咨询与建议

限定检索结果

文献类型

  • 2,000 篇 会议
  • 1,550 篇 期刊文献

馆藏范围

  • 3,550 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,327 篇 工学
    • 1,767 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 578 篇 信息与通信工程
    • 316 篇 电气工程
    • 249 篇 控制科学与工程
    • 231 篇 生物工程
    • 225 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 安全科学与工程
    • 80 篇 仪器科学与技术
    • 79 篇 交通运输工程
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
    • 58 篇 材料科学与工程(可...
  • 1,054 篇 理学
    • 601 篇 数学
    • 251 篇 物理学
    • 247 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 84 篇 化学
  • 586 篇 管理学
    • 323 篇 管理科学与工程(可...
    • 298 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 118 篇 法学
    • 70 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 14 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学

主题

  • 151 篇 feature extracti...
  • 124 篇 semantics
  • 98 篇 accuracy
  • 97 篇 training
  • 93 篇 computational mo...
  • 91 篇 deep learning
  • 73 篇 federated learni...
  • 71 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 57 篇 authentication
  • 55 篇 protocols
  • 51 篇 security
  • 50 篇 data privacy
  • 49 篇 neural networks
  • 48 篇 object detection
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 219 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 93 篇 university of ch...
  • 80 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 information secu...
  • 62 篇 cas key laborato...
  • 62 篇 school of cyber ...
  • 58 篇 guangdong provin...
  • 52 篇 tianjin key labo...
  • 50 篇 shandong fundame...
  • 48 篇 network and data...
  • 48 篇 state key labora...
  • 46 篇 shandong enginee...
  • 46 篇 peng cheng labor...
  • 45 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 state key labora...
  • 42 篇 shandong provinc...
  • 42 篇 institute of inf...

作者

  • 97 篇 cheng xueqi
  • 47 篇 shen huawei
  • 46 篇 guo jiafeng
  • 42 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 23 篇 jin hai
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 20 篇 shen yulong

语言

  • 3,284 篇 英文
  • 190 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3550 条 记 录,以下是3501-3510 订阅
排序:
Efficient certificate-based signcryption scheme from bilinear pairings
收藏 引用
International Journal of Computers and Applications 2008年 第2期30卷 129-133页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryptio... 详细信息
来源: 评论
Detecting the MB1 with Higher-Order Statistics
Detecting the MB1 with Higher-Order Statistics
收藏 引用
International Conference on Computational Intelligence and security
作者: Donghui Hu Lina Wang Xiaqiu Jiang Tingting Zhu Yuntao Yue School of Computer Science and Information Hefei University of Technology Hefei China School of Computer Science Wuhan University of China Wuhan Hubei China The Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan Hubei China
MB1 is a very promising steganography. In this paper, a novel steganalysis scheme is presented to detect MB1. Many experiments are carried out based on high order features, and some useful propositions are learned fro... 详细信息
来源: 评论
ID-based threshold proxy signcryption scheme from bilinear pairings
收藏 引用
International Journal of security and networks 2008年 第3期3卷 206-215页
作者: Li, Fagen Xin, Xiangjun Hu, Yupu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 Sichuan China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 Henan China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 Shaanxi China
A (t, n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, a new identit... 详细信息
来源: 评论
Evolutionary Testing of Trusted computing Supporting Software Based on Genetic Algorithms
Evolutionary Testing of Trusted Computing Supporting Softwar...
收藏 引用
International Symposium on Knowledge Acquisition and Modeling, KAM
作者: Fan He Jing Len Huanguo Zhang Yonghua Tan College of Computer Wuhan University of China Wuhan Hubei China Department of Information Technology Hubei University of Police Wuhan Hubei China Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education Wuhan Hubei China Development and Reform Bureau of Laoshan Qingdao Shandong China
The rapid development of trusted computing (TC) technology has become a milestone in the field of information security. There is an increasing application of trusted computing platform (TCP) with trusted computing sup... 详细信息
来源: 评论
MPMAC and its security analysis
收藏 引用
Beijing Gongye Daxue Xuebao / Journal of Beijing University of technology 2008年 第SUPPL. 2期34卷 62-66页
作者: Zhang, Shao-Lan Yang, Yi-Xian Xing, Guo-Bo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Shandong Jianzhu University Jinan 250101 China
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran... 详细信息
来源: 评论
Universally composable anonymous Hash certification model
收藏 引用
Science in China(Series F) 2007年 第3期50卷 440-455页
作者: ZHANG Fan MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian UniversityXi'an 710071 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dongBuk-ku Daeyu 702-701 Korea
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica... 详细信息
来源: 评论
Secure mutual password authentication scheme with user anonymity
收藏 引用
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University 2008年 第10期33卷 1073-1075页
作者: Wang, Bangju Zhang, Huanguo Wang, Zhangyi Wang, Yuhua School of Computer Wuhan University 129 Luoyu Road Wuhan 430079 China School of Science Huazhong Agricultural University 1 Shizi Hill Wuhan 430070 China Key Laboratory of Aerospace Information Security and Trust Computing Wuhan University 129 Luoyu Road Wuhan 430079 China College of Information Science and Engineering Henan University of Technology Lianhua Street Zhengzhou 450052 China
A new improved password authentication scheme is proposed, which is user anonymity, can fix the Hwang-Yeh's scheme and provide more other security properties such as server spoofing attacks, forge attacks, etc. Ac... 详细信息
来源: 评论
Cryptanalysis of a robust protocol for generating shared RSA parameters
Cryptanalysis of a robust protocol for generating shared RSA...
收藏 引用
IET Conference on Wireless, Mobile and Sensor networks 2007, CCWMSN'07
作者: Kong, Fanyu Yu, Jia Zhang, Guangqing Li, Daxing Institute of Network Security Shandong University Jinan 250100 China Key Laboratory of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China College of Information Engineering Qingdao University Qingdao 266071 China
At IMA-Crypto & Coding' 99, A. M. Barmawi et al. proposed a robust protocol for generating shared RSA parameters, which was claimed to be secure and robust from cheaters and malicious parties. In this paper, w... 详细信息
来源: 评论
Performance evaluation on IEEE 802.11e considering emergency calls in congested situation
收藏 引用
中国邮电高校学报(英文版) 2007年 第S1期14卷 50-54页
作者: CUI Lu-ming OKADA Kazunori KATO Toshihiko CHEN Xing-yi Information Security Center National Institute of Information and Communications Technology Tokyo 184-8795 Japan Department of Information Network System Science The University of Electro-Communications Tokyo 182-8585 Japan States Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing 100876 China
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-ba... 详细信息
来源: 评论
Provable Efficient Certificateless Group key Exchange Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 41-45页
作者: CAO Chunjie MA Jianfeng MOON Sangjae Key Laboratory of Computer Networks and InformationSecurity Ministry of Education Xidian University Xi' an 710071Shaanxi China Mobile Network Security Technology Research Center Kyungpook National University Daeyu 702701 Korea
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... 详细信息
来源: 评论