咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是851-860 订阅
排序:
An efficient and provably-secure coercion-resistant e-voting protocol
An efficient and provably-secure coercion-resistant e-voting...
收藏 引用
Annual Conference on Privacy, security and Trust, PST
作者: Alireza Toroghi Haghighat Mohammad Sadeq Dousti Rasool Jalili Data and Network Security Laboratory Department of Computer Engineering Sharif University of Technology Tehran Iran
We present an efficient and provably-secure e-voting protocol, which is a variant of the JCJ e-voting protocol (Juels et al., 2010). It decreases the total number of JCJ's operations from O(n 2 ) to O(n), where n ... 详细信息
来源: 评论
Accountable authority identity-based encryption with public traceability  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Lai, Junzuo Deng, Robert H. Zhao, Yunlei Weng, Jian School of Information Systems Singapore Management University Singapore Singapore Software School Fudan University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks
Energy-aware and self-adaptive anomaly detection scheme base...
收藏 引用
作者: Wang, Wei Wang, Huiran Wang, Beizhan Wang, Yaping Wang, Jiajun School of Computer Science Xi'An Polytechnic University Xi'an 710048 China Key Laboratory for Intelligent Network and Network Security Xi'An Jiaotong University Ministry of Education Xi'an 710049 China School of Software Xiamen University Xiamen 361005 China Department of Industrial and Systems Engineering Texas AandM University TX 77843 United States
Anomaly detection is indispensable for satisfying security services in mobile ad hoc network (MANET) applications. Often, however, a highly secure mechanism consumes a large amount of network resources, resulting in n... 详细信息
来源: 评论
A Dynamic Probabilistic Marking Approach with Multi-Tag for Tracing ICMP-Based DoS Attacks
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第6期18卷 484-488页
作者: CHEN Xiuzhen MA Jin LI Shenghong CHEN Ken SERHROUCHNI Ahmed State Key Laboratory for Manufacturing Systems Engineering Xi'an Jiaotong University School of Information Security Engineering Shanghai Jiao Tong University Les Laboratoires de l'Institut Galilée Université Paris 13Paris 93430 France Network and Computer Science Department Telecom ParisTech Paris 75634 France
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and refl... 详细信息
来源: 评论
Direct construction of signcryption tag-KEM from standard assumptions in the standard model
Direct construction of signcryption tag-KEM from standard as...
收藏 引用
15th International Conference on Information and Communications security, ICICS 2013
作者: Li, Xiangxue Qian, Haifeng Yu, Yu Weng, Jian Zhou, Yuan Department of Computer Science and Technology East China Normal University China National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications China Institute for Interdisciplinary Information Sciences Tsinghua University China Department of Computer Science Jinan University China Network Emergency Response Technical Team/Coordination Center China
The paper presents a direct construction of signcryption tag- KEM under the standard DBDH and CDH assumptions in the standard model, without using strongly unforgeable signature schemes as building blocks. We prove it... 详细信息
来源: 评论
A regression test case generation method guided with branch probability
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology) 2013年 第SUPPL.2期44卷 317-322页
作者: Yu, Lechen Wang, Haijun Zheng, Qinghua Liu, Ting Huang, Xiaolong Yang, Zijiang Wei, Wei MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049 China School of Computer Science and Engineering Xi'an University of Technology Xi'an 710049 China
A novel method was proposed to generate regression test cases guided by the branch possibility (GBP). The symbolic execution was applied to search the paths of the program and generate control dependence graph of the ... 详细信息
来源: 评论
Software survivability evaluation method based on software calling structure
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology) 2013年 第SUPPL.1期44卷 443-448页
作者: Hou, Yuqiao Qu, Yu Liu, Linfeng Zheng, Qinghua Liu, Ting Zheng, Chao Yang, Zijiang Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi'an 710049 China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049 China School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China
A new method was proposed to evaluate the survivability of the software system based on the calling structure of the software. Firstly, the interactions among the components of the software were obtained using the sta... 详细信息
来源: 评论
Optimized relay-route assignment for anonymity in wireless networks
Optimized relay-route assignment for anonymity in wireless n...
收藏 引用
IEEE International Symposium on Information Theory
作者: Chouchang Yang Basel Alomair Radha Poovendran Network Security Laboratory Department of Electrical Engineering University of Washington Seattle WA USA Computer Research Institute King Abdulaziz City for Science and Technology Riyadh Saudi Arabia
Anonymous wireless networks use covert relays to prevent unauthorized entities from determining communicating parties through traffic timing analysis. In a multipath anonymous network, the choice of which relay nodes ... 详细信息
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on security and Privacy in Communication networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论