咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是2681-2690 订阅
排序:
Analysis of modular inverse and improvement of extended euclid algorithm
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第7期6卷 225-233页
作者: Xin, Li Ru, Zhang Xinxin, Niu Junfeng, Xu Information Security Center Beijing University of Posts and Telecommunications China Information Security Center Beijing University of Posts and Telecommunications Key Laboratory of Information Network Security Ministry of Public Security China National Computer network Emergency Response technical Team/Coordination Center of China China
The properties of modular inverse were analyzed and gain to improve the extended Euclid algorithm. In the new scheme, even-reduction and remainder-attenuation were proposed which insured the remainder be attenuated to... 详细信息
来源: 评论
Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2
Security Analysis of an Electronic Commerce Protocol Using C...
收藏 引用
第六届中国可信计算与信息安全学术会议
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network Sys School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 评论
Provably secure and effcient identity-based signature scheme based on cubic residues
收藏 引用
International Journal of network Security 2012年 第1期14卷 33-38页
作者: Wang, Zhiwei Wang, Licheng Zheng, Shihui Yang, Yixian Hu, Zhengming Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China College of Computer Nanjing University of Posts and Telecommunications China
Many identity based signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are with-out pairings. Up to now, there still remains a challe... 详细信息
来源: 评论
Performance analysis of vector OFDM with linear MMSE receiver
Performance analysis of vector OFDM with linear MMSE receive...
收藏 引用
2012 1st IEEE International Conference on Communications in China, ICCC 2012
作者: Li, Yabo Ngebani, Ibo Xia, Xiang-Gen Høst-Madsen, Anders Department of Information Science and Electrical Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Hangzhou Zhejiang China Department of Electrical and Computer Engineering University of Delaware Newark DE 19716 United States Department of Electrical Engineering University of Hawaii at Manoa Honolulu HI 96822 United States Chonbuk National University Jeonju Korea Republic of
Vector OFDM (V-OFDM) for single transmit antenna systems is a general transmission scheme in which OFDM and Single-Carrier Frequency Domain Equalization (SC-FDE) can be considered as two extreme/special cases. Due to ... 详细信息
来源: 评论
A generic approach for providing revocation support in secret handshake
A generic approach for providing revocation support in secre...
收藏 引用
14th International Conference on information and Communications Security, ICICS 2012
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Ding, Xuhua Zhou, Jianying Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China School of Information Systems Singapore Management University Singapore Singapore
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared... 详细信息
来源: 评论
DRTEMBB: Dynamic recommendation trust evaluation model based on bidding
收藏 引用
Journal of Multimedia 2012年 第4期7卷 279-288页
作者: Wang, Gang Gui, Xiao-lin Department of Electronics and Information Engineering Xi'an Jiaotong University Xi'an China Shanxi Province Key Laboratory of Computer Network Xi'an Jiaotong University Xi'an China School of Information Xi'an University of Finance and Economics Xi'an China
Fraud or cheating of malicious nodes were restrained by reducing the trust value of malicious nodes in the past trust model, but few recommendation nodes for cooperation cheating are punished, so it has had only limit... 详细信息
来源: 评论
An new anonymous authentication scheme for cloud computing
An new anonymous authentication scheme for cloud computing
收藏 引用
2012 7th International Conference on computer Science and Education, ICCSE 2012
作者: Zhang, Zhi-Hua Li, Jian-Jun Jiang, Wei Zhao, Yong Gong, Bei China Tobacco Zhejiang Iidustrial Co. Ltd. Hangzhou 310009 China College of Computer Science Beijing University of Technology Beijing 100124 China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Beijing 100124 China Beijing 100124 China
Cloud computing is a hot topic of current research, for anonymous authentication is required in many applications scenarios of e-business based on cloud computing, users do not want to expose their identity, users jus... 详细信息
来源: 评论
Semantic access control for cloud computing based on e-Healthcare
Semantic access control for cloud computing based on e-Healt...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Lili Sun Hua Wang Jianming Yong Guoxin Wu Centre for Systems Biology University of Southern Queensland Toowoomba Australia School of Information Systems University of Southern Queensland Toowoomba Australia School of Computer Science and Engineering & Key Laboratory for Computer Network and Information Integration Southeast Univeristy
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation... 详细信息
来源: 评论
Semantics-Based Compliance An a lys is o f N e two rk S e cu rity Policy Hie ra rch ie s
收藏 引用
China Communications 2012年 第7期9卷 22-35页
作者: Yao Shan Xia Chunhe Hu Junshun Jiao Jian Li Xiaojian Beijing Key Laboratory of Network Technology Beihang University Beijing 100191 P. R. China Beijing Information Technology University Beijing 100192 P. R. China College of Computer Science and Information Technology Guangxi Normal University Guilin 541004 P. R. China
network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect... 详细信息
来源: 评论
An improved clustering algorithm based on intersecting circle structure
An improved clustering algorithm based on intersecting circl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Ze-Jun Yang Ying-long Wang Fu-Meng Zhao Tai-Bo Huang Shandong Province Key Network Laboratory Shandong Computer Science Center Jinan China School of Information Science & Engineering Shandong Normal University Jinan China
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a... 详细信息
来源: 评论