咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是841-850 订阅
排序:
An energy-efficient geographic routing based on cooperative transmission in wireless sensor networks
收藏 引用
Science China(Information Sciences) 2013年 第7期56卷 42-51页
作者: LI Bin WANG WenJie YIN QinYe LI HongXiang YANG Rong Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Department of Electrical and Computer Engineering University of Louisville National Research Institute of Radio Spectrum Management
In this paper, we propose an energy-efficient cooperative geographic routing (ECGR) to reach energy-efficient routing in wireless sensor networks (WSN). ECGR takes full advantage of cooperative diversity and geographi... 详细信息
来源: 评论
Construction and correlation analysis of combiner functions with 1 bit memory
收藏 引用
Journal of Computational Information Systems 2013年 第2期9卷 521-528页
作者: Che, Xiaoliang Yang, Xiaoyuan Institute of Network and Information Security under the Chinese Armed Police Force Department of Electronic Technology Engineering University of Armed Police Force Xi'an 710086 China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an 710086 China
In this paper, we construct a kind of combiner functions with high nonlinearity and correlation-immunity. This construction is based on the relationship between properties of the combiners with 1bit memory and the cry... 详细信息
来源: 评论
Provably-secure certificateless proxy re-signature scheme
Provably-secure certificateless proxy re-signature scheme
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Xiao, Haiyan Zhang, Minqing Key Laboratory of computer Network and Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
The paper proposes a provably-secure certificateless proxy re-signature scheme. Based certificateless public cryptosystem, it solves the using of certificate in certificate-based scheme and removes key escrow in ID-ba... 详细信息
来源: 评论
Secure multi-party confidential protocol of matrix factorization
Secure multi-party confidential protocol of matrix factoriza...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Xiao, Haiyan Yang, Xiaoyuan Key Laboratory of computer Network Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
The confidential computation of matrix is a very important issue in secure multi-party computation. But there is no literature proposed truly multi-party confidential computation protocol on matrix factorization. In t... 详细信息
来源: 评论
An Extension of Harn-Lin's Cheater Detection and Identification
Smart Innovation, Systems and Technologies
收藏 引用
Smart Innovation, Systems and Technologies 2013年 21卷 25-32页
作者: Harn, Lein Lin, Changlu Department of Computer Science and Electrical Engineering University of Missouri-Kansas City Kansas City MO 64110-2499 United States Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian 350007 China
Cheater detection and identification are important issues in the process of secret reconstruction. Most algorithms to detect and identify cheaters need the dealer to generate and distribute additional information to s... 详细信息
来源: 评论
Design and implementation of the network electronic identity management system
收藏 引用
2nd International Conference on Opto-Electronics engineering and Materials Research, OEMR 2013
作者: Zou, Xiang Chen, Bing The 3rd research institute of ministry of public security Key laboratory of information network security Ministry of Public Security Shanghai China Dept. of computer engineering Tongji University Shanghai China
With the prompt evolution of Internet, network identity management is getting more and more basilica. Personal network electronic identity associated in reality has been the significant and urgent task when online lif... 详细信息
来源: 评论
Research on the degeneration problem of key sequence based on chaos
Research on the degeneration problem of key sequence based o...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Wang, Jing-Jing Wei, Ping Chen, Jia-Yong Key Laboratory of Network and Information Security of APF Department of Electronic Technology Engineering University of APF Xi'an 710086 China Laboratory-Center of Computer Department of Information Engineering Engineering University of APF Xi'an 710086 China Laboratory of Information and Network of APF Department of Information Engineering Engineering University of APF Xi'an 710086 China
In view of the degeneration problem of chaos characteristics of the secret-key sequences, a new key sequence generation system was designed, combining chaos and cryptography. The simulation results shows that, not onl... 详细信息
来源: 评论
Efficient predicate encryption supporting construction of fine-grained searchable encryption
Efficient predicate encryption supporting construction of fi...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Zhang, Minqing Wang, Xu An Yang, Xiaoyuan Cai, Weiyi School of Computer Science Northwestern Polytechnical University Xi'an 710072 China Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force China
Predicate Encryption (PE) is a new encryption paradigm which provides more sophisticated and flexible functionality. PE is sufficient for some new applications, such as fine-grained control over access to encrypted da... 详细信息
来源: 评论
Cryptanalysis of 2-layer nonlinear piece in hand method
Cryptanalysis of 2-layer nonlinear piece in hand method
收藏 引用
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and security engineering, MoCrySEn 2013 and 3rd International Workshop on security and Cognitive Informatics for Homeland Defense, SeCIHD 2013
作者: Nie, Xuyun Petzoldt, Albrecht Buchmann, Johannes School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Technische Universität Darmstadt Department of Computer Science Hochschulstraße 10 64289 Darmstadt Germany State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Network and Data Security Key Laboratory of Sichuan Province China
Piece in Hand method is a security enhancement method for Multivariate Public Key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece... 详细信息
来源: 评论
A color digital watermarking in nonsampled contourlet domain using generic algorithm
A color digital watermarking in nonsampled contourlet domain...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Luo, Peng Wei, Ping Liu, Yi-Qun Key Laboratory of Network and Information Security of APF Department of Electronic Technology Engineering University of APF Xi'an 710086 China Laboratory-Center of Computer Department of Information Engineering Engineering University of APF China Xi'an 710086 China Department of Electronic Technology Engineering University of Armed Police Force Xi'an 710086 China
A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obta... 详细信息
来源: 评论