咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是2851-2860 订阅
排序:
Improved traitor tracing scheme based on bilinear map
收藏 引用
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications 2006年 第6期29卷 17-20页
作者: Zhang, Xue-Jun Zhou, Li-Hua Wang, Yu-Min Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Tô et al. presented a bilinear-map-based traitor tracing scheme with revocation, but it is a symmetric scheme because it does not provide non-repudiation. An improved Tô scheme was proposed using oblivious p... 详细信息
来源: 评论
Analysis of information Leakage in Quantum key Agreement
收藏 引用
Journal of Shanghai Jiaotong University(Science) 2006年 第2期E-11卷 219-223页
作者: LIU Sheng-li ZHENG Dong CHENG Ke-fei Computer Science and Eng. Shanghai Jiaotong Univ.Shanghai 200030China Lab.of Computer Network and Information Security Xidian Univ.Xi'an Computer Science and Eng. Shanghai Jiaotong Univ.Shanghai 200030China
Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was prese... 详细信息
来源: 评论
Chaotic Pseudorandom Bit Generator Using n-dimensional Nonlinear Digital Filter
Chaotic Pseudorandom Bit Generator Using n-dimensional Nonli...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Xiaomin Wang Jiashu Zhang Yongquan Fan Wenfang Zhang Key Lab of Signal and Information Processing Southwest Jiaotong University Chengdu P.R. China Key Lab of Network Security and National Computing Grid Southwest Jiaotong University Chengdu Sichuan China
A chaotic pseudorandom bit generator (PRBG) using n-dimensional NDF is proposed. To overcome the effects of finite wordlength to NDF and to hide its dynamic behavior, a coupling method followed by a quantization funct... 详细信息
来源: 评论
A Group Oriented Cryptosystem for the Vector Space Access Structure
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2006年 第2期11卷 184-187页
作者: 许春香 马华 周军会 肖国铮 School of Computer Science and Eng. Univ. of Electronic Science and Technology of China Chengdu 610054 China Key Lab. of Computer Networks & Information Security Xidian Univ. Xi'an 710071
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr... 详细信息
来源: 评论
Group oriented cryptosystem for the vector space access structure
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2006年 第2期11 E卷 184-187页
作者: Xu, Chun-Xiang Ma, Hua Zhou, Jun-Hui Xiao, Guo-Zheng School of Computer Science and Eng. Univ. of Electronic Science and Technology of China Chengdu 610054 China Key Lab. of Computer Networks and Information Security Xidian Univ. Xi'an 710071 China
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr... 详细信息
来源: 评论
Survivability analysis of a cluster system with 4th generation security mechanism: Regeneration
收藏 引用
International Journal of network security 2006年 第3期3卷 271-278页
作者: Aung, Khin Mi Mi Park, Kiejin Park, Jong Sou Network Security Lab. Computer Engineering Dept. Hankuk Aviation University 412-791 Seoul Korea Republic of Division of Industrial and Information System Engineering Ajou University 443-749 Suwon Korea Republic of
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failures and moreover we cannot prevent all... 详细信息
来源: 评论
Efficient ID-based threshold signature
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2006年 第2期33卷 311-315页
作者: Liu, Ying Hu, Yu-Pu Wang, Fei Lu, Xiao-Jun Key Lab. of Computer Networks and Information Security Xidian Univ. Xi'an 710071 China
A new ID-based threshold signature scheme is proposed from bilinear pairings, based on our improved ID-based signature scheme. In our ID-based threshold signature scheme, the dishonest Private key Generator (PKG) can ... 详细信息
来源: 评论
How to Play E-Lottery Games via Voting
收藏 引用
Journal of Shanghai Jiaotong University(Science) 2006年 第2期E-11卷 248-252页
作者: HAN Wei ZHANG Long-jun ZHENG Dong CHEN Ke-fei Dept.of Computer Science and Eng. Shanghai Jiaotong Univ.Shanghai 200030China State Key Lab.of Information Security Graduate School of Chinese Academy of SciencesBeijing Dept.of Computer Science and Eng. Shanghai Jiaotong Univ.Shanghai 200030China
E-lottery is a popular game for its convenience provided by the Internet. An e-lottery scheme based on voting is proposed. The scheme is publicly verifiable and the fairness can be guaranteed. Lottery players not only... 详细信息
来源: 评论
Collusion-resistant asymmetric public-key traitor tracing scheme for multi-channel services
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and information Technology 2006年 第11期28卷 2127-2129页
作者: Zhang, Xue-Jun Yu, Guo-Lin Zhou, Li-Hua Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China The Second Northwest Institute Ethnic Minority Yinchuan 750021 China
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service ... 详细信息
来源: 评论
Study on high-speed network intrusion detection based on network processor
收藏 引用
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni 2006年 第SUPPL.期45卷 31-34页
作者: Li, Jia-Chun Chen, Qi-Yu Zhang, Ling Liu, Lan Computer Network Key Lab. South China University of Technology Guangzhou 510640 China Department of Electronics and Information Guangdong Polytechnic Normal University Guangzhou 510665 China
In order to improve attack detection rate and processing capability of intrusion detection system on high-speed environment, NP-NIDS: a high-speed intrusion detection system based on IXP2400 network processor is studi... 详细信息
来源: 评论