咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Lab of Computer Network and Information Security"
268 条 记 录,以下是151-160 订阅
排序:
One forward-secure signature scheme using bilinear maps and its applications
One forward-secure signature scheme using bilinear maps and ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Li, Guowen College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China Key Lab of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China School of Computer Science and Technology Shandong Jianzhu University 250100 Jinan China
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ... 详细信息
来源: 评论
Novel way to research nonlinear feedback shift register
收藏 引用
Science China(information Sciences) 2014年 第9期57卷 161-174页
作者: ZHAO DaWei PENG HaiPeng LI LiXiang HUI SiLi YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Zhejiang Provincial Key Lab of Data Storage and Transmission Technology Hangzhou Dianzi University National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an... 详细信息
来源: 评论
Android malware detection based on permission and behavior analysis
Android malware detection based on permission and behavior a...
收藏 引用
International Conference on Cyberspace Technology, CCT 2014
作者: Qin, Zhongyuan Xu, Yuqing Di, Yuxing Zhang, Qunfang Huang, Jie School of Information Science and Engineering Southeast University Nanjing Jiangsu China Key Lab of Information Network Security Ministry of Public Security Shanghai China Communication Department Nanjing Institute of Artillery Corps Nanjing Jiangsu China Computer Department Nanjing Institute of Artillery Corps Nanjing Jiangsu China
The development of mobile Internet and application store accelerates the spread of malicious applications on smartphones, especially on Android platform. In this paper, we propose an integrated Android malware detecti... 详细信息
来源: 评论
A Provably secure Certificate based ring signature without pairing
收藏 引用
International Journal of network security 2014年 第4期16卷 278-285页
作者: Qin, Zhiguang Xiong, Hu Li, Fagen School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 North Jianshe Road Chenghua District chengdu Sichuan 610054 China Key Lab of Network Security and Cryptology Fujian Normal University No. 8 Shangsan Road Cangshan District Fuzhou Fujian 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences No. 19 Yuquan Road Shijingshan District Beijing 100190 China
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially f... 详细信息
来源: 评论
A Robust Message Confidentiality Scheme with Privacy-preserving for Resource-Constrained DTNs
A Robust Message Confidentiality Scheme with Privacy-preserv...
收藏 引用
中国密码学会2014年密码算法学术会议
作者: Li Chao Zhang Yuqing Liu Xuefeng The author is with the Key Lab of Computer Networks and Information Security of Ministry of Educatio The author is with the National Computer Network Intrusion Protection Center GUCAS Beijing 100049
Delay Tolerate networks (DTNs) are highly partitioned networks and suffer from frequent disconnections,which differs significantly from traditional wireless ***,long delays and frequent end-to-end disconnections make ... 详细信息
来源: 评论
Android malware detection based on permission and behavior analysis
Android malware detection based on permission and behavior a...
收藏 引用
International Conference on Cyberspace Technology (CCT 2014)
作者: Zhongyuan Qin Yuqing Xu Yuxing Di Qunfang Zhang Jie Huang Key Lab of Information Network Security Ministry of Public Security Shanghai China School of Information Science and Engineering Southeast University Nanjing Jiangsu China Communication Department Nanjing Institute of Artillery Corps Jiangsu China Computer Department Nanjing Institute of Artillery Corps Jiangsu China
The development of mobile Internet and application store accelerates the spread of malicious applications on smartphones, especially on Android platform. In this paper, we propose an integrated Android malware detecti... 详细信息
来源: 评论
A Memory-Based Continuous Query Index for Stream Processing
A Memory-Based Continuous Query Index for Stream Processing
收藏 引用
IEEE International Conference on Services Economics (SE)
作者: Cuiwen Xiong Peng Zhang Yan Li Shipeng Zhang Qingyun Liu Jianlong Tan Institute of Information Engineering University of Chinese Academy of Sciences Beijing China Nat. Eng. Lab. for Inf. Security Technol. Beijing Beijing China Nat. Eng. Lab. for Inf. Security Technol China National Computer network Emergency Response technical Team National Engineering Laboratory for Information Security Technologies Beijing China
Most of the "Big Data" applications, such as decision support and emergency response, must provide users with fresh, low latency results, especially for aggregation results on key performance metrics. Howeve... 详细信息
来源: 评论
RLWE-based homomorphic encryption and private information retrieval
RLWE-based homomorphic encryption and private information re...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Zhang, Wei Liu, Shuguang Xiaoyuan, Yang Key Lab of Computer Network and Information Security under CAPF Xian China
A multi-bit somewhat homomorphic encryption scheme based on Learning With Errors over Rings (RLWE) assumption is provided, which use canonical embedding to transform elements over a ring into vectors, thus the operati... 详细信息
来源: 评论
Building trust and reputation in: A development framework for trust models implementation
收藏 引用
8th International Workshop on security and Trust Management, STM 2012
作者: Moyano, Francisco Fernandez-Gago, Carmen Lopez, Javier Network Information and Computer Security Lab University of Malaga 29071 Malaga Spain
During the last years, many trust and reputation models have been proposed, each one targeting different contexts and purposes, and with their own particularities. While most contributions focus on defining ever-incre... 详细信息
来源: 评论
A P2P Reputation Model Based on P2P File-Sharing Behavioral Characteristics
A P2P Reputation Model Based on P2P File-Sharing Behavioral ...
收藏 引用
International Conference on Trustworthy Computing and Services, ISCTCS 2012
作者: Xin, Chao Han, Hui-jun Lin, Xiu-qin Wei, Geng-yu Lab of Computer Network and Information Security BUPT Beijing China Ministry of Education Beijing China
In recent years, P2P networks have become a focus in the industry. The P2P network is open and anonymous, providing the opportunity for false documents, malicious attacks and other malicious acts, so its trust and sec... 详细信息
来源: 评论