咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 109 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 265 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 189 篇 工学
    • 149 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 41 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 84 篇 理学
    • 54 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 43 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 11 篇 cryptography
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 8 篇 security
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 guangxi key lab ...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 guo shu

语言

  • 237 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=Lab of Computer Network and Information Security"
265 条 记 录,以下是251-260 订阅
排序:
A New Abuse-Free Fair Electronic Payment Protocol
A New Abuse-Free Fair Electronic Payment Protocol
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Kai Fan Hui Li Yue Wang Ministry of Edu.Key Lab.of Computer Network and Information Security Xidian University Xi'an Shaanxi Xi'an Branch of Shaanxi Telecom Ltd.Xi'an ShaanxiChina
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks'protocol and furth... 详细信息
来源: 评论
A link analysis for passive UHF RFID system in LOS indoor environment
A link analysis for passive UHF RFID system in LOS indoor en...
收藏 引用
2008 International Conference on Wireless Communications, networking and Mobile Computing, WiCOM 2008
作者: Hong, Gang Wang Chang, Xing Petitioner Chang, Hua Zhu Ministry of Education Key Lab. Computer Network and Information Security Xidian University Xi'an China
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an... 详细信息
来源: 评论
Attack-tolerant node localization in wireless sensor networks
收藏 引用
Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of Technology 2008年 第7期30卷 111-115页
作者: Ye, A-Yong Ma, Jian-Feng Key Lab. of the Ministry of Education for Computer Networks and Information Security Xidian University Xi'an 710071 China Key Lab. of the Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
It is essential to ensure that sensors can determine their location for wireless sensor networks. However, most of existing location discovery protocols became vulnerable in the presence of malicious attacks. So the a... 详细信息
来源: 评论
Linear programming models for jamming attacks on network traffic flows
Linear programming models for jamming attacks on network tra...
收藏 引用
International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless networks (WiOpt)
作者: Patrick Tague David Slater Radha Poovendran Guevara Noubir Network Security Lab (NSL) Department of Electrical Engineering University of Washington Seattle WA USA College of Computer and Information Science Northeastern University Boston MA USA
We present a new class of network attacks, referred to as flow-jamming attacks , in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming... 详细信息
来源: 评论
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement
A Fine-Grained Digital Rights Transfer Policy and Trusted Di...
收藏 引用
International Conference on Computational Intelligence and security
作者: Zhiyong Zhang Qingqi Pei Jianfeng Ma Lin Yang Kefeng Fan Key Lab of Computer Network & Information Security (Ministry of Education) Xidian University Xi'an Shaanxi China Electron. Inf. Engineering Coll. Henan University of Science and Technology Luoyang Henan China Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing China China Electronics Standardization Institute Beijing China
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights p... 详细信息
来源: 评论
Study of distinguishing attack on a new type nonlinear filter generator
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 151-154页
作者: Wu, Li-Hua Li, Yuan Hu, Yu-Pu Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China
Based on the theory of hypothesis testing the security of a new type nonlinear filter generator was studied, which consists of non-linear source, linear feedback shift register and filter Boolean functions. The result... 详细信息
来源: 评论
Survivable storage networks and Quorum system
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 121-124页
作者: Zhang, Wei Ma, Jian-Feng Liu, Shu-Guang Wang, Chao Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China Engineering Institute of the Armed Police Xi'an 710086 China
A survivable storage architecture was provided based on an overall study of storage service survivability. It contains storage nodes, users, access control system, reliability analysis module, intrusion and fault dete... 详细信息
来源: 评论
A minimum motion vector span criteria based error concealment algorithm for entire frame losses in H.264
A minimum motion vector span criteria based error concealmen...
收藏 引用
25th PCS: Picture Coding Symposium 2006, PCS2006
作者: Liu, Li Yang, Gaobo Sun, Tao Network and Information Security Lab. School of Computer and Communication Hunan University Changsha Hunan 410082 China
In low bit-rate video communication, a coded picture may fit the payload size of one IP packet, especially for the latest video coding standard H.264. Thus, the loss of a packet may result in the loss of a whole video... 详细信息
来源: 评论
Analysis of information Leakage in Quantum Key Agreement
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2006年 第2期11卷 219-223页
作者: 刘胜利 郑东 陈克非 Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 ChinaLab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China
Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presente... 详细信息
来源: 评论
Survival of the internet applications: A cluster recovery model
Survival of the internet applications: A cluster recovery mo...
收藏 引用
6th IEEE International Symposium on Cluster Computing and the Grid, 2006. CCGRID 06
作者: Aung, Khin Mi Mi Park, Kiejin Park, Jong Sou Network Security and System Design Lab. Computer Engineering Dept. Hankuk Aviation University Korea Republic of Division of Industrial and Information System Engineering Ajou University Korea Republic of Computer Engineering Dept. Hankuk Aviation University Korea Republic of
Internet applications become increasingly widely used for millions of people in the world and on the other hand the accidents or disruptions of service are also dramatically increasing. Accidents or Disruptions occur ... 详细信息
来源: 评论