fu, Jianqing School of Computer Science and Technology Zhejiang University Hangzhou China Alibaba Business College Key Lab. of E-Business and Information Security Hangzhou Normal University Hangzhou China Department of Electronics Information Hangzhou Academy of Scientific Professional Technology Hangzhou China Zhejiang Second Institute of Surveying and Mapping Hangzhou China
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrast... 详细信息
来源: 评论
An enhanced three-party authentication key exchange protocol for mobile commerce environments
收藏 引用
Journal of Communications 2010年 第5期5卷 436-443页
作者: Tan, Zuowen Department of Computer Science Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang City 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007Fujian Province China
Recently, Yang et al. proposed a three-party encrypted key exchange protocol (3PAKE) which is based on Elliptic curve cryptography. Their 3PAKE protocol is efficient because it requires less computation cost and less ... 详细信息
来源: 评论
Research on key technology in SaaS
Research on key technology in SaaS
收藏 引用
2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI 2010
作者: Ju, Jiehui Ya, Wang Fu, Jianqing Wu, Jiyi Lin, Zhijie School of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou China Zhejiang Second Institute of Surveying and Mapping Hangzhou China School of Computer Science and Technology Zhejiang University Hangzhou China Alibaba Business College Key Lab. of E-Business and Information Security Hangzhou Normal University Hangzhou China
Software as a Service (SaaS) is a newly emerging business model in the software industry. The growing speed of SaaS is fast. The article gives a quick survey on SaaS. It covers key technologies in SaaS, difference bet... 详细信息
来源: 评论
The Comparisons between Public key and Symmetric key Cryptography in Protecting Storage Systems
The Comparisons between Public key and Symmetric key Cryptog...
收藏 引用
The 2010 International Conference on computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Lanxiang Chen Shuming Zhou School of Mathematics and Computer Science Fujian Normal University Fuzhou 350108 China Key Lab of Network Security and Cryptology Fuzhou 350108 China
As public key cryptographic operations are computationally expensive;it motivates a careful examination of the reasons of its usage and looking for symmetric key alternatives. In this paper, we present comparisons bet... 详细信息
来源: 评论
Analysis and improvement of a user authentication improved protocol
收藏 引用
Journal of networks 2010年 第5期5卷 622-630页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang City 330013 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Remote user authentication always adopts the method of password to login the server within insecure network environments. Recently, Peyravin and Jeffries proposed a practical authentication scheme based on one-way col... 详细信息
来源: 评论