咨询与建议

限定检索结果

文献类型

  • 58 篇 会议
  • 17 篇 期刊文献

馆藏范围

  • 75 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42 篇 工学
    • 29 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 16 篇 信息与通信工程
    • 5 篇 光学工程
    • 4 篇 电气工程
    • 4 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 14 篇 理学
    • 10 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 大气科学
    • 1 篇 生物学
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 1 篇 医学

主题

  • 6 篇 bandwidth
  • 6 篇 authentication
  • 6 篇 cloud computing
  • 6 篇 computer network...
  • 5 篇 computer archite...
  • 5 篇 laboratories
  • 5 篇 humans
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 3 篇 public key crypt...
  • 3 篇 information anal...
  • 3 篇 proposals
  • 3 篇 application soft...
  • 3 篇 wdm networks
  • 3 篇 network topology
  • 3 篇 resource managem...
  • 3 篇 computer securit...
  • 3 篇 information secu...
  • 3 篇 multiprotocol la...
  • 3 篇 hardware

机构

  • 6 篇 jiangsu high tec...
  • 5 篇 nanjing universi...
  • 4 篇 ericsson researc...
  • 4 篇 state key labora...
  • 4 篇 beijing laborato...
  • 4 篇 beijing key labo...
  • 4 篇 school of scienc...
  • 3 篇 beijing universi...
  • 3 篇 laboratory of co...
  • 3 篇 nanjing universi...
  • 3 篇 state key labora...
  • 3 篇 beijing universi...
  • 3 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 beijing key labo...
  • 2 篇 university of sã...
  • 2 篇 institute of com...
  • 2 篇 department of ma...
  • 2 篇 laboratory of co...
  • 2 篇 the beijing key ...

作者

  • 11 篇 yang yang
  • 6 篇 guo caili
  • 6 篇 chen mingzhe
  • 5 篇 nelson mimura go...
  • 5 篇 huang haiping
  • 4 篇 zhu jie
  • 4 篇 chen chen
  • 4 篇 wang yan
  • 4 篇 tereza cristina ...
  • 4 篇 wilson vicente r...
  • 3 篇 davide careglio
  • 3 篇 ruggiero wilson ...
  • 3 篇 zhu zhiyu
  • 3 篇 caili guo
  • 3 篇 regina melo silv...
  • 3 篇 rosangela de fat...
  • 3 篇 ines brosso
  • 3 篇 walter akio goya
  • 3 篇 josep solé-paret...
  • 3 篇 hu yu-pu

语言

  • 70 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=Laboratory of Computer Architecture and Networks"
75 条 记 录,以下是51-60 订阅
排序:
Security analysis of projected C*- scheme
Security analysis of projected C*- scheme
收藏 引用
International Conference on Multimedia Information Networking and Security
作者: Yuan, Feng Hu, Yupu Wang, Yan Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China School of Science Xi'an University of Architecture and Technology Xi'an China
This paper investigates the security of the projected C*- cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weakne... 详细信息
来源: 评论
Implementation of data survival in unattended wireless sensor networks using cryptography
Implementation of data survival in unattended wireless senso...
收藏 引用
35th Annual IEEE Conference on Local computer networks, LCN 2010
作者: Mateus, A. S. Santos Margi, Cíntia Borges Simplício Jr., Marcos A. Geovandro, C. C. F. Pereira De Oliveira, Bruno Trevizan Laboratory of Computer Architecture and Networks Departamento de Engenharia Da Computação e Sistemas Digitais Escola Politécnica Da Universidade de São Paulo Brazil
Security in Wireless Sensor networks (WSNs) is highly dependent on the behavior of the base station. This happens because, if the network is left unattended, sensor nodes cannot offload data to the (secure) base stati... 详细信息
来源: 评论
Known User Continuous Authentication System
Known User Continuous Authentication System
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Ines Brosso Fernando Ferreira Graca Bressan Wilson V. Ruggiero College of Computation and Informatics Mackenzie Presbyterian University Sao Paulo Brazil Laboratory of Computer Architecture and Networks Polytechnic School of São Paulo University Brazil Laboratory of Computer Architecture and Networks Department of Computer and Digital System Engineering Polytechnic of São Paulo University Brazil
This work presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users in software application. The KUCAS system makes use o... 详细信息
来源: 评论
Security Analysis of Projected C*- Scheme
Security Analysis of Projected C*- Scheme
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Feng Yuan Yupu Hu Yan Wang Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China School of Science Xi'an University of Architecture and Technology Xi'an China
This paper investigates the security of the projected C* - cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weak... 详细信息
来源: 评论
Improving QoS of web service composition by dynamic configuration
收藏 引用
Information Technology Journal 2010年 第3期9卷 422-429页
作者: Yang, Huaizhou Li, Zengzhi Institute of Computer Architecture and Networks Xi'an Jiaotong University Xi'an 710049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In order to achieve self-adaptation to run-time environment and self-management of Web service composition, an extended hierarchical Petri net is presented to reflect the feasible configuration scheme of composite ser... 详细信息
来源: 评论
Known User Continuous Authentication System for Consumer Application Software
Known User Continuous Authentication System for Consumer App...
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Ines Brosso Graca Bressan Wilson V. Ruggiero College of Computation and Informatics Mackenzie Presbyterian University Sao Paulo Brazil Laboratory of Computer Architecture and Networks Department of Computer and Digital System Engineering Polytechnic of São Paulo University Brazil
This paper presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users/consumers. The KUCAS system makes use of environment... 详细信息
来源: 评论
Experimental investigation of multi-wavelength clock recovery based on a quantum-dot SOA at 40 Gb/s
Experimental investigation of multi-wavelength clock recover...
收藏 引用
Signal Processing in Photonic Communications, SPPCom 2010
作者: Spyropoulou, M. Bonk, R. Hillerkuss, D. Pleros, N. Vallaitis, T. Freude, W. Tomkos, I. Leuthold, J. Aristotle University of Thessaloniki Department of Informatics Computer Architecture and Communications Laboratory Thessaloniki 54142 Greece Institute of Photonics and Quantum Electronics Karlsruhe Institute of Technology Engesserstr. 5 76131 Karlsruhe Germany Athens Information Technology High speed networks and optical communications Markopoulou Av. 19002 Peania-Attica Greece
We study single and multi-wavelength clock recovery functionality based on a fabry-pérot filter followed by a quantum-dot SOA at 40 Gb/s and we demonstrate its performance for various pseudo-random binary sequenc... 详细信息
来源: 评论
A Continuous Authentication System Based on User Behavior Analysis
A Continuous Authentication System Based on User Behavior An...
收藏 引用
International Conference on Availability, Reliability and Security, ARES
作者: Ines Brosso Alessandro La Neve Graça Bressan Wilson Vicente Ruggiero College of Computation and Informatic Mackenzie Presbyterian University Sao Paulo SP Brazil Department of Electrical Engineering Centro Universitário da FEI Sao Paulo SP Brazil Laboratory of Computer Architecture and Networks Department of Computer and Digital System Engineering Polytechnic School of São Paulo University Brazil Laboratory of Computer Architecture and Networks Department of Computer and Digital System Engineering Polytechnic School of São Paulo University Brazil
This paper presents a continuous authentication system based on user behavior analysis that makes use of environmental context information, users' behavior analysis and Neuro-Fuzzy Logic. This system must be able ... 详细信息
来源: 评论
Improved meet-in-the-middle attacks on 7-round AES-192 and 8-round AES-256
收藏 引用
Tongxin Xuebao/Journal on Communications 2010年 第9 A期31卷 197-201页
作者: Dong, Xiao-Li Hu, Yu-Pu Chen, Jie Li, Shun-Bo Yang, Yang Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100049 China School of Science Xi'an University of Architecture and Technology Xi'an 710055 China
A new variant of 5-round distinguisher of meet-in-the-middle attack on AES was constructed by exploiting the properties of the round transform of AES. Based on the variant of distinguisher, meet-in-the-middle attacks ... 详细信息
来源: 评论
Set of model reduction rules and algorithms for web services composition under orchestration pattern
收藏 引用
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University 2009年 第6期43卷 20-23+47页
作者: Yang, Huaizhou Li, Zengzhi Institute of Computer Architecture and Networks Xi'an Jiaotong University Xi'an 710049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
The performance calculation of Web services composition process in large state space is time-consuming, and is difficult to fulfill the real-time performance analysis. Therefore, a process reduction algorithm is prese... 详细信息
来源: 评论