咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Network Information and Computer Security Lab"
268 条 记 录,以下是171-180 订阅
排序:
Efficient General Policy Decision by Using Mutable Variable Aware Cache
Efficient General Policy Decision by Using Mutable Variable ...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Liangxing Liu Weili Han Elisa Bertino Tao Zhou Xinyi Zhang Software School Fudan University Shanghai China Ministry of Public Security Key Lab of Information Network Security Shanghai China Department of Computer Science Purdue University West Lafayette USA
Performance is a key issue in the implementation of tools for policy-based management of large and complex networked systems. When a system is characterized by millions of policies, the policy decision point is usuall... 详细信息
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on security and Privacy in Communication networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
Hybrid relaying and jamming for secure two-way relay networks with passive eavesdroppers
Hybrid relaying and jamming for secure two-way relay network...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Hui-Ming Wang Xiang-Gen Xia Qinye Yin Pengcheng Mu School of Electronic and Information Engineering Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi P. R. China Department of Electrical and Computer Engineering Chonbuk National University Jeonju DE Korea
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid coop... 详细信息
来源: 评论
Microblog bursty feature detection based on dynamics model
Microblog bursty feature detection based on dynamics model
收藏 引用
2012 International Conference on Systems and Informatics, ICSAI 2012
作者: Du, Yanyan Wu, Wei He, Yanxiang Liu, Nan School of Computer Wuhan University Wuhan China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China
Microblog is becoming more and more popular in our life. Due to the numerous information on this platform, it is very useful to detect bursty topic in real-time to help people get essential information quickly. As a n... 详细信息
来源: 评论
Robust evidence detection of copy-rotate-move forgery in image based on singular value decomposition
Robust evidence detection of copy-rotate-move forgery in ima...
收藏 引用
14th International Conference on information and Communications security, ICICS 2012
作者: Yong, Liu Meishan, Huang Bogang, Lin College of Mathematics and Computer Science Fuzhou University Fuzhou 350108 China Key Lab. of Information Security of Network Systems Fuzhou 350108 China
Region Copy-Move forgery, in which a part of the image is copied and then pasted to another part of the same image. Some important goals and sensitive objects can be hidden imperceptibly;this forgery is at the rather ... 详细信息
来源: 评论
The Double-System Architecture for Trusted OS
收藏 引用
Physics Procedia 2012年 25卷 2006-2013页
作者: Yong Zhao Yu Li Jing Zhan College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. H... 详细信息
来源: 评论
The Double-System Architecture for Trusted OS
The Double-System Architecture for Trusted OS
收藏 引用
2012 International Conference on Solid State Devices and Materials Science(SSDMS 2012)
作者: Yong Zhao Yu Li Jing Zhan College of Computer Science and Technology Beijing University of Technology Key Lab of Information Network Security Ministry of Public Security
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. Ho... 详细信息
来源: 评论
Secure Authentication Protocol of RFID System Based on Access Control
Secure Authentication Protocol of RFID System Based on Acces...
收藏 引用
2012 3rd International Conference on information Technology for Manufacturing Systems(ITMS 2012)
作者: Gui-Chao Wang Ai-Li Zhang Yong-Zhen Li Network & information Security Lab. Dept.of Computer Science & Technology Yanbian University
The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access,... 详细信息
来源: 评论
Efficient (t, n) secret sharing scheme against cheating
收藏 引用
Journal of Computational information Systems 2012年 第9期8卷 3815-3821页
作者: Liu, Yanxiao Zhang, Yuqing Hu, Yupu Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University China National Computer Network Intrusion Protection Center GUCAS China
A (t, n) secret sharing (SS) scheme can be divided into two protocols: share generation protocol and secret reconstruction protocol. In share generation protocol, a mutually trusted dealer selects a secret and distrib... 详细信息
来源: 评论
Research on Separation of Three Powers Architecture for Trusted OS
收藏 引用
Physics Procedia 2012年 25卷 1168-1175页
作者: Yu Li Yong Zhao Siyuan Xin College of Computer Science and Technology Beijing University of Technology Beijing 100124 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China Institute of Electronic Technology the PLA Information Engineering University
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control,... 详细信息
来源: 评论