咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 17 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 6 篇 信息与通信工程
    • 5 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 7 篇 理学
    • 5 篇 数学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 2 篇 public key crypt...
  • 2 篇 deep neural netw...
  • 2 篇 security of data
  • 1 篇 image fusion
  • 1 篇 intrusion detect...
  • 1 篇 mobile ad hoc ne...
  • 1 篇 non-cooperative ...
  • 1 篇 electricity tran...
  • 1 篇 network protocol...
  • 1 篇 revocation
  • 1 篇 containers
  • 1 篇 demand response ...
  • 1 篇 electric power d...
  • 1 篇 steganography
  • 1 篇 fault tolerant c...
  • 1 篇 feature selectio...
  • 1 篇 electronic licen...
  • 1 篇 digital copyrigh...
  • 1 篇 nash equilibrium

机构

  • 5 篇 key lab. of comp...
  • 2 篇 the second north...
  • 1 篇 college of compu...
  • 1 篇 college of compu...
  • 1 篇 xi'an jiaotong u...
  • 1 篇 guangdong key la...
  • 1 篇 theory of comput...
  • 1 篇 department of el...
  • 1 篇 moe key lab. for...
  • 1 篇 state grid key l...
  • 1 篇 guangdong key la...
  • 1 篇 school of electr...
  • 1 篇 key lab. for com...
  • 1 篇 department of co...
  • 1 篇 system engineeri...
  • 1 篇 qingpu power sup...
  • 1 篇 global ener. int...
  • 1 篇 xi'an jiaotong u...
  • 1 篇 key lab. of netw...
  • 1 篇 institute for in...

作者

  • 4 篇 zhou li-hua
  • 4 篇 zhang xue-jun
  • 2 篇 yu guo-lin
  • 1 篇 huang jiwu
  • 1 篇 zhang lei
  • 1 篇 yang bo
  • 1 篇 ma jianfeng
  • 1 篇 wang dong-yong
  • 1 篇 cen chen
  • 1 篇 qigui yao
  • 1 篇 han chongzhao
  • 1 篇 zhang guanghui
  • 1 篇 wei xue-ye
  • 1 篇 wang bingshu
  • 1 篇 xiangqun wang
  • 1 篇 shen li
  • 1 篇 chen jingde
  • 1 篇 yin zhong-hai
  • 1 篇 qiao junfeng
  • 1 篇 hu chunlin

语言

  • 10 篇 英文
  • 7 篇 中文
检索条件"机构=Key Lab. of Computer Network and Info. Security"
17 条 记 录,以下是11-20 订阅
排序:
Multi-service oriented traitor tracing scheme on LIFP
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and info.mation Technology 2007年 第5期29卷 1177-1181页
作者: Zhang, Xue-Jun Yu, Guo-Lin Zhou, Li-Hua Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China The Second Northwest Institute Ethnic Minority Yinchuan 750021 China
A multi-service traitor tracing scheme on LIFP (Large Integer Factoring Problem) is proposed, the essential idea of which is that an equation based on LIFP is constructed and a parameter is introduced to transfer serv... 详细信息
来源: 评论
New traitor tracing scheme with extra properties
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2007年 第2期34卷 274-278页
作者: Zhang, Xue-Jun Wang, Dong-Yong Zeng, Zhi-Yong Yin, Zhong-Hai School of Edu. Tech. and Comm. North West Normal Univ. Lanzhou 730070 China Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China Dept. of Science Tsinghua Univ. Beijing 100084 China
The session key S is divided into the sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation(scheme 1). Under the condition of a discrete logarit... 详细信息
来源: 评论
Dynamic digital copyright protection scheme
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第3期32卷 154-155+163页
作者: He, Xinhua Yang, Bo Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China
By applying the linear space codes and the oblivious polynomial evaluation protocol, the paper constructs a scheme of generating electronic license and electronic license decryption key. Basing on the scheme, it gives... 详细信息
来源: 评论
Collusion-resistant asymmetric public-key traitor tracing scheme for multi-channel services
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and info.mation Technology 2006年 第11期28卷 2127-2129页
作者: Zhang, Xue-Jun Yu, Guo-Lin Zhou, Li-Hua Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China The Second Northwest Institute Ethnic Minority Yinchuan 750021 China
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service ... 详细信息
来源: 评论
New multi-service oriented collusion-resistant asymmetric traitor tracing scheme
收藏 引用
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition) 2006年 第4期38卷 110-116页
作者: Zhang, Xue-Jun Jiang, Zheng-Tao Zhou, Li-Hua College of Edu. Technol. and Communication Northwest Normal Univ. Lanzhou 730070 China Key Lab. of Computer Network and Info. Security Xidian Univ. Xi'an 710071 China College of Computer Sci. Beihang Univ. Beijing 100083 China
To protect the profit of DS (Data Supplier) and authorized users better and provide multiple services for users, a new multi-service oriented collusion-resistant asymmetric traitor tracing scheme was proposed, in whic... 详细信息
来源: 评论
Remembrance of data passed: A study of disk sanitization practices
收藏 引用
IEEE security and Privacy 2003年 第1期1卷 17-27页
作者: Garfinkel, Simson L. Shelat, Abhi Massachusetts Inst. of Technology Cryptography/Info. Security Group Advanced Network Architecture Group MIT's Lab. for Computer Science Theory of Computation Group Massachusetts Inst. of Technology
The disk sanitization practices are studied. computer systems used by people with varying authorization levels typically employ authentication, access control lists, and a privileged operating system to maintain info.... 详细信息
来源: 评论
Survivability Model of network System and Its Survivability Analysis
Survivability Model of Network System and Its Survivability ...
收藏 引用
作者: Zhu, Jianming Ma, Jianfeng School of Computer Xidian University Xi'an 710071 China Stt. Key Lab. for Info. Security Chinese Academy of Sciences Beijing 100039 China
Survivability has become increasingly important with society's increased dependence of critical infrastructures on computers. Survivability is the capability of a system to fulfill its mission, in a timely manner,... 详细信息
来源: 评论