咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2591-2600 订阅
排序:
A fast correlation attack via parallel computing
A fast correlation attack via parallel computing
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Liu, Qiong Hu, Yupu Key Laboratory of Computer Network and Information Security Xidian University Xi'an China
For stream ciphers which use binary linear feedback shift registers as stream generators, fast correlation attack is one of the most important attacks. Aiming at the shortcomings of serial algorithm, the proposed tech... 详细信息
来源: 评论
An efficient fast authentication protocol
An efficient fast authentication protocol
收藏 引用
2009 International Conference on Computational Intelligence and security, CIS 2009
作者: Zhu, Hui Li, Hui Wany, Yu-Min Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an China
Based on symmetrical encryption and signature, an efficient authentication key agreement protocol was proposed in this paper. The security analysis of the proposed protocol in the implementation plan with the Canetti-... 详细信息
来源: 评论
Further Observations on Certificateless Public key Encryption
收藏 引用
4th International Conference on information security and Cryptology (Inscript 2008)
作者: Wang, Xu an Huang, Xinyi Yang, Xiaoyuan Key Laboratory of Information and Network Security Engneering College of Chinese Armed Police Force China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia
Certificateless public key encryption can be classified into two types, namely, CLE and CLE dagger, both of which were introduced by Al-Riyami and Paterson in Asiacrypt 2003. Most works about certificateless public ke... 详细信息
来源: 评论
The short share secret sharing agreement with Matrix factorization
The short share secret sharing agreement with Matrix factori...
收藏 引用
2009 International Conference on information Engineering and computer Science, ICIECS 2009
作者: Yang, XiaoYuan Liu, Zhen Key Laboratory of Computer Network and Information Security of Engineering Institute of the Armed Police Xi'an ShanXi China
To make up the limitation of traditional secret sharing schemes that the length of secret can not be extremely great, we use the theory of Jordan matrix factorization and combine with the formulary of Lagrange putting... 详细信息
来源: 评论
The security Matrix factorization agreement with two parties
The security Matrix factorization agreement with two parties
收藏 引用
2009 International Conference on Computational Intelligence and security, CIS 2009
作者: Yang, XiaoYuan Liu, Zhen Key Laboratory of Computer Network and Information Security of Engineering Institute of the Armed Police Xi'an ShanXi China
In the confidential computing issues of scientific computing, the confidential computing of matrix factorization is still no fruit home and abroad. This paper using Data perturbation assumption and Oblivious Transfer ... 详细信息
来源: 评论
Some notes on password authenticated key exchange based on RSA
Some notes on password authenticated key exchange based on R...
收藏 引用
2009 International Conference on Computational Intelligence and security, CIS 2009
作者: Tan, Shichong Zhu, Hui Wang, Yumin Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Password authenticated key exchange protocols allow two entities who only share a humanmemorable password to authenticate each other and agree on a session key between themselves. This paper surveys the state of resea... 详细信息
来源: 评论
On cross-correlation properties of Boolean functions
On cross-correlation properties of Boolean functions
收藏 引用
2009 4th International Conference on Communications and networking in China, CHINACOM 2009
作者: Zhou, Yu Xie, Min Xiao, Guozhen State Key Lab. Integrated Service Network Xidian University Shannxi Xi'an 710071 China Key Laboratory Computer Network and Information Security Xidian University Shannxi Xi'an 710071 China
To measure the correlation between two arbitrary Boolean functions, we propose the two new criteria called the sum-of-squares indicator and the absolute indicator of the cross-correlation. The two indicators generaliz... 详细信息
来源: 评论
A Fair and Efficient Protocol for the Millionaires' Problem
收藏 引用
电子学报(英文版) 2009年 第2期18卷 249-254页
作者: LI Ronghua WU Chuankun ZHANG Yuqing Graduate University of Chinese Academy of Sciences ( GUCAS) Beijing 100039 China National Computer Network Intrusion Protection Center GUCAS Beijing 100039 China State Key Laboratory of Information Security Institute of Software Beijing 100039 China
In the semi-honest model, Lin and Tzeng proposed an efficient solution to the millionaires' problem based on homomorphic encryption. They reduced the problem to the set intersection problem by encoding the private... 详细信息
来源: 评论
An efficient anonymous routing protocol for mobile ad hoc networks
An efficient anonymous routing protocol for mobile ad hoc ne...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Li, Xiaoqing Li, Hui Ma, Jianfeng Zhang, Weidong Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malic... 详细信息
来源: 评论
An effective scheme for defending denial-of-sleep attack in wireless sensor networks
An effective scheme for defending denial-of-sleep attack in ...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Chen, Chen Hui, Li Pei, Qingqi Ning, Lv Qingquan, Peng Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Based on the analysis to the phenomenon and methods of denial-of-sleep attacking in wireless sensor network, a scheme is proposed employing fake schedule switch with RSSI measurement aid. The sensor nodes can reduce a... 详细信息
来源: 评论