咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,358 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,455 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 905 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 139 篇 accuracy
  • 131 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 79 篇 data models
  • 72 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 259 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 161 篇 state key labora...
  • 160 篇 school of comput...
  • 144 篇 school of comput...
  • 118 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 81 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 48 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 45 篇 college of compu...
  • 44 篇 school of comput...

作者

  • 39 篇 yang xiaoyuan
  • 38 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 33 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 yichuan wang
  • 27 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 23 篇 min-ling zhang
  • 23 篇 yang jian
  • 23 篇 zhang min-ling
  • 22 篇 ma jianfeng
  • 22 篇 ma xiao

语言

  • 4,416 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5170 条 记 录,以下是4991-5000 订阅
排序:
Heuristic for no-wait flow shops with makespan minimization based on total idle-time increments
收藏 引用
Science in China(Series F) 2008年 第7期51卷 896-909页
作者: LI XiaoPing1,2 & WU Cheng3 1 School of computer Science & engineering, Southeast University, Nanjing 210096, China 2 key laboratory of computer network and information Integration (Southeast University), Ministry of Education, Nanjing 210096, China 3 Department of Automation, Tsinghua University, Beijing 100084, China School of Computer Science & Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China Department of Automation Tsinghua University Beijing China
No-wait flow shops with makespan minimization are classified as NP-hard. In this paper, the optimization objective is equivalently transformed to total idle-time minimization. The independence relationship between tas... 详细信息
来源: 评论
A new approach for UC security concurrent deniable authentication
收藏 引用
Science in China(Series F) 2008年 第4期51卷 352-367页
作者: FENG Tao LI FengHua MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Computer and Communications Lanzhou University of Technology Lanzhou 730050 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dong Buk-ku Daeyu 702-701 Korea
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch... 详细信息
来源: 评论
Storage requirements for key distribution in sensor networks
Storage requirements for key distribution in sensor networks
收藏 引用
2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008
作者: Liu, Zhihong Jianfeng, Ma Huang, Qiping Moon, SangJae Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University Korea Republic of
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第5期13卷 523-527页
作者: CHEN Lu ZHANG Huanguo ZHANG Liqiang LI Song CAI Liang School of Computer Wuhan University/Key Laboratory ofAerospace Information Security and Trusted Computing of Ministryof Education Wuhan 430072 Hubei China State Key Laboratory of Software Engineering WuhanUniversity Wuhan 430072 Hubei China Department of Information Security Information EngineeringUniversity Zhengzhou 450004 Henan China
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu... 详细信息
来源: 评论
A pairwise key establishment scheme for heterogeneous sensor networks
A pairwise key establishment scheme for heterogeneous sensor...
收藏 引用
9th ACM International Symposium on Mobile Ad Hoc networking and Computing, MobiHoc'08 - 1st ACM International Workshop on Heterogeneous Sensor and Actor networks, HeterSanet 2008
作者: Liu, Zhihong Ma, Jianfeng Huang, Qiping Moon, SangJae Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Korea Republic of
Motivated by a key agreement scheme proposed by Leighton and Micali (LM-KDS), we present a key establishment mechanism for heterogeneous sensor networks which combines random key pre-distribution schemes and LM-KDS. U... 详细信息
来源: 评论
Efficient certificate-based signcryption scheme from bilinear pairings
收藏 引用
International Journal of computers and Applications 2008年 第2期30卷 129-133页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryptio... 详细信息
来源: 评论
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme
收藏 引用
Journal of computer Science & Technology 2008年 第2期23卷 265-269页
作者: 刘胜利 陈晓峰 张方国 Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Information SecurityInstitute of SoftwareChinese Academy of Sciences Beijing 100080China Department of Computer Science School of Information Science and TechnologySun Yat-Sen University Guangzhou 510275China Department of Electronics and Communication Engineering School of Information Science and Technology Sun Yat-Sen UniversityGuangzhou 510275China
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPB... 详细信息
来源: 评论
ID-based threshold proxy signcryption scheme from bilinear pairings
收藏 引用
International Journal of security and networks 2008年 第3期3卷 206-215页
作者: Li, Fagen Xin, Xiangjun Hu, Yupu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 Sichuan China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 Henan China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 Shaanxi China
A (t, n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, a new identit... 详细信息
来源: 评论
Universal provable security authentication protocol for multi-domain
收藏 引用
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and information Science of Wuhan University 2008年 第10期33卷 1051-1054页
作者: Zhu, Hui Li, Hui Yang, Jiaxi Wang, Yumin Key Laboratory of Computer Network and Information Security Xidian University 2 South Taibai Road Xi'an 710071 China
The problems of existing authentication frameworks are analyzed, and a universal authentication protocol is proposed for the multi-domain. Moreover, entity authentication for cross-domain is supported in the protocol.... 详细信息
来源: 评论
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2,WEN QiaoYan3 & ZHANG Xing4,5 1 College of computer Science and Technology,Beijing University of Technology,Beijing 100022,China 2 State key laboratory of information security (Graduate University of the Chinese Academy of Sciences),Beijing 100049,China 3 School of Science,Beijing University of Posts and Telecommunications,Beijing 100876,China 4 Institute of Electronic Technology,information engineering University,Zhengzhou 450004,China 5 Trusted Computing laboratory,Beijing University of Technology,Beijing 100022,China College of Computer Science and Technology Beijing University of Technology Beijing China State Key Laboratory of Information Security (Graduate University of the Chinese Academy of Sciences) Beijing China School of Science Beijing University of Posts and Telecommunications Beijing China Institute of Electronic Technology Information Engineering University Zhengzhou China Trusted Computing Laboratory Beijing University of Technology Beijing China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 评论