咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 109 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 265 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 189 篇 工学
    • 149 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 41 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 84 篇 理学
    • 54 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 43 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 11 篇 cryptography
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 8 篇 security
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 guangxi key lab ...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 guo shu

语言

  • 237 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=Network Information and Computer Security Lab"
265 条 记 录,以下是191-200 订阅
排序:
Trust & security RTD in the internet of things - Opportunities for international cooperation  12
Trust & security RTD in the internet of things - Opportuniti...
收藏 引用
1st International Conference on security of Internet of Things, SecurIT 2012
作者: Clarke, James Sharma, Abhishek Suri, Neeraj Castro, Rodrigo Roman Lopez, Javier TSSG Group Waterford Institute of Technology Carriganore Co. Waterford Ireland Beyond Evolution TechSolutions Pvt. Ltd. Gurgaon New Delhi India Technische Universitaet Darmstadt Karolinenplatz 5 Darmstadt 64289 Germany Institute for Infocomm Research 1 Fusionopolis Way 21-01 Connexis Singapore Information and Computer Security Lab NICS Network University of Malaga Malaga Spain
While there has been considerable progress in the research and technological development ( RTD) of the Internet of Things (IoT), there is still considerable RTD required by international communities for the trust, pri... 详细信息
来源: 评论
Efficient quantum secret sharing scheme with two-particle entangled states
收藏 引用
Chinese Physics B 2011年 第4期20卷 59-64页
作者: 朱珍超 张玉清 付安民 Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University National Computer Network Intrusion Protection Center Graduate University of the Chinese Academy of Sciences
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ... 详细信息
来源: 评论
Privacy-Preserving Multi-set Operations
Privacy-Preserving Multi-set Operations
收藏 引用
2012 IEEE 14th International Conference on Communication Technology
作者: Meishan Huang Bogang Lin College of Mathematics and Computer Science Fuzhou University Key Lab of Information Security of Network System Fuzhou University
We consider several multiset operations in secure two- party setting where Alice and Bob each have a multiset and they want to perform some private computations over the two multisets without revealing and private inf... 详细信息
来源: 评论
Agent Modeling of User Preferences Based on Fuzzy Classified ANNs in Automated Negotiation
收藏 引用
Journal of Donghua University(English Edition) 2011年 第1期28卷 45-48页
作者: 顾铁军 汤兵勇 马溪骏 李毅 Glorious Sun School of Business and Management Donghua University Institute of Computer Network System Hefei University of Technology Information Security System Testing Lab The Third Research Institute of Ministry of Public Security
In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user req... 详细信息
来源: 评论
The availability of fast-flux service networks
The availability of fast-flux service networks
收藏 引用
2011 International Conference on Selected Topics in Mobile and Wireless networking, iCOST 2011
作者: Xu, Yunfeng Lu, Yansheng Guo, Zhengbiao School of Computer Science and Technology Hua Zhong University of Science and Technology Wuhan China Hubei Province Public Security Bureau to Defend the Corps Cyber Security Key Lab of Information NetWork Security Ministry of Public Security China
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov... 详细信息
来源: 评论
security issues and solutions of the key management protocols in IEEE 802.16j multi-hop relay network*
Security issues and solutions of the key management protocol...
收藏 引用
作者: Fu, Anmin Zhang, Yuqing Feng, Jingyu Key Lab of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China
The recent IEEE 802.16j-2009 adds multi-hop relay capabilities to IEEE 802.16 systems, which aims to offer improved coverage and capacity over single-hop radio access systems. In this paper, we point out several secur... 详细信息
来源: 评论
Research on the application security isolation model
Research on the application security isolation model
收藏 引用
作者: Gong, Lei Zhao, Yong Liao, Jianhua Institute of Electronic Technology Information Engineering University Zhengzhou China Key Lab of Information Network Security Ministry of Public Security Shanghai China Institute of Computer Science Beijing University of Technology Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China
With the rapid development of information technology, the secrutiy problems of information systems are being paid more and more attention, so the Chinese government is carrying out information security classified prot... 详细信息
来源: 评论
Abuse-freeness electronic payment protocol
Abuse-freeness electronic payment protocol
收藏 引用
3rd IEEE International Conference on Intelligent networking and CollaborativeSystems, INCoS 2011
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an China Xi'an Branch Shaanxi Telecom Ltd. Xi'an China
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ... 详细信息
来源: 评论
Forward secure proxy blind signature scheme
Forward secure proxy blind signature scheme
收藏 引用
3rd IEEE International Conference on Intelligent networking and CollaborativeSystems, INCoS 2011
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an China Xi'an Branch Shaanxi Telecom Ltd. Xi'an China
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop... 详细信息
来源: 评论
On international business intelligence Out-Of-Vocabulary processing based on sentence-aligned web corpus
On international business intelligence Out-Of-Vocabulary pro...
收藏 引用
International Conference on Business Management and Electronic information (BMEI)
作者: He, Yanxiang Tian, Ye Lin, Lu Du, Yanyan Deng, Jie Computer School Wuhan University Wuhan 430072 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China School of Education State University of New York Binghamton NY 13901 United States
International business intelligence processing is an important problem of cross-disciplinary research in artificial intelligence. The recognition of Out-Of-Vocabulary (OOV in short) in international commercial activit... 详细信息
来源: 评论