咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2681-2690 订阅
排序:
Storage requirements for key distribution in sensor networks
Storage requirements for key distribution in sensor networks
收藏 引用
2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008
作者: Liu, Zhihong Jianfeng, Ma Huang, Qiping Moon, SangJae Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University Korea Republic of
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
Universal provable security authentication protocol for multi-domain
收藏 引用
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and information Science of Wuhan University 2008年 第10期33卷 1051-1054页
作者: Zhu, Hui Li, Hui Yang, Jiaxi Wang, Yumin Key Laboratory of Computer Network and Information Security Xidian University 2 South Taibai Road Xi'an 710071 China
The problems of existing authentication frameworks are analyzed, and a universal authentication protocol is proposed for the multi-domain. Moreover, entity authentication for cross-domain is supported in the protocol.... 详细信息
来源: 评论
A Semi-fragile watermarking tolerant of laplacian sharpening
A Semi-fragile watermarking tolerant of laplacian sharpening
收藏 引用
International Conference on computer Science and Software Engineering, CSSE 2008
作者: Jun, Xiao Ying, Wang College of Computer and Communication Engineering Graduated university of the Chinese Academy of Sciences Beijing China Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou China
Semi-fragile watermarking technique which aims to discriminate malicious manipulations from admissible manipulations, is drawing many attentions in image authentication. In this paper, a novel semi-fragile image water... 详细信息
来源: 评论
Identity (ID)-based threshold multi-secret sharing scheme
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2008年 第10期19卷 2739-2745页
作者: Pang, Liao-Jun Pei, Qing-Qi Jiao, Li-Cheng Wang, Yu-Min Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China Institute of Intelligent Information Processing Xidian University Xi'an 710071 China
In order to avoid the flaw of the secret shadow distribution method in the existing secret sharing schemes, a secret shadow distribution method is proposed with the ID-based public key technology integrated, which use... 详细信息
来源: 评论
A pairwise key establishment scheme for heterogeneous sensor networks
A pairwise key establishment scheme for heterogeneous sensor...
收藏 引用
9th ACM International Symposium on Mobile Ad Hoc networking and Computing, MobiHoc'08 - 1st ACM International Workshop on Heterogeneous Sensor and Actor networks, HeterSanet 2008
作者: Liu, Zhihong Ma, Jianfeng Huang, Qiping Moon, SangJae Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Korea Republic of
Motivated by a key agreement scheme proposed by Leighton and Micali (LM-KDS), we present a key establishment mechanism for heterogeneous sensor networks which combines random key pre-distribution schemes and LM-KDS. U... 详细信息
来源: 评论
ASG: Automated signature generation for worm-like P2P traffic patterns
ASG: Automated signature generation for worm-like P2P traffi...
收藏 引用
9th International Conference on Web-Age information Management, WAIM 2008
作者: Xiao, Fengtao Hu, Huaping Chen, Xin Liu, Bo School of Computer Science National University of Defence Technology Changsha 410073 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350003 China
Many P2P software have the similar communication patterns with computer worms, thus they will bring in false positives for behaviour based worm detection. Up to now, little work is done on the research of the similari... 详细信息
来源: 评论
Autonomous distributed trust mode
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2008年 第3期35卷 469-473页
作者: Zhan, Yang Pang, Liao-Jun Zhu, Xiao-Yan Wang, Yu-Min Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China State Key Lab. of Integrated Service Networks Xidian Univ. Xi'an 710071 China
To estimate the trust value in P2P networks, an autonomous trust mode based on both direct experiences and recommendations is proposed, in which the recommendation synthetic coefficients are decided by the trustor'... 详细信息
来源: 评论
Adaptive algorithms to mitigate inefficiency in reliability differentiation mechanisms for wireless sensor networks
Adaptive algorithms to mitigate inefficiency in reliability ...
收藏 引用
4th International Conference on Mobile Ad-hoc and Sensor networks, MSN 2008
作者: Zeng, Yong Ma, Jianfeng Dong, Lihua Pang, Liaojun Guo, Yuanbo Key Lab. of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China College of Computer Technology and Automation Tianjin Polytechnic University Tianjin 300160 China
This short paper presents practical algorithms for mitigating inefficiency in reliability differentiation service based on geographical stateless routing, which has great potential applications in large scale wireless... 详细信息
来源: 评论
key Management Scheme Based on(t,n) Threshold Cryptosystem
Key Management Scheme Based on(t,n) Threshold Cryptosystem
收藏 引用
2008 3rd International Conference on Intelligent System and Knowledge Engineering(第三届智能系统与知识工程国际会议)(ISKE 2008)
作者: Xuanwu Zhou Ping Wei Key Lab of Network & Information Security of the APF Engineering College of the APFXi'an 710086Chi Key Lab of Network & Information Security of the APF Engineering College of the APFXi'an 710086Chi
This paper analyzed the security threats and systemflaws of present key management ***(t,n)threshold cryptography and key management,wepresent a threshold key management scheme based onECC( Elliptic Curve Cryptosystem... 详细信息
来源: 评论
可信网络连接研究
可信网络连接研究
收藏 引用
第一届中国可信计算理论与实践学术会议
作者: Zhang-Huanguo 张焕国 Chen-Lu 陈璐 Zhang-Liqiang 张立强 空天信息安全与可信计算教育部重点实验室 Computer School of Wuhan UniversityKey Lab of Aerospace Information Security and Trusted ComputingState Key Lab of Software Engineering 武汉大学 计算机学院 武汉大学软件工程重点实验室
本文详细地介绍了可信网络连接的发展历程、体系结构、消息流程、相关规范,对TCG的可信网络连接架构的优点与局限性进行了分析。针对如何将可信计算机制拓展到网络,使得网络成为可信的计算环境这一问题进行了分析论述,并对可信网络... 详细信息
来源: 评论