咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Lab of Computer Network and Information Security"
268 条 记 录,以下是221-230 订阅
排序:
A NEW THRESHOLD AUTHENTICATED ENCRYPTION SCHEME USING labOR-DIVISION SIGNATURE
收藏 引用
Journal of Systems Science & Complexity 2010年 第6期23卷 1183-1194页
作者: Zuowen TAN School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China.
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to messa... 详细信息
来源: 评论
An efficient automated trust negotiation framework supporting adaptive policies
An efficient automated trust negotiation framework supportin...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev... 详细信息
来源: 评论
Full rate and full diversity STBC in decode-and-forward relay systems
Full rate and full diversity STBC in decode-and-forward rela...
收藏 引用
2010 International Conference on Communications and Intelligence information security, ICCIIS 2010
作者: Wang, Yong Li, Hui Ministry of Education Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d... 详细信息
来源: 评论
Improving efficiency of security schemes in automated trust negotiation
Improving efficiency of security schemes in automated trust ...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu Ge, Feng College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab. of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When... 详细信息
来源: 评论
Formal description for trusted application environment
Formal description for trusted application environment
收藏 引用
International Conference on information Engineering and computer Science
作者: Gong, Lei Zhao, Yong Institute of Electronic Technology Information Engineering University Zhengzhou China Key Lab of Information Network Security Ministry of Public Security Shanghai China Institute of Computer Science Beijing University of Technology Beijing China
Application environment is the necessary condition for an application system running. If the application environment can be trusted, then the application system could run safely and reliably. This paper firstly analyz... 详细信息
来源: 评论
Research on high-speed network data stream capture based on multi-queue NIC and multi-core processor
Research on high-speed network data stream capture based on ...
收藏 引用
2010 2nd IEEE International Conference on information Management and Engineering, ICIME 2010
作者: Huang, Chungang Yu, Xiangzhan Luo, Hao Computer Network and Information Security Lab. Harbin Institute of Technology Harbin China Institute of Computing Technology Chinese Academy of Science Beijing China
The technique of high-speed network data stream capture has been a main topic of network research. This paper finds out some key technical problems that exist on high-speed network data stream capture and makes some i... 详细信息
来源: 评论
Behavior-based attack detection and reporting in wireless sensor networks
Behavior-based attack detection and reporting in wireless se...
收藏 引用
International Symposium on Electronic Commerce and security
作者: Yang, Liu Kai, Han School of Information Sciences and Engineering Henan University of Technology Zhengzhou China Zhengzhou Key Lab of Computer Network Security Assessment Zhongyuan University of Technology Zhengzhou China
Providing security for wireless sensor networks is challenging due to the resource limitations of sensor nodes. Leveraging the broadcast nature of wireless communication, we propose a behavior-based approach for attac... 详细信息
来源: 评论
Performance analysis of optimal antenna scheme in transmit diversity systems
Performance analysis of optimal antenna scheme in transmit d...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Wang, Yong Li, Hui Wang, Xiyuan Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China Science Research Department Xidian University Xi'an China
The performance of transmit antenna selection is investigated. The exact closed-form expressions for the average BER and average SNR in MRT systems and EGT systems are proposed. The minimum number of increased transmi... 详细信息
来源: 评论
The extended FDH sequences
The extended FDH sequences
收藏 引用
作者: Ma, WenPing He, YeFeng Sun, Shaohui Education Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China Datang Mobile Communications Equipment Co. Lid. China
A new construction method for polyphase sequences with two-valued periodic auto- and crosscorrelation functions is proposed. This method gives L families of polyphase sequences for each prime length L which is bigger ... 详细信息
来源: 评论
Research on Structured Storage and Index of Data Flow in Disaster Tolerance System
Research on Structured Storage and Index of Data Flow in Dis...
收藏 引用
2010 International Conference on computer,Mechatronics,Control and Electronic Engineering(2010计算机、机电、控制与电子工程国际会议 CMCE 2010)
作者: Fangyuan Hou Dong Li Xiangzhan Yu Computer Network and Information Security Lab Harbin Institute of Technology Harbin China
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is prop... 详细信息
来源: 评论