咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3291-3300 订阅
排序:
Distributed redundancy strategy in P2P environment
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第3期6卷 148-157页
作者: Yang, Lei Qin, Zhi-Guang Wang, Can Yang, Hao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
P2P storage architecture plays an important role in distributed storage systems. For P2P dynamic environment, the sufficient redundant data must be maintained to ensure the data availability. System will pay various c... 详细信息
来源: 评论
A secure message delivery scheme with path tracking for delay tolerant networks
A secure message delivery scheme with path tracking for dela...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Zhongtian Jia Muhammad Ali Raffay Lixiang Li Xiaodong Lin Yixian Yang Information Security Center Beijing University of Posts and Telecommunications China Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan China Faculty of Business and Information Technology Institute of Technology University of Ontario Oshawa ONT Canada
In delay tolerant networks (DTNs), message delivery is operated in an opportunistic way through store-carry and forward relaying, and every DTN node is in anticipation of cooperation for data forwarding from others. U... 详细信息
来源: 评论
High Capacity Steganographic Method Based upon Quantization Error of JPEG
High Capacity Steganographic Method Based upon Quantization ...
收藏 引用
2012年计算机应用与系统建模国际会议
作者: Dong Xiuze Liu Shu Zhang Ru Niu Xinxin Wang Lifeng Information Security Center Beijing University of Posts and Telecommunications Electronic and Information Engineering Department Beijing Electronic Science and Technology Institute Key Laboratory of Information Network Security Ministry of Public Security Computer Science and Technology Department Beijing Electronic Science and Technology Institute
Quantizing Error during the process of JPEG compression is analyzed, and a new information hiding algorithm is proposed based on Quantizing Error of JPEG image. Experimental results show that the proposed algorithm ca... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
A Framework to Eliminate Backdoors from Response-Computable Authentication
A Framework to Eliminate Backdoors from Response-Computable ...
收藏 引用
IEEE Symposium on security and Privacy
作者: Shuaifu Dai Tao Wei Chao Zhang Tielei Wang Yu Ding Zhenkai Liang Wei Zou Beijing Key Laboratory of Internet Security Technology Institute of Computer Science and Technology Peking University China University of California Berkeley USA College of Computing Georgia Institute of Technology USA School of Computing National University of Singapore Singapore
Response-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system independently computes the expected user response and authenticates... 详细信息
来源: 评论
Trust Model Based on Structured Protection for High Level security System
收藏 引用
China Communications 2012年 第11期9卷 70-77页
作者: Liao Jianhua Zhao Yong Zhan Jing School of Electronics Engineering and Computer Science Peking University Beijing 100871 P. R. China School of Computer Science and Technology Beijing University of Technology Beijing 100124 P. R. China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 P. R. China State Key Laboratory of Information Security Institute of So ware Chinese Academy of Sciences Beijing 100049 P. R. China
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... 详细信息
来源: 评论
A generic approach for providing revocation support in secret handshake
A generic approach for providing revocation support in secre...
收藏 引用
14th International Conference on Information and Communications security, ICICS 2012
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Ding, Xuhua Zhou, Jianying Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China School of Information Systems Singapore Management University Singapore Singapore
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared... 详细信息
来源: 评论
Analysis on Token-Controlled Public key Encryption
Analysis on Token-Controlled Public Key Encryption
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Changlu Lin Yong Li Sriramkrishnan Srinivasan Li Lu Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Key Laboratory of Communication & Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing China Department of Computing University of Surrey Guildford UK School of Computer Science University of Electronic Science and Technology Chengdu China
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example... 详细信息
来源: 评论
security Analysis of an Electronic Commerce Protocol Using Casper/FDR2
Security Analysis of an Electronic Commerce Protocol Using C...
收藏 引用
第六届中国可信计算与信息安全学术会议
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network Sys School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 评论
Productive information system oriented trust chain scheme
收藏 引用
Telkomnika 2012年 第5期10卷 1093-1100页
作者: Tian, Li-Ye Shen, Chang-Xiang Department of Electronic and Information Engineering Naval Aeronautical and Astronautical University China Beijing Key Laboratory of Trusted Computing College of Computer Science and Technology Beijing University of Technology China State Key Laboratory of Information Security Chinese Academy of Sciences Institute of Software China
Productive information system has high-level security requirements, but Trusted computing Group's solution of trust chain isn't competent. After analysis and comparison of two different trust transfer ways, a ... 详细信息
来源: 评论