咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 109 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 265 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 189 篇 工学
    • 149 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 41 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 84 篇 理学
    • 54 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 43 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 guangxi key lab ...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 guo shu

语言

  • 226 篇 英文
  • 28 篇 其他
  • 11 篇 中文
检索条件"机构=Lab of Computer Network and Information Security"
265 条 记 录,以下是241-250 订阅
排序:
Modelling and analyzing passive worms over unstructured peer-to-peer networks
收藏 引用
International Journal of network security 2010年 第1期11卷 39-45页
作者: Wang, Fangwei Zhang, Yunkai Ma, Jianfeng Network Center Hebei Normal University No.113 Yu Hua Rd Shijiazhuang 050016 China Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University No.2 Tai Bai Rd Xi'an 710071 China
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, offline and online rate is constructed based on the actual situation of P2P ... 详细信息
来源: 评论
On cross-correlation properties of Boolean functions
On cross-correlation properties of Boolean functions
收藏 引用
2009 4th International Conference on Communications and networking in China, CHINACOM 2009
作者: Zhou, Yu Xie, Min Xiao, Guozhen State Key Lab. Integrated Service Network Xidian University Shannxi Xi'an 710071 China Key Laboratory Computer Network and Information Security Xidian University Shannxi Xi'an 710071 China
To measure the correlation between two arbitrary Boolean functions, we propose the two new criteria called the sum-of-squares indicator and the absolute indicator of the cross-correlation. The two indicators generaliz... 详细信息
来源: 评论
security analysis of the kerberos protocol using BAN logic
Security analysis of the kerberos protocol using BAN logic
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Fan, Kai Li, Hui Wang, Yue Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
A new abuse-free fair electronic payment protocol
A new abuse-free fair electronic payment protocol
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt... 详细信息
来源: 评论
Study of secret sharing schemes based on quantum theory
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 127-132+139页
作者: Zhu, Zhen-Chao Zhang, Yu-Qing Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China National Computer Network Intrusion Protection Center GUCAS Beijing 100043 China
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quant... 详细信息
来源: 评论
An improved identity-based group signature scheme
An improved identity-based group signature scheme
收藏 引用
2009 International Conference on Computational Intelligence and security, CIS 2009
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 Jiangxi Province China Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ... 详细信息
来源: 评论
Approach to extracting hot topics based on network traffic content
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2009年 第1期4卷 20-23页
作者: Yadong ZHOU Xiaohong GUAN Qindong SUN Wei LI Jing TAO MOE Key Lab for Intelligent Networks and Network Security State Key Lab for Manufacturing SystemsXi’an Jiaotong UniversityXi’an 710049China Department of Automation Tsinghua National Lab for Information Science and TechnologyTsinghua UniversityBeijing 100084China School of Computer Science and Engineering Xi’an University of TechnologyXi’an 710048China
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correla... 详细信息
来源: 评论
A low-resource public-key identification scheme for RFID tags and sensor nodes  09
A low-resource public-key identification scheme for RFID tag...
收藏 引用
2nd ACM Conference on Wireless network security, WiSec'09
作者: Oren, Yossef Feldhofer, Martin Computer and Network Security Lab. School of Electrical Engineering Tel-Aviv University P.O. Box 39040 Tel-Aviv 69978 Israel Institute for Applied Information Processing and Communications Graz University of Technology Inffeldgasse 16a 8010 Graz Austria
We revisit a public key scheme presented by Shamir in [19] (and simultaneously by Naccache in [15]) and examine its applicability for general-purpose RFID tags in the supply chain. Using a combination of new and estab... 详细信息
来源: 评论
An active defense model and framework of insider threats detection and sense
An active defense model and framework of insider threats det...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Zhang, Hongbin Ma, Jianfeng Wang, Yinchuan Pei, Qingqi Ministry of Education Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China Inst. of Information Sci. and Eng. Hebei Univ. of Sci. and Tech. Shijiazhuang 050018 China Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing 100141 China
Insider attacks is a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who take advantage of familiarity with the computational environment and abuse their pri... 详细信息
来源: 评论
security Analysis of the Kerberos protocol using BAN logic
Security Analysis of the Kerberos protocol using BAN logic
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Hui Li Kai Fan Yue Wang Ministry of Edu.Key Lab.of Computer Network and Information Security Xidian University Xi'an Shaanxi Xi'an Branch of Shaanxi Telecom Ltd.Xi'an ShaanxiChina
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论