咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是931-940 订阅
排序:
Design of the late-model key exchange algorithm based on the polymorphic cipher
Design of the late-model key exchange algorithm based on the...
收藏 引用
IEEE International Conference on Industrial engineering and engineering Management, IEEM2010
作者: Yin, Yifeng Gan, Yong Liu, Hongyan Hu, Yupu School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China NO.202 Institute of China Ordnance Industry Xian'yang China Key Laboratory of Computer Network and Information Security Xidian University Xi'an China
Diffie-Hellman key exchange algorithm, which is used in regular scenes base on the discrete logarithm problem, demands that typically two communication parties should struck up a lively conversation leading to a long-... 详细信息
来源: 评论
The future data center for e-governance
The future data center for e-governance
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Sok Chuob Manish Pokharel Jong Sou Park Network and Embedded Security Laboratory Computer Engineering Department Korea Aerospace University Goyang South Korea
Data center facilitates the e-governance system. Data center is a huge repository of data that is required by every stakeholders of e-governance system. It consists of many sensitive governments' data. Access of t... 详细信息
来源: 评论
RFID-based electronic voting: What could possibly go wrong?
RFID-based electronic voting: What could possibly go wrong?
收藏 引用
IEEE International Conference on RFID
作者: Yossef Oren Avishai Wool Computer and Network Security Laboratory School of Electrical Engineering Tel-Aviv University Ramat-Aviv Israel
When Israel's Ministry of Internal Affairs decided to move to electronic voting, it chose to replace the traditional paper ballot with secure contactless smartcards. The system was designed around HF RFID technolo... 详细信息
来源: 评论
Quantum secure direct communication with cluster states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2010年 第7期53卷 1271-1275页
作者: CAO WeiFeng YANG YuGuang WEN QiaoYan College of Electric and Information Engineering Zhengzhou University of Light IndustryZhengzhou 450002China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China College of Computer Science and Technology Beijing University of TechnologyBeijing 100124China State Key Laboratory of Integrated Services Network Xidian UniversityXi’an 710071China State key Laboratory of Information Security Gradute University of Chinese Academy of Sciences Beijing 100049China
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol ca... 详细信息
来源: 评论
Is McAfee securityCenter/Firewall Software Providing Complete security for Your computer?
Is McAfee SecurityCenter/Firewall Software Providing Complet...
收藏 引用
International Conference on the Digital Society
作者: Sirisha Surisetty Sanjeev Kumar Network Security Research Laboratory Department of Electrical / Computer Engineering University of Texas-Pan American Edinburgh TX UK
McAfee securityCenter Firewall is one of the most popular security software installed on millions of Internet connected computers worldwide. ¿McAfee claims that if you have installed McAfee securityCentre with an... 详细信息
来源: 评论
Performance of Windows XP, Windows Vista and Apple's Leopard computers under a Denial of Service Attack
Performance of Windows XP, Windows Vista and Apple's Leopard...
收藏 引用
International Conference on the Digital Society
作者: Raja Sekhar Reddy Gade Hari Vellalacheruvu Sanjeev Kumar Network Security Research Laboratory Department of Electrical/Computer Engineering University of Texas-Pan American Edinburgh TX UK
Distributed Denials of Service (DDoS) attacks are increasing over the Internet, where the attacker consumes all the resources of the network or the victim computer, thus preventing legitimate users from accessing the ... 详细信息
来源: 评论
Is Apple's iMac Leopard Operating System Secure under ARP-Based Flooding Attacks?
Is Apple's iMac Leopard Operating System Secure under ARP-Ba...
收藏 引用
International Conference on Internet Monitoring and Protection, ICIMP
作者: Sirisha Surisetty Sanjeev Kumar Network Security Research Laboratory Department of Electrical and Computer Engineering University of Texas-Pan American Edinburgh TX UK
Apple's iMac computers are promoted by the Apple Inc. to be secure, safe, virus free and fast computers. In this experimental paper, we evaluate the security offered by the iMac computers with its usual Leopard Op... 详细信息
来源: 评论
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
收藏 引用
International Journal of security and networks 2010年 第1期5卷 35-44页
作者: Xu, Li Chen, Sisheng Huang, Xinyi Mu, Yi Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China Department of Mathematics and Computer Science FuQing Branch Fujian Normal University FuQing 350300 China School of Computer Science and Software Engineering Center for Computer and Information Security Research University of Wollongong NSW 2522 Australia
Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad ho... 详细信息
来源: 评论
Enhance Information Flow Tracking with Function Recognition
收藏 引用
China Communications 2010年 第6期7卷 24-29页
作者: Zhou Kan Huang Shiqiu Huang Shan Qi Zhengwei Gu Jian Guan Haibing School of software Shanghai Jliao Tong University Shanghai 200240 P. R. China Key Lab of Information Network Security Ministry of Public Security Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200240 P. R China Shanghai Key Laboratory of Scalable Computing & System Shanghai P. R. China
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... 详细信息
来源: 评论
Enhancing fairness: A novel C2C e-commerce community member reputation algorithm based on transaction social networks
Enhancing fairness: A novel C2C e-commerce community member ...
收藏 引用
IADIS International Conference WWW/Internet 2010
作者: Feng, Wangsen Zhang, Bei Xia, Yunni Li, Jiajing Meng, Tao Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Peking University Beijing 100871 China College of Computer Science Chongqing University Chongqing 400044 China School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a... 详细信息
来源: 评论