咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 417 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 20 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 college of compu...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 878 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1024 条 记 录,以下是831-840 订阅
排序:
A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing
A Context Aware Reputation Mechanism for Enhancing Big Data ...
收藏 引用
International Conference on computer and Information Technology (CIT)
作者: Hui Lin Jia Hu Jiajia Liu Li Xu Yulei Wu Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Mathematics and Computer Science Liverpool Hope University Liverpool UK School of cyber engineering Xidian university Xian China Fujian Normal University Fuzhou Fujian CN College of Engineering University of Exeter Exeter UK
Data veracity ensures that the data used are trusted, authentic and protected from unauthorized access and modification. In order to implement the veracity of big data, specific trust models and approaches must be des... 详细信息
来源: 评论
Data dispersal for large storage systems
Data dispersal for large storage systems
收藏 引用
International Conference on Machine Tool Technology and Mechatronics engineering, ICMTTME 2014
作者: Zhang, Ling Zhu, Shuai Shuai Computer Teaching and Research Group Xi’an FanYi University Xi’an China Key Laboratory of Network and Information Security of APF Engineering University of APF Xi’an China
Data dispersal mechanism is a group of basic working protocols for oceans of data processing and it plays an important role in enhancing system error correction and avoiding storage device failure. The data recovery a... 详细信息
来源: 评论
An Energy-saving Algorithm for Wireless Sensor networks Based on network Coding and Compressed Sensing
收藏 引用
中国通信 2014年 第S1期11卷 171-178页
作者: QIN Tuanfa MENG Yunfan LI Liangliang WAN Haibin ZHANG Dongmei School of Computer and Electronic Information Guangxi University Nanning 530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning 530004 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
An energy-saving algorithm for wireless sensor networks based on network coding and compressed sensing (CS-NCES) is proposed in this paper. Along with considering the correlations of data spatial and temporal, the alg... 详细信息
来源: 评论
An optimized strategy for data service response with template-based caching and compression
An optimized strategy for data service response with templat...
收藏 引用
2013 International Conference on Service-Oriented Computing,ICSOC 2013
作者: Peng, Zhang Kefu, Xu Yan, Li Li, Guo Institute of Information Engineering Chinese Academy of Sciences Beijing China National Engineering Laboratory for Information Security Technologies Beijing China National Computer Network Emergency Response Technical Team Beijing China
Data service is a specialization of Web service, and end-users can synthesize cross-organizational data by composing data services. As composite schemes overlap each other, some primitive data services could be called... 详细信息
来源: 评论
A novel proxy re-encryption with keyword search  3
A novel proxy re-encryption with keyword search
收藏 引用
3rd International Conference on Information Technology and Management Innovation, ICITMI 2014
作者: Meng, Xian Yong Chen, Zhong Meng, Xiang Yu Zhuhai College of Jilin University Zhuhai China School of Electronics Engineering and Computer Science Peking University Beijing China Key Laboratory of Network and Software Security Assurance Ministry of Education Beijing China
In this paper, a novel proxy re-encryption (PRE) scheme with keyword search is proposed, where only the ciphertext containing the keyword set by the delegator can be transformed by the semi-trusted proxy and then decr... 详细信息
来源: 评论
One forward-secure signature scheme using bilinear maps and its applications
One forward-secure signature scheme using bilinear maps and ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Li, Guowen College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China Key Lab of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China School of Computer Science and Technology Shandong Jianzhu University 250100 Jinan China
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ... 详细信息
来源: 评论
security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model"
Security analysis on "Strongly secure certificateless key-in...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing
作者: Feng Wang Li Xu Jeng-Shyang Pan College of Mathematics and Physics Fujian University of Technology Fuzhou Fujian 350118 China Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian 350117 Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian 350117 China College of Information Science and Engineering Fujian University of Technology Fuzhou Fujian 350118China
Certificateless signature eliminates the need of certificates in traditional public key signature and solves the inherent key escrow problem in identity-based signature. Therefore, it is an important secure requiremen... 详细信息
来源: 评论
A Provably secure Certificate based ring signature without pairing
收藏 引用
International Journal of network security 2014年 第4期16卷 278-285页
作者: Qin, Zhiguang Xiong, Hu Li, Fagen School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 North Jianshe Road Chenghua District chengdu Sichuan 610054 China Key Lab of Network Security and Cryptology Fujian Normal University No. 8 Shangsan Road Cangshan District Fuzhou Fujian 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences No. 19 Yuquan Road Shijingshan District Beijing 100190 China
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially f... 详细信息
来源: 评论
An identity-based conditional proxy re-encryption in cloud computing environments
An identity-based conditional proxy re-encryption in cloud c...
收藏 引用
作者: Meng, Xian Yong Chen, Zhong Meng, Xiang Yu Sun, Bing Zhuhai College of Jilin University Zhuhai China School of Electronics Engineering and Computer Science Peking University Beijing China Key Laboratory of Network and Software Security Assurance Ministry of Education Beijing China Information Institute Guangdong Ocean University Zhanjiang China
In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a delegator provides a re-encryption key satisfying one condition to a semi-trusted proxy who can convert a ciphertext e... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论