咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 109 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 265 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 189 篇 工学
    • 149 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 41 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 84 篇 理学
    • 54 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 43 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 11 篇 cryptography
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 8 篇 security
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 guangxi key lab ...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 guo shu

语言

  • 237 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=Lab of Computer Network and Information Security"
265 条 记 录,以下是211-220 订阅
排序:
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST
收藏 引用
China Communications 2011年 第4期8卷 41-49页
作者: 王潮 张焕国 刘礼黎 Key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Computer School Wuhan University Huawei Technologies Co. Ltd
Elliptic curve cryptography is one of the most important public-key *** Koblitz Curve is a special kind of elliptic curve in ECC and its security mainly depends on the base *** on Evolutionary Cryptography theory,whic... 详细信息
来源: 评论
Chosen ciphertext secure broadcast encryption in the standard model
Chosen ciphertext secure broadcast encryption in the standar...
收藏 引用
International Conference on Electric information and Control Engineering
作者: Sun, Jin Hu, Yu-Pu Department of Application Mathematics Xi'An University of Technology Xi'an China Key Lab of Computer Network and Information Security Xidian University Xi'an China
In Eurocrypt'2005, Waters' identity-based encryption scheme suffers a drawback that the scheme only guarantees chosen plaintext security but chosen ciphertext security, and to give concurrent consideration bot... 详细信息
来源: 评论
The availability of fast-flux service networks
The availability of fast-flux service networks
收藏 引用
International Conference on Selected Topics in Mobile and Wireless networking (iCOST)
作者: Yunfeng Xu Yansheng Lu Zhengbiao Guo Hubei Province Public Security Bureau To Defend The Corps Cyber Security Key Lab of Information NetWork Security Ministry of Public Security China School of Computer Science and Technology Hua Zhong University of Science and Technology Wuhan China
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Comments on a threshold authenticated encryption scheme
收藏 引用
International Journal of computers and Applications 2011年 第2期33卷 132-136页
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentia... 详细信息
来源: 评论
Unicode-proof Code Injection Attack on Windows CE- A Novel Approach of Evading Intrusion Detection System for Mobile network
Unicode-proof Code Injection Attack on Windows CE- A Novel A...
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and networks(2011第三届通信软件与网络国际会议 ICCSN2011)
作者: Yang Song Yuqing Zhang Yingfei Sun JingBo Yan National Computer Network Intrusion Protection Center Graduate University of Chinese Academy of Scie School of Information Science and Engineering Graduate University of Chinese Academy of Sciences Bei Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xia
Code injection attack is a major way of spreading malware on network. The key section of code injection attack is a small piece of code, called shellcode, which performs unauthorized operations when it is injected... 详细信息
来源: 评论
Improvement on a password authentication scheme for multi-server environments
收藏 引用
Journal of Convergence information Technology 2011年 第1期6卷 218-228页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Since each user needs to have different passwords with different remote servers in the multi-server environment, it is impossible to apply the authentication methods in a single server environment to the multi-server ... 详细信息
来源: 评论
Cryptanalysis of two ID based password authentication schemes for multi-server environments
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第1期5卷 87-94页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, we show that Hsiang and Shih's scheme is still vulnerable to off-line pas... 详细信息
来源: 评论
A delay guaranteed and services differentiated MAC protocol based on location and reservation in near-space
收藏 引用
Journal of Convergence information Technology 2011年 第2期6卷 120-130页
作者: Chen, Chen Gao, Xinbo Pei, Qingqi National Key Lab. of Integrated Service Networks Xidian Univ Xi'an 710071 China School of Electronic Engineering Xidian Univ Xi'an 710071 China Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian Univ Xi'an 710071 China
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broa... 详细信息
来源: 评论
Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations
收藏 引用
Chinese Physics Letters 2010年 第6期27卷 13-15页
作者: ZHU Zhen-Chao ZHANG Yu-Qing Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 National Computer Network Intrusion Protection Center Graduate University Chinese Academy of Sciences Beijing 100049
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group c... 详细信息
来源: 评论