咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是901-910 订阅
排序:
A Public Cryptosystem from R-LWE
A Public Cryptosystem from R-LWE
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and networks(2011第三届通信软件与网络国际会议 ICCSN2011)
作者: Ping Wei Liqiang Wu Xiaoyuan Yang Bin Hao Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086 Ch Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086Chi Key Laboratory of Computer Network & Information Security of the Ministry of Education Xidian Unive Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086 C
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer p... 详细信息
来源: 评论
Towards the Development of Personal Cloud Computing for Mobile Thin-Clients
Towards the Development of Personal Cloud Computing for Mobi...
收藏 引用
International Conference on Information Science and Applications (ICISA)
作者: Yuan Tian Biao Song Eui-Nam Huh Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University South Korea
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shi... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Zhushou Tang Haojin Zhu Zhenfu Cao Shuai Zhao Department of Computer Science and Engineering Shanghai Jiaotong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Comparison between NRZ and RZ OOK modulation format in chromatic dispersion compensation in both electrical and optical compensator
Comparison between NRZ and RZ OOK modulation format in chrom...
收藏 引用
IEEE Symposium on Business, engineering and Industrial Applications (ISBEIA)
作者: Majid Moghaddasi Syuhaimi Bin Ab. Rahman Spectrum Technology Research Group-Broadband Computer and Network Security Laboratory Department of Electrical Electronic & system Engineering Faculty of Engineering UKM Bangi Selangor Malaysia
This paper compares the efficiency of on-off Keying (OOK) modulation formats non-return-to-zero (NRZ) and return-to-zero (RZ) in both electrical and optical chromatic dispersion compensation. While In electrical compe... 详细信息
来源: 评论
Improved deduplication method based on variable-size sliding window
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第9期5卷 80-87页
作者: Wang, Can Qin, Zhiguang Yang, Lei Nie, Peng School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
To improve the deduplication performance while keep a reasonable metadata cost and time cost at the same time, a state deduplication method based on variable-size sliding window and a universal model of performance-an... 详细信息
来源: 评论
The design and FPGA implementation of FSM-based intellectual property watermark algorithm at behavioral level
收藏 引用
Information Technology Journal 2011年 第4期10卷 870-876页
作者: Liang, Wei Sun, Xingming Ruan, Zhiqiang Long, Jing Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan 411201 China
A Finite State Machine (FSM)-based Intellectual Property (IP) watermark algorithm at behavioral level is presented for the protection of IP reuse techniques in Very Large Scale Integration (VLSI). The proposed algorit... 详细信息
来源: 评论
Electronic sealed-bid auctions with incoercibility
Electronic sealed-bid auctions with incoercibility
收藏 引用
2011 International Conference on Electric and Electronics, EEIC 2011
作者: Gao, Chongzhi Yao, Zheng-An Xie, Dongqing Wei, Baodian School of Computer Science Guangzhou University Guangzhou 510006 China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China College of Mathematic and Computational Science Sun Yat-Sen University GuangZhou 510275 China Department of Electronics and Communication Engineering Sun Yat-Sen University Guangzhou 510006 China
Electronic sealed-bid auctions are a method to establish the price of goods through the internet while keeping the bids secret during the bidding phase. In this paper, our concern is incoercibility of an auction proto... 详细信息
来源: 评论
A robust quantization method using a robust Chinese remainder theorem for secret key generation
A robust quantization method using a robust Chinese remainde...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wenjie Wang Chen Wang Xiang-Gen Xia Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University China Department of Electrical and Computer Engineering University of Delaware Newark DE USA
Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authorized users. In this paper, we make use o... 详细信息
来源: 评论
Enforcing Reactive Noninterference with Reachability Analysis
Enforcing Reactive Noninterference with Reachability Analysi...
收藏 引用
International Conference on Information Technology: New Generations (ITNG)
作者: Cong Sun Liyong Tang Zhong Chen Institute of Software School of Electronics Engineering and Computer Science Peking University China Key Laboratory of High Confidence Software Technologies Key Laboratory of Network and Software Security Assurance Ministry of Education China
The reactive computational model is pervasively used as a proper abstraction of web-based applications which receive inputs and generate outputs throughout execution. The present static enforcements of information flo... 详细信息
来源: 评论
Runtime-based boot components re-measurement scheme for trusted platform
Runtime-based boot components re-measurement scheme for trus...
收藏 引用
作者: Weiping, Peng Yajian, Zhou Cong, Wang Yixian, Yang Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Henan Polytechnic University Jiaozuo Henan 454001 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions (binary code) is measured ... 详细信息
来源: 评论