咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 109 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 265 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 189 篇 工学
    • 149 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 41 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 84 篇 理学
    • 54 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 43 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 8 篇 security
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 guangxi key lab ...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 guo shu

语言

  • 237 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=Lab of Computer Network and Information Security"
265 条 记 录,以下是201-210 订阅
排序:
RepHi: A novel attack against P2P reputation systems
RepHi: A novel attack against P2P reputation systems
收藏 引用
2011 IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2011
作者: Feng, Jingyu Zhang, Yuqing Chen, Shenglong Fu, Anmin Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China National Computer Network Intrusion Protection Center Graduate University Chinese Academy of Sciences Beijing 100049 China
Reputation systems are having increasing influence on guarding P2P networks. However, reputation systems themselves are vulnerable to attack. Due to the nature of aggregating ratings, the reputation scores of certain ... 详细信息
来源: 评论
A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
收藏 引用
China Communications 2011年 第2期8卷 26-33页
作者: 谭作文 School of Information Technology Jiangxi University of Finance and Economics Key Lab of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo... 详细信息
来源: 评论
A privilege separation method for security commercial transactions
A privilege separation method for security commercial transa...
收藏 引用
作者: Chen, Yasha Hu, Jun Gai, Xinmao Sun, Yu Department of Electrical and Information Engineering Naval University of Engineering Wuhan Hubei 430033 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China School of Computer Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... 详细信息
来源: 评论
Walsh spectrum of cryptographically concatenating functions and its applications in constructing resilient Boolean functions
收藏 引用
Journal of Computational information Systems 2011年 第4期7卷 1074-1081页
作者: Gao, Sheng Ma, Wenping Zhao, Yongbin Zhuo, Zepeng Key Lab. of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
Resilient Boolean functions have many applications in fault-tolerant distributed computing and quantum cryptographic key. Construction of this class functions with more cryptographic criteria such as high nonlinearity... 详细信息
来源: 评论
Unicode-proof code injection attack on Windows CE A novel approach of evading intrusion detection system for mobile network
Unicode-proof code injection attack on Windows CE A novel ap...
收藏 引用
IEEE International Conference on Communication Software and networks
作者: Song, Yang Zhang, Yuqing Sun, Yingfei Yan, Jingbo National Computer Network Intrusion Protection Center Graduate University Chinese Academy of Sciences Beijing China School of Information Science and Engineering Graduate University Chinese Academy of Sciences Beijing China Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xian China
Code injection attack is a major way of spreading malware on network. The key section of code injection attack is a small piece of code, called shellcode, which performs unauthorized operations when it is injected int... 详细信息
来源: 评论
Securing low-cost RFID systems: An unconditionally secure approach
Securing low-cost RFID systems: An unconditionally secure ap...
收藏 引用
作者: Alomair, Basel Lazos, Loukas Poovendran, Radha Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia Network Security Lab University of Washington Seattle WA United States Electrical and Computer Engineering Department University of Arizona Tucson AZ United States
In this paper, we explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authentication and random number ... 详细信息
来源: 评论
Low-cost authentication protocol of RFID system using One block Hash function
Low-cost authentication protocol of RFID system using One bl...
收藏 引用
International Conference on computer Sciences and Convergence information Technology (ICCIT)
作者: Shi-mei Jin Mo You Yong-zhen Li Network & Information Security Lab. Department of Computer Science and Technology Yanbian University Yanji Jilin China
RFID has been widely used in personal life. To the security problems of RFID, there are many different kinds of strategies and protocol, This article point out the disadvantages of these protocols, then come up with O... 详细信息
来源: 评论
Two Quantum Dialogue Schemes Based on Bell States and Two-Qutrit Entangled States Without information Leakage
Two Quantum Dialogue Schemes Based on Bell States and Two-Qu...
收藏 引用
中国密码学会2011年会
作者: He Wang Yu-Qing Zhang Yu-Pu Hu Yang-Li Tian Zhen-Chao Zhu Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University X National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University X
1 Introduction With the development of QSDC, the bidirectional QSDC protocol[8] was proposed in 2004, in which the two communicators can exchange their secret messages simultaneously, it is also called quantum ***, th...
来源: 评论
Design of bijective S-boxes satisfying the strict avalanche criterion
收藏 引用
Journal of Computational information Systems 2011年 第6期7卷 1967-1973页
作者: Gao, Sheng Ma, Wenping Shen, Dongsu School of Telecommunications Engineering Xidian University Xi'an 710071 China Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China
Much of the security of many block ciphers depends on the cryptographic properties of the substitution boxes (S-boxes). Although many design methods of S-boxes with desirable properties have been studied, there are fe... 详细信息
来源: 评论
On balanced semi-bent functions with high algebraic degrees
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and computer Sciences 2011年 第3期E94-A卷 1019-1022页
作者: YeFeng, H.E. WenPing, M.A. Ministry of Education Key Lab Computer Network and Information Security Xidian University Xi'an 710071 China School of Telecommunications and Information Engineering Xi'an Institute of Posts and Telecommunications Xi'an 710121 China
A class of balanced semi-bent functions with an even number of variables is proposed. It is shown that they include one subclass of semi-bent functions with maximum algebraic degrees. Furthermore, an example of semi-b... 详细信息
来源: 评论