咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是821-830 订阅
排序:
Parallelization using task parallel library with task-based programming model
Parallelization using task parallel library with task-based ...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an Shaanxi Province China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ... 详细信息
来源: 评论
Attribute-based encryption based access control scheme with constant-size ciphertext in cloud computing
收藏 引用
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (engineering and Technology Edition) 2014年 第3期44卷 788-794页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Zhang, Tao Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China School of Telecommunications Engineering Xidian University Xi'an 710071 China
Based on Attribute-Based Encryption (ABE), a variety of access control schemes have been constructed in cloud computing. However, in these schemes, the ciphertext overhead goes linearly with the number of attributes u... 详细信息
来源: 评论
A security Enhanced IEEE1588 Protocol for Deep-Space Environment
A Security Enhanced IEEE1588 Protocol for Deep-Space Environ...
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
作者: Zijing Cheng Lei He Jingling Zhao Kai Lin Baojiang Cui The Academy of Satellite Application Beijing School of Computer Science Beijing University of Posts and Telecommunication Beijing National Engineering Laboratory for Mobile Network Security Beijing
With the continuous development of the space technology, increasing communication between spacecrafts. To ensure the spacecrafts keep a uniform time standard, time synchronization protocol plays an crucial role. Takin... 详细信息
来源: 评论
A secure self-destruction scheme with IBE for the internet content privacy
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2014年 第1期37卷 139-150页
作者: Xiong, Jin-Bo Yao, Zhi-Qiang Ma, Jian-Feng Li, Feng-Hua Liu, Xi-Meng Faculty of Software Fujian Normal University Fuzhou 350108 China School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p... 详细信息
来源: 评论
Multi-user access control scheme based on resources hierarchies for perceptual layer of IoT
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第1期42卷 28-35页
作者: Ma, Jun Guo, Yuan-Bo Ma, Jian-Feng Liu, Xi-Meng Li, Qi School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China PLA Information Engineering University Zhengzhou Henan 450004 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ... 详细信息
来源: 评论
An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第4期42卷 696-702页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng Ma, Jun School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China School of Telecommunication Engineering Xidian University Xi'an Shaanxi 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authorit... 详细信息
来源: 评论
A Parking Guidance Method Based on Parallel Particle Swarm Optimization Algorithm
A Parking Guidance Method Based on Parallel Particle Swarm O...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Ying Liu Xinhong Hei Lei Wang Zhiqiang Zhang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings t... 详细信息
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论
Public verifiable key encapsulation mechanism over the group of signed energy quadratic residues
收藏 引用
Energy Education Science and Technology Part A: Energy Science and Research 2013年 第1期31卷 525-528页
作者: Liu, Zhen Yang, Xiaoyuan Wang, Xu'an Xiao, Haiyan Key Laboratory of computer Network and Information Security of Engineering Institute of the Armed Police Xi'an 710086 China
The most of existing encryption algorithm with public verifiability of the cipher-text are based on pairings. To our knowledge, it cost much time on the computing of the pairings. So it is always an interested studyin... 详细信息
来源: 评论
Approach to keyword search over encrypted data in cloud
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 147-153页
作者: Zhang, Peng Li, Yan Lin, Hai-Lun Yang, Rong Liu, Qing-Yun Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China National Engineering Laboratory for Information Security Technologies Beijing100093 China National Computer Network Emergency Response and Coordination Center Beijing100029 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
With the advent of cloud computing, large-scale data are being increasingly outsourced to the cloud. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective dat... 详细信息
来源: 评论