咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 14 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 5 篇 信息与通信工程
    • 2 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 7 篇 理学
    • 5 篇 数学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 4 篇 管理学
    • 3 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...

主题

  • 2 篇 public key crypt...
  • 2 篇 deep neural netw...
  • 1 篇 image fusion
  • 1 篇 intrusion detect...
  • 1 篇 mobile ad hoc ne...
  • 1 篇 non-cooperative ...
  • 1 篇 electricity tran...
  • 1 篇 network protocol...
  • 1 篇 revocation
  • 1 篇 security of data
  • 1 篇 demand response ...
  • 1 篇 steganography
  • 1 篇 fault tolerant c...
  • 1 篇 feature selectio...
  • 1 篇 electronic licen...
  • 1 篇 digital copyrigh...
  • 1 篇 nash equilibrium

机构

  • 5 篇 key lab. of comp...
  • 2 篇 the second north...
  • 1 篇 college of compu...
  • 1 篇 college of compu...
  • 1 篇 xi'an jiaotong u...
  • 1 篇 guangdong key la...
  • 1 篇 department of el...
  • 1 篇 moe key lab. for...
  • 1 篇 guangdong key la...
  • 1 篇 school of electr...
  • 1 篇 key lab. for com...
  • 1 篇 department of co...
  • 1 篇 system engineeri...
  • 1 篇 xi'an jiaotong u...
  • 1 篇 key lab. of netw...
  • 1 篇 institute for in...
  • 1 篇 beijing institut...
  • 1 篇 pca lab the key ...
  • 1 篇 school of comput...
  • 1 篇 college of compu...

作者

  • 4 篇 zhou li-hua
  • 4 篇 zhang xue-jun
  • 2 篇 yu guo-lin
  • 1 篇 huang jiwu
  • 1 篇 zhang lei
  • 1 篇 yang bo
  • 1 篇 ma jianfeng
  • 1 篇 wang dong-yong
  • 1 篇 han chongzhao
  • 1 篇 zhang guanghui
  • 1 篇 wei xue-ye
  • 1 篇 wang bingshu
  • 1 篇 shen li
  • 1 篇 yin zhong-hai
  • 1 篇 hu chunlin
  • 1 篇 zhao qi
  • 1 篇 chen c.l. philip
  • 1 篇 zhu jianming
  • 1 篇 tan shunquan
  • 1 篇 zhao jing

语言

  • 7 篇 英文
  • 7 篇 中文
检索条件"机构=Key Lab. for Computer Networks and Info. Security"
14 条 记 录,以下是11-20 订阅
排序:
Dynamic digital copyright protection scheme
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第3期32卷 154-155+163页
作者: He, Xinhua Yang, Bo Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China
By applying the linear space codes and the oblivious polynomial evaluation protocol, the paper constructs a scheme of generating electronic license and electronic license decryption key. Basing on the scheme, it gives... 详细信息
来源: 评论
Collusion-resistant asymmetric public-key traitor tracing scheme for multi-channel services
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and info.mation Technology 2006年 第11期28卷 2127-2129页
作者: Zhang, Xue-Jun Yu, Guo-Lin Zhou, Li-Hua Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China The Second Northwest Institute Ethnic Minority Yinchuan 750021 China
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service ... 详细信息
来源: 评论
New multi-service oriented collusion-resistant asymmetric traitor tracing scheme
收藏 引用
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition) 2006年 第4期38卷 110-116页
作者: Zhang, Xue-Jun Jiang, Zheng-Tao Zhou, Li-Hua College of Edu. Technol. and Communication Northwest Normal Univ. Lanzhou 730070 China Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China College of Computer Sci. Beihang Univ. Beijing 100083 China
To protect the profit of DS (Data Supplier) and authorized users better and provide multiple services for users, a new multi-service oriented collusion-resistant asymmetric traitor tracing scheme was proposed, in whic... 详细信息
来源: 评论
Survivability Model of Network System and Its Survivability Analysis
Survivability Model of Network System and Its Survivability ...
收藏 引用
作者: Zhu, Jianming Ma, Jianfeng School of Computer Xidian University Xi'an 710071 China Stt. Key Lab. for Info. Security Chinese Academy of Sciences Beijing 100039 China
Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Survivability is the capability of a system to fulfill its mission, in a timely manner,... 详细信息
来源: 评论