咨询与建议

限定检索结果

文献类型

  • 553 篇 会议
  • 494 篇 期刊文献

馆藏范围

  • 1,047 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 578 篇 计算机科学与技术...
    • 461 篇 软件工程
    • 189 篇 信息与通信工程
    • 126 篇 电气工程
    • 68 篇 网络空间安全
    • 66 篇 生物工程
    • 65 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 29 篇 机械工程
    • 26 篇 光学工程
    • 26 篇 安全科学与工程
    • 24 篇 交通运输工程
    • 24 篇 生物医学工程(可授...
    • 21 篇 仪器科学与技术
    • 17 篇 化学工程与技术
  • 325 篇 理学
    • 213 篇 数学
    • 68 篇 生物学
    • 64 篇 统计学(可授理学、...
    • 60 篇 物理学
    • 32 篇 系统科学
    • 16 篇 化学
  • 192 篇 管理学
    • 113 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 49 篇 法学
    • 28 篇 法学
    • 22 篇 社会学
  • 20 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 军事学
    • 18 篇 军队指挥学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 6 篇 农学
  • 4 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 43 篇 cryptography
  • 40 篇 privacy
  • 34 篇 computational mo...
  • 34 篇 feature extracti...
  • 31 篇 authentication
  • 31 篇 cloud computing
  • 30 篇 data privacy
  • 30 篇 semantics
  • 26 篇 data models
  • 25 篇 federated learni...
  • 24 篇 network security
  • 23 篇 accuracy
  • 22 篇 encryption
  • 21 篇 security
  • 21 篇 protocols
  • 19 篇 deep learning
  • 19 篇 training
  • 18 篇 servers
  • 17 篇 blockchain
  • 15 篇 neural networks

机构

  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 36 篇 shandong provinc...
  • 36 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 30 篇 fujian provincia...
  • 30 篇 key laboratory o...
  • 28 篇 school of comput...
  • 28 篇 shaanxi key labo...
  • 21 篇 school of comput...
  • 21 篇 fujian provincia...
  • 21 篇 state key labora...
  • 19 篇 school of comput...
  • 19 篇 state key labora...
  • 17 篇 shaanxi key labo...
  • 16 篇 school of mathem...
  • 16 篇 state key labora...
  • 12 篇 information cent...
  • 12 篇 jilin province k...
  • 12 篇 school of comput...

作者

  • 38 篇 xu li
  • 26 篇 yichuan wang
  • 23 篇 meng deyu
  • 22 篇 xinhong hei
  • 19 篇 wang yichuan
  • 16 篇 cao xiangyong
  • 16 篇 shen yulong
  • 16 篇 di xiaoqiang
  • 16 篇 li xu
  • 15 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 chen lanxiang
  • 12 篇 jinbo xiong
  • 12 篇 lin limei
  • 12 篇 xiong jinbo
  • 11 篇 chen zhong
  • 11 篇 xiaoqiang di
  • 11 篇 wu wei
  • 11 篇 fu chong
  • 11 篇 liu ximeng

语言

  • 946 篇 英文
  • 69 篇 其他
  • 35 篇 中文
检索条件"机构=Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science"
1047 条 记 录,以下是1-10 订阅
排序:
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 248-261页
作者: LI Yumei ZHANG Futai School of Computer Science Hubei University of Technology Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University
As an emerging technology, cloud-assisted wireless body area networks(WBANs) provide more convenient services to users. Recently, many remote data auditing protocols have been proposed to ensure the data integrity and... 详细信息
来源: 评论
A Novel Construction of Updatable Identity-Based Hash Proof System and Its Applications
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 564-576页
作者: QIAO Zirui ZHOU Yanwei YANG Bo ZHANG Wenzheng ZHANG Mingwu School of Computer Science Shaanxi Normal University State Key Laboratory of Cryptology Science and Technology on Communication Security Laboratory Henan Key Laboratory of Network Cryptography Technology School of Computere Hubei University of Technology
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was propo... 详细信息
来源: 评论
Endogenous security of FQn networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and Information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 评论
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
收藏 引用
Digital Communications and networks 2024年 第2期10卷 380-388页
作者: Renwan Bi Mingfeng Zhao Zuobin Ying Youliang Tian Jinbo Xiong Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin541004China Faculty of Data Science City University of Macao999078MacaoChina State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Characterization and Properties of Bent-Negabent Functions
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 786-792页
作者: JIANG Niu ZHAO Min YANG Zhiyao ZHUO Zepeng CHEN Guolong School of Mathematical Sciences Huaibei Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University School of Cyber Science University of Science and Technology of China School of Computer Engineering Bengbu University
A further characterization of the bentnegabent functions is presented. Based on the concept of complete mapping polynomial, we provide a necessary and sufficient condition for a class of quadratic Boolean functions to... 详细信息
来源: 评论