咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2691-2700 订阅
排序:
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of computer Science and Technology,Beijing University of Technology,Beijing 100124,China 2 State key laboratory of networking and Switching Technology,Beijing University of Posts and Tele-communications,Beijing 100876,China 3 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,China 4 State key laboratory of information security(Graduate University of Chinese Academy of Sciences) ,Beijing 100049,China 1. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China 3. State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China 4. State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China 2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 评论
A Benefits-centric Multi-participant Trust Architecture for DRM-Enabling Digital Contents Value Chain Ecosystem
A Benefits-centric Multi-participant Trust Architecture for ...
收藏 引用
International Seminar on Business and information Management, ISBIM
作者: Zhiyong Zhang Qingqi Pei Jianfeng Ma Lin Yang Ministry of Education Key Laboratory of Computer Network & Information Security Xidian University Xi'an China
A multi-participant trust relationship is essential to implement a successful business transaction in DRM (digital rights management)-enabling digital contents industry. The simple adoption of several increasingly enh... 详细信息
来源: 评论
Fair Exchange Signature Schemes
Fair Exchange Signature Schemes
收藏 引用
International Conference on Advanced information networking and Applications Workshops (AINAW)
作者: Jingwei Liu Rong Sun Wenping Ma Ying Li Xinmei Wang Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China
In this paper we propose an efficient Fair Exchange Signature Scheme(FESS) that allows two players to exchange digital signatures in a fair way. It may be considered as an interesting extension of concurrent signature... 详细信息
来源: 评论
Fast Access Control Algorithm in Wireless network
Fast Access Control Algorithm in Wireless Network
收藏 引用
International Conference on Grid and Pervasive Computing Workshops, GPC
作者: Kun Wang Zhixin Ma Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China
This paper presents an access control algorithm which bases on artificial neural network (ANN). It uses selected roles as input vectors. Then, considering role inheritance, the matching roles that may mutual exclude a... 详细信息
来源: 评论
ECC-Based Threshold Digital Signature Scheme without a Trusted Party
ECC-Based Threshold Digital Signature Scheme without a Trust...
收藏 引用
International Conference on Computational Intelligence and security
作者: Qingqi Pei Jianfeng Ma Key Lab of Computer Networks and Information Security (Ministry of Education) Xidian University
Based on the elliptic curve logarithm problem, a (t, n) threshold digital signature scheme was proposed in this paper. In the key generation phase, each participant's public and private keys, and the group public ... 详细信息
来源: 评论
Data reduction and classification based on multiple classifier behavior
Data reduction and classification based on multiple classifi...
收藏 引用
2008 International Conference on Data Mining, DMIN 2008
作者: Zhao, Chunying Guo, Gongde Huang, Xuming Huang, Tianqiang Neagu, Daniel School of Math. and Computer Science Fujian Normal Univ. China Key Lab. of Network Security and Cryptography Fujian Normal Univ. China Department of Computing University of Bradford United Kingdom
A novel method, multiple classifier behavior-based data reduction and classification algorithm, called DRC, is proposed in this paper. It arrived at the transformation of the data-space by suing of the multiple classi... 详细信息
来源: 评论
New ECDSA-Verifiable Multi-receiver Generalization Signcryption
New ECDSA-Verifiable Multi-receiver Generalization Signcrypt...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Xiaoyuan Yang Maotang Li Lixian Wei Yiliang Han Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an China Key Lab. of Network & Inf. Security of APF Eng. Coll. of APF Xian Engineering College of APF Key Laboratory of Network and Information Security of APF Xi'an China
Multi-receiver signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of signature and multi-receiver encryption. Generalized Multi-Receiver signcryption can provide authenticity... 详细信息
来源: 评论
A time weighted neighbourhood counting similarity for time series analysis
收藏 引用
3rd International Conference on Rough Sets and Knowledge Technology, RSKT 2008
作者: Wang, Hui Lin, Zhiwei School of Computing and Mathematics University of Ulster Jordanstown BT37 0QB United Kingdom Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University China
Time series data abound and analysis of such data is challenging and potentially rewarding. One example is financial time series analysis. In time series analysis there is the issue of time dependency, that is, the st... 详细信息
来源: 评论
五谱值函数的构造
五谱值函数的构造
收藏 引用
中国密码学会2009年会
作者: Xie Min 谢敏 Li Juan 李娟 Zhang Feng-rong 张凤荣 Key laboratory of computer network and information security(Xidian University) Xi'an 710071 Guangdo 西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071 广东省信息安全技术重点实验室(广州大学)广州 510405 School of Electrical Engineering(Northwest University of Nationalities) Lanzhou 730030 西北民族大学电气工程学院 兰州 730030 Key laboratory of computer network and information security(Xidian University) Xi'an 710071 西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071
在密码体制的构造中,布尔函数被广泛地应用,对分组密码中S-盒和流密码中组合生成器等的研究,实质上可归结为对布尔函数的分析.通过分析Bent函数的性质,利用级联的方法,构造了一类五谱值函数.该类函数没有非零线性结构、平衡、代数... 详细信息
来源: 评论
Modeling and Analysis of a Self-Learning Worm Based on Good Point Set Scanning
Modeling and Analysis of a Self-Learning Worm Based on Good ...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Fangwei Wang Yunkai Zhang Jianfeng Ma Network Center Hebei Normal University Shijiazhuang China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on ... 详细信息
来源: 评论