咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2601-2610 订阅
排序:
Analysis the properties of TLS based on temporal logic of knowledge
Analysis the properties of TLS based on temporal logic of kn...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Chao, Lv Hui, Li Jianfeng, Ma Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
Temporal logics of knowledge are useful for reasoning about situations where we require both dynamic aspects and informational aspects relating to knowledge. So, the application of temporal logics of knowledge is inve... 详细信息
来源: 评论
F-GSS: A novel FCSR-based keystream generator
F-GSS: A novel FCSR-based keystream generator
收藏 引用
1st International Conference on information Science and Engineering, ICISE2009
作者: Dong, Lihua Zeng, Yong Hu, Yupu Key Lab. Computer Networks and Information Security Ministry of Education Xidian University Xi'an ShaanXi Province China
A novel FCSR-based generalized self-shrinking stream sequence generator (called F-GSS) has been proposed. The F-GSS keystream generator has passed the NIST's statistical test suite, which shows that F-GSS has good... 详细信息
来源: 评论
A new abuse-free fair electronic payment protocol
A new abuse-free fair electronic payment protocol
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt... 详细信息
来源: 评论
security analysis of the kerberos protocol using BAN logic
Security analysis of the kerberos protocol using BAN logic
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Fan, Kai Li, Hui Wang, Yue Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
A novel key pre-distribution scheme using one-way hash chain and bivariate polynomial for wireless sensor networks
A novel key pre-distribution scheme using one-way hash chain...
收藏 引用
2009 3rd International Conference on Anti-counterfeiting, security, and Identification in Communication, ASID 2009
作者: Li, Xu Jinbo, Shen Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Computer Science Fujian Normal University Fuzhou China
security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric cryptographic protocols are not suitable for the ... 详细信息
来源: 评论
Threshold Quantum Secret Sharing of Secure Direct Communication
收藏 引用
Chinese Physics Letters 2009年 第1期26卷 21-24页
作者: 李宝奎 杨宇光 温巧燕 Department of Automatic Control School of Information Science and Technology Beijing Institute of Technology Beijing 100081 College of Computer Science and Technology Beijing University of Technology Beijing 100124 State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71... 详细信息
来源: 评论
Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of security Policies
收藏 引用
电子学报(英文版) 2009年 第3期18卷 519-524页
作者: ZHANG Zhiyong PEI Qingqi MA Jianfeng YANG Lin Ministry of Education Key Laboratory of Computer Network and InfoT~mation Security Xidian University Xi'an 710071 China Electronic and Information Engineering College Henan University of Science and Technology Luoyang 471003 China The Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing 100141 China
A successful transaction of digital contents is primarily dependent on security policies, trust mechanisms and benefits balances, as well as the simple adoption of the combination of enhanced security policies would n... 详细信息
来源: 评论
Democratic Group Signatures with Threshold Traceability
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2009年 第1期14卷 98-101页
作者: 李祥学 钱海峰 李建华 School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Lab of Information Security Graduate School of Chinese Academy of SciencesBeijing 100039China State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an 710071China Computer Science and Technology Department East China Normal UniversityShanghai 200241China
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a... 详细信息
来源: 评论
An efficient broadcast encryption scheme for wireless sensor network
An efficient broadcast encryption scheme for wireless sensor...
收藏 引用
5th International Conference on Wireless Communications, networking and Mobile Computing, WiCOM 2009
作者: Yanli, Chen Geng, Yang College of Computer Sciences and Technology Nanjing University of Posts and Telecommunications Nanjing China Key Lab of Network Security and Cryptology Fujian Normal University FuZhou China
It is a significant challenge to find out suitable cryptography for wireless sensor networks owing to limitations of power, computation capability and storage resources. Many schemes based on public or symmetric key c... 详细信息
来源: 评论
Approach to extracting hot topics based on network traffic content
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2009年 第1期4卷 20-23页
作者: Yadong ZHOU Xiaohong GUAN Qindong SUN Wei LI Jing TAO MOE Key Lab for Intelligent Networks and Network Security State Key Lab for Manufacturing SystemsXi’an Jiaotong UniversityXi’an 710049China Department of Automation Tsinghua National Lab for Information Science and TechnologyTsinghua UniversityBeijing 100084China School of Computer Science and Engineering Xi’an University of TechnologyXi’an 710048China
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correla... 详细信息
来源: 评论