咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是2841-2850 订阅
排序:
Access method of integrating WPA and WAPI protocols into the IEEE 802.11b adapter
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2006年 第5期33卷 804-808+818页
作者: Duan, Ning Ma, Jian-Feng Key Lab. of Computer Networks and Information Security Xidian Univ. Xi'an 710071 China IBM CRL Beijing 100094 China
According to the various security access methods applied to wireless local area network (WLAN), an approach to integrating WPA and WAPI is presented, which can make wireless terminals able to access WLAN expediently. ... 详细信息
来源: 评论
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce
收藏 引用
Journal of China University of Mining and Technology 2006年 第4期16卷 470-474页
作者: XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen The Ministry of Edu. Key Lab. of Computer Network and Infor. Security Xidian University Xi' an Shanxi 710071 China Department of lnformation and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Department of Math. & Physics Zhumadian Institute of Education Zhumadian Henan 463000 China
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... 详细信息
来源: 评论
Graphic-based theory proof of compliance algorithm
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第21期32卷 175-176页
作者: Rao, Yixuan Yang, Bo Key Lab. of Computer Network and Information Security Xi'an 710071 China
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delega... 详细信息
来源: 评论
Access control model for P2P file-sharing systems based on trust and recommendation
Access control model for P2P file-sharing systems based on t...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Yue, Guang-Xue Yu, Fei Chen, Yi-Jun Wu, Rong-Hui An, Ji-Yao Li, Ren-Fa College of Information Engineering JiaXing University JiaXing 314000 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China School of Computer and Communication Hunan University Changsha 410082 China
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,... 详细信息
来源: 评论
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1827-1830页
作者: ZHANG Shaomin WANG Baoyi ZHOU Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China School of Computer North China Electric Power University Baoding 071003 Hebei China
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... 详细信息
来源: 评论
Reliability Extended security Model Combining Confidentiality and Integrity
Reliability Extended Security Model Combining Confidentialit...
收藏 引用
2006 8th International Conference on Signal Processing
作者: Xiaofei Zhang Changxiang Shen State Key Lab of Information Security Chinese Academy of Sciences Graduate School Computer Technology Institute of Navy
Confidentiality and integrity are two essential factors in a secure information *** reliability extended security model combines BLP and B1BA models to satisfy the above security requirements,and it uses the concept o... 详细信息
来源: 评论
Disaster recovery system model with e-government case study
收藏 引用
Natural Hazards Review 2006年 第4期7卷 145-149页
作者: Wang, Kun Li, Long-Hai Yuan, Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Xidian Univ. Ministry of Education Xi'an 710071 Shaanxi China Dept. of Computer Science and Technology Xidian Univ. Xi'an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ... 详细信息
来源: 评论
Ternary Tree based Group key Management in Dynamic Peer networks
收藏 引用
International Conference on Computational Intelligence and security
作者: Wei Wang Jianfeng Ma Sangjae Moon Key Laboratory of Computer Networks and Information Security Ministry ofEducation Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu South Korea
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, merge an... 详细信息
来源: 评论
Efficient Access Control in Wireless network
Efficient Access Control in Wireless Network
收藏 引用
Web Intelligence and Intelligent Agent Technology Workshops (WI-IAT)
作者: Kun Wang Zhenguo Ding Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China School of Remote Education Xidian University Xi'an China
To use role-based access control (RBAC) in wireless network is difficult than that in wired network. RBAC needs to search relative tables to get the user's permissions. We present an access control judgment algori... 详细信息
来源: 评论
A Group Oriented Cryptosystem for the Vector Space Access Structure
收藏 引用
Journal of Shanghai Jiaotong University(Science) 2006年 第2期E-11卷 184-187页
作者: XU Chun-xiang MA Hua ZHOU Jun-hui XIAO Guo-zheng School of Computer Science and Eng. Univ.of Electronic Science and Technology of ChinaChengdu 610054China Key Lab.of Computer Networks & Information Security Xidian Univ.Xi'an
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an en c... 详细信息
来源: 评论