咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是2721-2730 订阅
排序:
Storage Requirements for key Distribution in Sensor networks
Storage Requirements for Key Distribution in Sensor Networks
收藏 引用
International Conference on Sensor Technologies and Applications, SensorComm
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University South Korea
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
keying material based key pre-distribution scheme
Keying material based key pre-distribution scheme
收藏 引用
IEEE International Conference on Intelligence and security Informatics, ISI
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University South Korea
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo... 详细信息
来源: 评论
Action-Based Access Control Modelt
收藏 引用
电子学报(英文版) 2008年 第3期17卷 396-401页
作者: LI Fenghua WANG Wei MA Jianfeng Sang JaeMoon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an 710071 China) Graduate School Beijing Electronic Science and Technology Institute Beijing 100070 China) Mobile Network Security Technology Research Center Kyungpook National UniversitySankyuk-dong~ Buk-ku~ Daeyu 702-701~ KoreaI
来源: 评论
New trust model based on advanced D-S evidence theory for P2P networks
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and information Technology 2008年 第6期30卷 1480-1484页
作者: Tian, Chun-Qi Zou, Shi-Hong Wang, Wen-Dong Cheng, Shi-Duan Broadband Network Research Center State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology College of Electronic and Information Engineering Tongji University Shanghai 200092 China
Trust relationship between participants is indispensable to set up in a large-scale distributed P2P file-sharing system. A novel trust model for P2P system based on advanced D-S theory of evidence is proposed in this ... 详细信息
来源: 评论
Design and Implementation of an Integrity Measurement System Based on Windows Trusted Computing Platform
Design and Implementation of an Integrity Measurement System...
收藏 引用
International Conference for Young computer Scientists, ICYCS
作者: Yang Yang Huanguo Zhang Li Wan Bingyu Zou School of Computer Wuhan University of China Wuhan China State Key Lab of Software Engineering Wuhan University of China Wuhan China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan China
This paper presents the design and implementation of an integrity measurement system based on Windows trusted computing platform. The trust chain is established from the BIOS up to the application layer, where the exe... 详细信息
来源: 评论
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement
A Fine-Grained Digital Rights Transfer Policy and Trusted Di...
收藏 引用
International Conference on Computational Intelligence and security
作者: Zhiyong Zhang Qingqi Pei Jianfeng Ma Lin Yang Kefeng Fan Key Lab of Computer Network & Information Security (Ministry of Education) Xidian University Xi'an Shaanxi China Electron. Inf. Engineering Coll. Henan University of Science and Technology Luoyang Henan China Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing China China Electronics Standardization Institute Beijing China
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights p... 详细信息
来源: 评论
Weak generalized self-shrinking generators
收藏 引用
Journal of Systems Engineering and Electronics 2007年 第2期18卷 407-411页
作者: Dong Lihua Hu Yupu The Key Lab. of Computer Networks and Information Security the Ministry of Education Xidian Univ. Xi'an 710071 P. R. China
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS genera... 详细信息
来源: 评论
Towards structural Web Services matching based on Kernel methods
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第4期1卷 450-458页
作者: NAN Kai YU Jianjun SU Hao GUO Shengmin ZHANG Hui XU Ke Computer Network Information Center Chinese Academic of ScienceBeijing 100080China Computer Network Information Center Chinese Academic of ScienceBeijing 100080China Stat Key Lab Software Development Environment Beihang UniversityBeijing 100083China Stat Key Lab Software Development Environment Beihang UniversityBeijing 100083China
This paper describes a kernel methods based Web Services matching mechanism for Web Services discovery and *** matching mechanism tries to exploit the latent semantics by the structure of Web *** this paper,Web Servic... 详细信息
来源: 评论
New signature scheme with fast revocation
收藏 引用
Journal of Computational information Systems 2007年 第1期3卷 35-39页
作者: Yang, Chen Cheng, Xiangguo Ma, Wenping Wang, Xinmei Key Lab. of Computer Networks and Information Security Xidian University Xi'an 710000 China College of Information Engineering Qingdao University Qingdao 266071 China
Digital signature plays an important role in modern cryptography, but many signature schemes require high maintenance cost for certificate management and cannot provide immediate revocation either. In this paper, a ne... 详细信息
来源: 评论
Universally composable anonymous Hash certification model
收藏 引用
Science in China(Series F) 2007年 第3期50卷 440-455页
作者: ZHANG Fan MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian UniversityXi'an 710071 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dongBuk-ku Daeyu 702-701 Korea
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica... 详细信息
来源: 评论