咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是811-820 订阅
排序:
An optimized strategy for data service response with template-based caching and compression
An optimized strategy for data service response with templat...
收藏 引用
2013 International Conference on Service-Oriented Computing,ICSOC 2013
作者: Peng, Zhang Kefu, Xu Yan, Li Li, Guo Institute of Information Engineering Chinese Academy of Sciences Beijing China National Engineering Laboratory for Information Security Technologies Beijing China National Computer Network Emergency Response Technical Team Beijing China
Data service is a specialization of Web service, and end-users can synthesize cross-organizational data by composing data services. As composite schemes overlap each other, some primitive data services could be called... 详细信息
来源: 评论
A novel proxy re-encryption with keyword search  3
A novel proxy re-encryption with keyword search
收藏 引用
3rd International Conference on Information Technology and Management Innovation, ICITMI 2014
作者: Meng, Xian Yong Chen, Zhong Meng, Xiang Yu Zhuhai College of Jilin University Zhuhai China School of Electronics Engineering and Computer Science Peking University Beijing China Key Laboratory of Network and Software Security Assurance Ministry of Education Beijing China
In this paper, a novel proxy re-encryption (PRE) scheme with keyword search is proposed, where only the ciphertext containing the keyword set by the delegator can be transformed by the semi-trusted proxy and then decr... 详细信息
来源: 评论
One forward-secure signature scheme using bilinear maps and its applications
One forward-secure signature scheme using bilinear maps and ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Li, Guowen College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China Key Lab of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China School of Computer Science and Technology Shandong Jianzhu University 250100 Jinan China
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ... 详细信息
来源: 评论
security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model"
Security analysis on "Strongly secure certificateless key-in...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing
作者: Feng Wang Li Xu Jeng-Shyang Pan College of Mathematics and Physics Fujian University of Technology Fuzhou Fujian 350118 China Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian 350117 Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian 350117 China College of Information Science and Engineering Fujian University of Technology Fuzhou Fujian 350118China
Certificateless signature eliminates the need of certificates in traditional public key signature and solves the inherent key escrow problem in identity-based signature. Therefore, it is an important secure requiremen... 详细信息
来源: 评论
A Provably secure Certificate based ring signature without pairing
收藏 引用
International Journal of network security 2014年 第4期16卷 278-285页
作者: Qin, Zhiguang Xiong, Hu Li, Fagen School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 North Jianshe Road Chenghua District chengdu Sichuan 610054 China Key Lab of Network Security and Cryptology Fujian Normal University No. 8 Shangsan Road Cangshan District Fuzhou Fujian 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences No. 19 Yuquan Road Shijingshan District Beijing 100190 China
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially f... 详细信息
来源: 评论
An identity-based conditional proxy re-encryption in cloud computing environments
An identity-based conditional proxy re-encryption in cloud c...
收藏 引用
作者: Meng, Xian Yong Chen, Zhong Meng, Xiang Yu Sun, Bing Zhuhai College of Jilin University Zhuhai China School of Electronics Engineering and Computer Science Peking University Beijing China Key Laboratory of Network and Software Security Assurance Ministry of Education Beijing China Information Institute Guangdong Ocean University Zhanjiang China
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a delegator provides a re-encryption key satisfying one condition to a semi-trusted proxy who can convert a ciphertext e... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
Energy saving model and simulation test based on 6LoWPAN wireless sensor network
收藏 引用
Open Automation and Control Systems Journal 2014年 第1期6卷 1349-1358页
作者: Zhang, Yunyi Li, Yong Zhang, Ran Wei, Wei College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
This paper designs the mathematical model of fiber line power, optimization of wireless sensor network node and multi distributed IP, and uses C language to program the model, finally get a new energy-saving mechanism... 详细信息
来源: 评论
Mining Mobile Internet Packets for Malware Detection
Mining Mobile Internet Packets for Malware Detection
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
作者: Haifeng Jin Baojiang Cui Jianxin Wang School of Computer Science Beijing National Engineering Laboratory for Mobile Network Security School of Information Science and Technology Beijing Forestry University
With the fast development of mobile devices, the volume of mobile internet traffic increased dramatically. Various information is potential to be mined from it. In this paper, the large-scale mobile internet traffic i... 详细信息
来源: 评论
Parallelization Using Task Parallel Library with Task-Based Programming Model
Parallelization Using Task Parallel Library with Task-Based ...
收藏 引用
2014 IEEE 5th International Conference on Software engineering and Service Science
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In order to reduce the complexity of traditional multithreaded parallel programming,this paper explores a new task-based parallel programming using the *** Task Parallel Library(TPL).Firstly,this paper proposes a cu... 详细信息
来源: 评论