咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是2751-2760 订阅
排序:
A New Secure Data Forwarding Protocol with Fault Detection for Wireless Ad Hoc networks
A New Secure Data Forwarding Protocol with Fault Detection f...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Si-Shen Chen Li Xu Yi Mu Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou Fujian PR China School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522.A
In wireless ad hoc networks, the route discovery process or the data forwarding process is vulnerable to attackers. In this paper, we address the data forwarding security problem and propose a light-weight secure data... 详细信息
来源: 评论
Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology
Research on Usage Control Model with Delegation Characterist...
收藏 引用
IFIP International Conference on network and Parallel Computing Workshops (NPC Workshops)
作者: Zhiyong Zhang Lin Yang Qingqi Pei Jianfeng Ma Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China Electron. Information Engineering Coll. Henan University of Science and Technology Luoyang China The Research Institute Renesas Technology Corporation Beijing China
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The pape... 详细信息
来源: 评论
Attack and improve of a group signature scheme based on Chinese remainder theorem
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and information Technology 2007年 第1期29卷 182-184页
作者: Wang, Feng-He Hu, Yu-Pu Wang, Chun-Xiao Key Lab. of Computer Networks and Information Security Xidian University Xi'an 710071 China Dept. of Mathematics Taishan Collage Taian 271000 China Dept. of Math. and Phys. Shandong Institute of Architecture and Engineering Jinan 250014 China
An attack is mounted on a group signature ncncmc bnscd on Cliincso Remainder Theory (Chen-Scheme). It shows the Chen-Scheme is insecure: A colluding subset of group members can find the private key of other members an... 详细信息
来源: 评论
New traitor tracing scheme with extra properties
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2007年 第2期34卷 274-278页
作者: Zhang, Xue-Jun Wang, Dong-Yong Zeng, Zhi-Yong Yin, Zhong-Hai School of Edu. Tech. and Comm. North West Normal Univ. Lanzhou 730070 China Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China Dept. of Science Tsinghua Univ. Beijing 100084 China
The session key S is divided into the sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation(scheme 1). Under the condition of a discrete logarit... 详细信息
来源: 评论
Quantification of natural surveillance in urban areas for crime prevention using vehicle-borne laser scanners
Quantification of natural surveillance in urban areas for cr...
收藏 引用
10th International Conference on computers in Urban Planning and Urban Management, CUPUM 2007
作者: Tanaka, Hideto Zhao, Huijing Chen, Yuzhong Shibasaki, Ryosuke Japan Urban Security Research Institute P.O. Box 2517 Tokyo Opera City Tokyo 163-1408 Japan State Key Lab of Machine Perception School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Center for Spatial Information Science University of Tokyo 5-1-5 Kashiwanoha Kashiwa-shi Chiba 277-8568 Japan
This research aims to quantify natural surveillance in urban areas, an important factor for Crime Prevention Through Environmental Design (CPTED), with high resolution. This quantification considers the effect of deta... 详细信息
来源: 评论
Intrusion Model for Intrusion Tolerance System by Using Capabilities of Attackers
收藏 引用
电子学报(英文版) 2006年 第4期15卷 613-618页
作者: WANG Liangmin MA Jianfeng ZHANG Jiaming Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China Computer Security Laboratory Department of Computer Science Jiangsu University Zhenjiang 212013 China
To solve the problem of modeling the intrusion in Intrusion Tolerance System, an intrusion model of state transition and its constructing algorithm is presented in this paper, which places its emphasis on the influenc... 详细信息
来源: 评论
key Management Using Certificate-Based Cryptosystem in Ad Hoc networks
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2006年 第2期11卷 152-157页
作者: 李发根 高军涛 刘双根 胡予濮 Key Lab. of Computer Networks and Information Security Xidian Univ. Xi'an 710071 China
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... 详细信息
来源: 评论
Robust Disaster Recovery System Model
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第1期11卷 170-174页
作者: WANG Kun SU Rui-dan LI Zeng-xin CAI Zhen ZHOU Li-hua Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi' an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante... 详细信息
来源: 评论
Electronic Payment Scheme to Prevent the Treachery
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1745-1748页
作者: FAN Kai ZHANG Jun KOU Weidong XIAO Guozhen Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i... 详细信息
来源: 评论
A minimum motion vector span criteria based error concealment algorithm for entire frame losses in H.264
A minimum motion vector span criteria based error concealmen...
收藏 引用
25th PCS: Picture Coding Symposium 2006, PCS2006
作者: Liu, Li Yang, Gaobo Sun, Tao Network and Information Security Lab. School of Computer and Communication Hunan University Changsha Hunan 410082 China
In low bit-rate video communication, a coded picture may fit the payload size of one IP packet, especially for the latest video coding standard H.264. Thus, the loss of a packet may result in the loss of a whole video... 详细信息
来源: 评论