咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是921-930 订阅
排序:
Electronic Sealed-Bid Auctions with Incoercibility
Electronic Sealed-Bid Auctions with Incoercibility
收藏 引用
The 2011 International Conference on Electric and Electronics(EEIC 2011)
作者: Chongzhi Gao Zheng-an Yao Dongqing Xie Baodian Wei School of Computer Science Guangzhou University Key Laboratory of Network Security and Cryptology Fujian Normal University College of Mathematic and Computational Science Sun Yat-Sen University Department of Electronics and Communication Engineering Sun Yat-sen University
Electronic sealed-bid auctions are a method to establish the price of goods through the internet while keeping the bids secret during the bidding phase. In this paper, our concern is incoercibility of an auction proto... 详细信息
来源: 评论
Improving the Physical-Layer security of Wireless Two-Way Relaying via Analog network Coding
Improving the Physical-Layer Security of Wireless Two-Way Re...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Hui-Ming Wang Qinye Yin Xiang-Gen Xia Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi China Xi'an Jiaotong University Xi'an Shaanxi CN Department of Electrical and Computer Engineering University of Delaware Newark DE USA
In this paper, we address the physical-layer security of two-way (bi-directional) transmissions of two terminals with the help of multiple relay nodes in the presence of an eavesdropper, where each node in the network... 详细信息
来源: 评论
An anonymity and authentication mechanism for internet of things
收藏 引用
Journal of Convergence Information Technology 2011年 第3期6卷 98-105页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy... 详细信息
来源: 评论
SWP2P: P2P anonymous trace system based on superposition watermarking
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第8期5卷 116-126页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a... 详细信息
来源: 评论
Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform
Runtime-Based Boot Components Re-measurement Scheme for Trus...
收藏 引用
2011 International Conference on Informatics,Cybernetics,and computer engineering(ICCE 2011)
作者: Peng Weiping Zhou Yajian Wang Cong Yang Yixian Key Laboratory of Network and Information Attack & Defence Technology of MOE Beijing University of Posts and Telecommunications School of Computer Science and Technology Henan Polytechnic University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured a... 详细信息
来源: 评论
Video steganography using motion vector and linear block codes
Video steganography using motion vector and linear block cod...
收藏 引用
2010 IEEE International Conference on Software engineering and Service Sciences, ICSESS 2010
作者: Pan, Feng Xiang, Li Yang, Xiao-Yuan Guo, Yao Key Laboratory of Network and Information Security of APF Engineering College of the Armed Police Force Xi'an China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China
A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 comp... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of computer Science & Technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Group key management using proxy re-encryption for dynamic networks
Group key management using proxy re-encryption for dynamic n...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Zhang, Minqing Wu, Xuguang Han, Yiliang Yang, Xiaoyuan Key Laboratory of Network and Information Security of APF Engineering College of APF China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by dividing the whole group into subgroups. However, many of the prev... 详细信息
来源: 评论
Conductivity of ZnS: Mn nanocrystal layers with various Mn Ion concentrations
Conductivity of ZnS: Mn nanocrystal layers with various Mn I...
收藏 引用
2010 IEEE International Conference on Semiconductor Electronics, ICSE 2010
作者: Ab Rahman, Mohd Syuhaimi Mohd Arif, Noor Azie Azura Ehsan, Abang Annuar Computer and Network Security Department of Electrical Electronic and Systems Engineering Malaysia Photonics Laboratory Institute of Micro Engineering and Nanoelectronics Faculty of Engineering and Built Environment 43600 UKM Bangi Selangor Malaysia
Transition metal-doped ZnS materials have received broad attention due to their well-known performance in electronics and optics. It has been observed previously by other researchers that Mn is one of interesting dopa... 详细信息
来源: 评论
A tentative study on reconfigurable network model
A tentative study on reconfigurable network model
收藏 引用
International Conference on computer Application and System Modeling
作者: Li, Li Xu, Xiaoyan State Key Laboratory for Manufacturing Systems Engineering Key Laboratory for Intelligent Network and Network Security of Ministry of Education Xi'an Jiaotong University Xi'an 710049 China College of Computer Science Shaanxi Normal University Xi'an 710062 China
As a promising technology to improve network survivability, reliability and flexibility, autonomous reconfigurability is extremely important for modern information networks that usually respond to unforeseen events. I... 详细信息
来源: 评论