咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Network Information and Computer Security Lab"
268 条 记 录,以下是161-170 订阅
排序:
XA P2P Reputation Model Based on P2P File-Sharing Behavioral Characteristics
XA P2P Reputation Model Based on P2P File-Sharing Behavioral...
收藏 引用
作者: Xin, Chao Han, Hui-jun Lin, Xiu-qin Wei, Geng-yu Lab of Computer Network and Information Security BUPT Beijing China Ministry of Education Beijing China
In recent years, P2P networks have become a focus in the industry. The P2P network is open and anonymous, providing the opportunity for false documents, malicious attacks and other malicious acts, so its trust and sec... 详细信息
来源: 评论
Privacy-preserving point-inclusion two-party computation protocol
Privacy-preserving point-inclusion two-party computation pro...
收藏 引用
2013 5th International Conference on Computational and information Sciences, ICCIS 2013
作者: Chen, Li Lin, Bogang College of Mathematics and Computer Science Fuzhou University Key Lab of Information Security of Network System Fujian Province Fuzhou China
Privacy Preserving Computational Geometry (PPCG) is a new study field of Secure Multi-party Computation(SMC), its main contents include: Point Inclusion problem, Polygon Intersection problem, Closest Pair problem, Con... 详细信息
来源: 评论
Detecting GPS information leakage in Android applications
Detecting GPS information leakage in Android applications
收藏 引用
2013 IEEE Global Communications Conference, GLOBECOM 2013
作者: Ma, Siyuan Tang, Zhushou Xiao, Qiuyu Liu, Jiafa Duong, Tran Triet Lin, Xiaodong Zhu, Haojin Department of Computer Science and Engineering Shanghai Jiao Tong University China University of Ontario Institute of Technology Canada Key Lab of Information Network Security Ministry of Public Security China
Location Based Service(LBS) becomes very popular in mobile computing platforms, such as Android. However, it could also leak highly personal information about the phone owner if used by Malwares. It has been witnessed... 详细信息
来源: 评论
International School on Foundations of security Analysis and Design
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8604卷 V-VI页
作者: Aldini, Alessandro Lopez, Javier Martinelli, Fabio University of Urbino "Carlo Bo" Dipartimento di Scienze di Base e Fondamenti Piazza della Repubblica 13 Urbino61029 Italy University of Malaga Department of Computer Science Network Information and Computer Security Lab Campus de Teatinos s/n Malaga29071 Spain National Research Council - CNR Istituto di Informatica e Telematica - IIT Via G. Moruzzi 1 Pisa56124 Italy
来源: 评论
The Web security Password Authentication based the Single-block Hash Function
收藏 引用
IERI Procedia 2013年 4卷 2-7页
作者: Shi-Qi Wang Jing-Ya Wang Yong-Zhen Li Network & information Security Lab. Department of Computer Science & Technology Yanbian University Yanji China
I The paper puts forward the Web security password authentication scheme based on the single-block hash function. The scheme can solve the problem effectively that exists in the traditional password authentication or ... 详细信息
来源: 评论
Fuzzy keyword search over encrypted data in the public key setting
Fuzzy keyword search over encrypted data in the public key s...
收藏 引用
14th International Conference on Web-Age information Management, WAIM 2013
作者: Dong, Qiuxiang Guan, Zhi Wu, Liang Chen, Zhong Institute of Software School of EECS Peking University China MoE Key Lab of High Confidence Software Technologies PKU China MoE Key Lab of Network and Software Security Assurance PKU China Computer Network Information Center Chinese Academy of Sciences China
Searchable encryption is used to support searches over encrypted data stored on cloud servers. Traditional searchable encryption only supports exact keyword search instead of more flexible fuzzy keyword search. To sol... 详细信息
来源: 评论
The Web security Password Authentication based the SingleBlock Hash Function
The Web Security Password Authentication based the SingleBlo...
收藏 引用
2013 International Conference on Electronic Engineering and computer Science(EECS 2013)
作者: Shi-Qi Wang Jing-Ya Wang Yong-Zhen Li Network & information Security Lab. Dept.of Computer Science & Technology Yanbian University
I The paper puts forward the Web security password authentication scheme based on the single-block hash function. The scheme can solve the problem effectively that exists in the traditional password authentication or ... 详细信息
来源: 评论
Towards trust-aware and self-adaptive systems  7th
Towards trust-aware and self-adaptive systems
收藏 引用
7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013
作者: Moyano, Francisco Baudry, Benoit Lopez, Javier Network Information and Computer Security Lab University of Malaga Malaga29071 Spain INRIA Rennes Bretagne-Atlantique Campus de Beaulieu Rennes35042 France Certus Software V&V Center SIMULA RESEARCH LAB Lysaker Norway
The Future Internet (FI) comprises scenarios where many heterogeneous and dynamic entities must interact to provide services (e.g., sensors, mobile devices and information systems in smart city scenarios). The dynamic... 详细信息
来源: 评论
Detecting Insider Threats: A Trust-Aware Framework
Detecting Insider Threats: A Trust-Aware Framework
收藏 引用
International Conference on Availability, Reliability and security, ARES
作者: Federica Paci Carmen Fernandez-Gago Francisco Moyano Department of Information Engineering and Computer Science University of Trento Italy Network Information and Computer Security (NICS) Lab University of Malaga Spain
The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider threats occur when trusted employees misuse their permissions on organizational assets. Since insider threats know th... 详细信息
来源: 评论
A Metamodel for Measuring Accountability Attributes in the Cloud
A Metamodel for Measuring Accountability Attributes in the C...
收藏 引用
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: David Nuñez Carmen Fernandez-Gago Siani Pearson Massimo Felici Network Information and Computer Security Laboratory Universidad de Málaga Málaga Spain Security and Cloud Lab Hewlett-Packard Laboratories Bristol United Kingdom
Cloud governance, and in particular data governance in the cloud, relies on different technical and organizational practices and procedures, such as policy enforcement, risk management, incident management and remedia... 详细信息
来源: 评论