咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Lab of Computer Network and Information Security"
268 条 记 录,以下是261-270 订阅
排序:
Survival of the internet applications: A cluster recovery model
Survival of the internet applications: A cluster recovery mo...
收藏 引用
6th IEEE International Symposium on Cluster Computing and the Grid, 2006. CCGRID 06
作者: Aung, Khin Mi Mi Park, Kiejin Park, Jong Sou Network Security and System Design Lab. Computer Engineering Dept. Hankuk Aviation University Korea Republic of Division of Industrial and Information System Engineering Ajou University Korea Republic of Computer Engineering Dept. Hankuk Aviation University Korea Republic of
Internet applications become increasingly widely used for millions of people in the world and on the other hand the accidents or disruptions of service are also dramatically increasing. Accidents or Disruptions occur ... 详细信息
来源: 评论
Robust moving object segmentation in the compressed domain for H.264/AVC video stream
Robust moving object segmentation in the compressed domain f...
收藏 引用
25th PCS: Picture Coding Symposium 2006, PCS2006
作者: Yang, Gaobo Yu, Shengfa Zhang, Zhaoyang Network and Information Security Lab School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Electronic Science and Engineering National University of Defense Technology Changsha Hunan 410073 China Key Laboratory of Advanced Displays and System Application Shanghai University Ministry of Education Shanghai 200072 China
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employ... 详细信息
来源: 评论
Graphic-based theory proof of compliance algorithm
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第21期32卷 175-176页
作者: Rao, Yixuan Yang, Bo Key Lab. of Computer Network and Information Security Xi'an 710071 China
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delega... 详细信息
来源: 评论
Analysis of information Leakage in Quantum Key Agreement
收藏 引用
Journal of Shanghai Jiaotong University(Science) 2006年 第2期E-11卷 219-223页
作者: LIU Sheng-li ZHENG Dong CHENG Ke-fei Computer Science and Eng. Shanghai Jiaotong Univ.Shanghai 200030China Lab.of Computer Network and Information Security Xidian Univ.Xi'an Computer Science and Eng. Shanghai Jiaotong Univ.Shanghai 200030China
Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was prese... 详细信息
来源: 评论
Survivability analysis of a cluster system with 4th generation security mechanism: Regeneration
收藏 引用
International Journal of network security 2006年 第3期3卷 271-278页
作者: Aung, Khin Mi Mi Park, Kiejin Park, Jong Sou Network Security Lab. Computer Engineering Dept. Hankuk Aviation University 412-791 Seoul Korea Republic of Division of Industrial and Information System Engineering Ajou University 443-749 Suwon Korea Republic of
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failures and moreover we cannot prevent all... 详细信息
来源: 评论
New delegation of the decryption scheme for P2P data sharing
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2005年 第5期32卷 781-785页
作者: Zhao, Heng Quan, Yi-Ning Hu, Yu-Pu Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China
By applying the secret sharing system and the zero knowledge proof protocol, this paper presents a new time constraint delegation of the decryption scheme based on trust agent platforms, which solves the problem that ... 详细信息
来源: 评论
Efficient anonymous fingerprinting scheme based on the bilinear Diffie-Hellman intractability assumption
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2005年 第5期32卷 794-797页
作者: Wei, Ling-Bo Yang, Bo Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China
In the gap Diffie-Hellman group, based on the bilinear Diffie-Hellman intractable assumption and the security two-party computation protocol, a new efficient anonymous fingerprint scheme is proposed. This scheme is no... 详细信息
来源: 评论
Engineering Secure Future Internet Services and Systems  1
收藏 引用
丛书名: Lecture Notes in computer Science
1000年
作者: Maritta Heisel Wouter Joosen Javier Lopez Fabio Martinelli
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project resear... 详细信息
来源: 评论