咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 109 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 265 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 189 篇 工学
    • 149 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 41 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 84 篇 理学
    • 54 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 43 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 11 篇 cryptography
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 8 篇 security
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 guangxi key lab ...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 guo shu

语言

  • 237 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=Lab of Computer Network and Information Security"
265 条 记 录,以下是181-190 订阅
排序:
Efficient (t, n) secret sharing scheme against cheating
收藏 引用
Journal of Computational information Systems 2012年 第9期8卷 3815-3821页
作者: Liu, Yanxiao Zhang, Yuqing Hu, Yupu Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University China National Computer Network Intrusion Protection Center GUCAS China
A (t, n) secret sharing (SS) scheme can be divided into two protocols: share generation protocol and secret reconstruction protocol. In share generation protocol, a mutually trusted dealer selects a secret and distrib... 详细信息
来源: 评论
Research on Separation of Three Powers Architecture for Trusted OS
收藏 引用
Physics Procedia 2012年 25卷 1168-1175页
作者: Yu Li Yong Zhao Siyuan Xin College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China Institute of Electronic Technology the PLA Information Engineering University
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control,... 详细信息
来源: 评论
Research on Separation of Three Powers Architecture for Trusted OS
Research on Separation of Three Powers Architecture for Trus...
收藏 引用
2012 International Conference on Solid State Devices and Materials Science(SSDMS 2012)
作者: Yu Li Yong Zhao Siyuan Xin College of Computer Science and Technology Beijing University of Technology Key Lab of Information Network Security Ministry of Public Security Institute of Electronic Technology the PLA Information Engineering University
The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, ... 详细信息
来源: 评论
Fully Secure Broadcast Encryption for Inner-Product Predicates
收藏 引用
Procedia Engineering 2012年 29卷 316-320页
作者: Sun Jin Hu Yu-pu Department of Application Mathematics in Xi’an University of Technology Xi’an 710048 China Key Lab of Computer Network and Information Security Xidian University Xi’an 710071 China
According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously, a fully secure broadcast encryption for inner-product ... 详细信息
来源: 评论
CCA-secure unidirectional proxy broadcast re-encryption in the standard model
收藏 引用
Journal of Computational information Systems 2012年 第14期8卷 5909-5916页
作者: Sun, Jin Hu, Yupu Department of Application Mathematics in Xi'an University of Technology Xi'an 710048 China Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China
Considering construct a chosen-ciphertext secure unidirectional PRE in the adaptive corruption model is still an important question and the broadcast encryption with wide applications in the real world, the first CCA-... 详细信息
来源: 评论
MOEA/D with iterative thresholding algorithm for sparse optimization problems
MOEA/D with iterative thresholding algorithm for sparse opti...
收藏 引用
12th International Conference on Parallel Problem Solving from Nature, PPSN 2012
作者: Li, Hui Su, Xiaolei Xu, Zongben Zhang, Qingfu Institute for Information and System Sciences Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi 710049 China School of Computer Science and Electronic Engineering University of Essex Wivenhoe Park Colchester CO4 3SQ United Kingdom
Currently, a majority of existing algorithms for sparse optimization problems are based on regularization framework. The main goal of these algorithms is to recover a sparse solution with k non-zero components(called ... 详细信息
来源: 评论
Privacy-preserving Path-Inclusion Protocol through Oblivious Automata
Privacy-preserving Path-Inclusion Protocol through Oblivious...
收藏 引用
2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment (IEEE 2012智能控制、自动检测与高端装备国际会议(ICADE 2012))
作者: Meishan Huang Bogang Lin Yang Yang College of Mathematics and Computer Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systerm Fuzhou University Fujian Province
This paper focuses on path-inclusion secure two-party computation problem,and an efficient protocol for securely computing the path-inclusion problem is *** problem is defined in the two parties setting,where Alice an... 详细信息
来源: 评论
The new multipoint relays selection in OLSR using particle swarm optimization
收藏 引用
Telkomnika 2012年 第2期10卷 343-352页
作者: Malik, Reza Firsandaya Rahman, Tharek Abdul Ngah, Razali Hashim, Siti Zaiton Mohd. Communication Network and Security Research Lab Faculty of Computer Science Universitas Sriwijaya Indonesia Wireless Communication Centre Faculty of Electrical Engineering Universiti Teknologi Malaysia Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia
The standard optimized link state routing (OLSR) introduces an interesting concept, the multipoint relays (MPRs), to mitigate message overhead during the flooding process. This paper propose a new algorithm for MPRs s... 详细信息
来源: 评论
State-of-the-art virtualization security in cloud computing
收藏 引用
Journal of information and Computational Science 2012年 第6期9卷 1487-1497页
作者: Qin, Zhongyuan Zhang, Qunfang Wan, Changsheng Di, Yuxing Information Science and Engineering School Southeast University Nanjing 210096 China Key Lab of Information Network Security Ministry of Public Security 201204 China Computer Department Nanjing Institute of Artillery Corps Nanjing 211132 China Communication Department Nanjing Institute of Artillery Corps Nanjing 211132 China
Cloud computing is an active and prosperous field of computer science, both academically and industrially. Meanwhile, security is one of major concerns that may prevent the wide acceptance of cloud computing. In parti... 详细信息
来源: 评论
Malware Detection in Smartphone Using Hidden Markov Model
Malware Detection in Smartphone Using Hidden Markov Model
收藏 引用
International Conference on Multimedia information networking and security (MINES)
作者: Kejun Xin Gang Li Zhongyuan Qin Qunfang Zhang Nanjing Sample Technology Co. Ltd. Nanjing Jiangsu China Ministry of Public Security Key Lab of Information Network Security Shanghai China Computer Department Nanjing Institute of Artillery Corps Nanjing Jiangsu China
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection sch... 详细信息
来源: 评论