咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 1 篇 digital video br...
  • 1 篇 network coding(n...
  • 1 篇 longterm evoluti...
  • 1 篇 retransmission
  • 1 篇 differential pri...
  • 1 篇 wireless network

机构

  • 2 篇 inzu - opportuni...
  • 2 篇 laboratory lma c...
  • 2 篇 institute of opt...
  • 2 篇 faculty of exact...
  • 2 篇 ligm esiee paris...
  • 1 篇 integrated manag...
  • 1 篇 guangzhou instit...
  • 1 篇 school of transp...
  • 1 篇 college of compu...
  • 1 篇 computer network...
  • 1 篇 meta-networking ...
  • 1 篇 state key labora...
  • 1 篇 secure cyber sys...
  • 1 篇 secure networkin...
  • 1 篇 shaanxi key labo...
  • 1 篇 cyberspace insti...
  • 1 篇 provincial key l...
  • 1 篇 institute of com...

作者

  • 2 篇 fouzi semchedine
  • 2 篇 mawloud omar
  • 2 篇 saher tegane
  • 2 篇 abdelmalek boudr...
  • 2 篇 khaled hamouid
  • 1 篇 du wei
  • 1 篇 sun rong
  • 1 篇 wu celimuge
  • 1 篇 liang hongbin
  • 1 篇 wang lian
  • 1 篇 liu lei
  • 1 篇 amjad mehmood
  • 1 篇 carsten maple
  • 1 篇 wu yufeng
  • 1 篇 rafiqullah
  • 1 篇 jaime lloret
  • 1 篇 xu guangxia
  • 1 篇 muhammad altaf k...
  • 1 篇 peng daiyuan
  • 1 篇 liu jingwei

语言

  • 5 篇 英文
检索条件"机构=Secure Networking and Computing Institute"
5 条 记 录,以下是1-10 订阅
排序:
Efficient Priority Packet Recovery Based on Network Coding in DVB-IPDC System
收藏 引用
China Communications 2015年 第7期12卷 167-178页
作者: WANG Lian PENG Daiyuan LIANG Hongbin Provincial Key Laboratory of Information Coding and Transmission School of Information Science and TechnologySouthwest Jiaotong University College of Computing Science and Technology Chongqing University of Posts and Telecommunications School of Transportation and Logistics Southwest Jiaotong University Secure Networking and Computing Institute School of Computing Informatics and Decision Systems EngineeringArizona State University
In DVB-IPDC system, due to the constraints of handheld devices and the broadcast nature of wireless network, packet loss is inevitable. ECDR-NC proposed is a retransmission encoding packet selection algorithm based on... 详细信息
来源: 评论
Byzantine-Robust Hierarchical Aggregation for Cross-Device Federated Learning in Consumer IoT
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 1-1页
作者: Liu, Jingwei Wu, Yufeng Du, Wei Sun, Rong Xu, Guangxia Liu, Lei Wu, Celimuge Shaanxi Key Laboratory of Blockchain and Secure Computing Xidian University Xi’an China State Key Laboratory of Integrated Services Networks Xidian University Xi’an China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Guangzhou Institute of Technology Xidian University Guangzhou China Meta-Networking Research Center University of Electro-Communications Tokyo Japan
Nowadays, Federated Learning (FL) has emerged as a prominent technique of model training in Consumer Internet of Things (CIoT) without sharing sensitive local data. Targeting privacy leakage of cross-device FL in CIoT... 详细信息
来源: 评论
Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures
Zero-Knowledge Proofs based delegation authentication for In...
收藏 引用
International Conference on Internet of Things: Systems, Management and Security
作者: Rafiqullah Amjad Mehmood Muhammad Altaf Khan Carsten Maple Jaime Lloret Institute of Computing Kohat University of Science & Technology Kohat Pakistan Computer Networking and Cyber Security London Metropolitan University London UK Secure Cyber Systems Research Group (CSCRG) WMG University of Warwick Coventry UK Integrated Management Coastal Research Institute Universitat Politecnica de Valencia Valencia Spain
The growing deployment of Industrial Internet of Things (IIoTs) raises significant authentication concerns, especially in scenarios where resource-constrained devices need to delegate tasks with more powerful entities...
来源: 评论
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]
收藏 引用
Journal of Information Security and Applications 2024年 82卷
作者: Saher Tegane Khaled Hamouid Mawloud Omar Fouzi Semchedine Abdelmalek Boudries Faculty of Exact Sciences Bejaia University Algeria LIGM ESIEE Paris Université Gustave Eiffel Noisy-le-Grand France INZU - Opportunistic computing and networking for secure and dependable applications IRISA Université Bretagne Sud France Institute of Optics and Precision Mechanics Ferhat Abbas University Setif Algeria Laboratory LMA Commercial Science Dept Faculty of Economics Business & Management Bejaia University Bejaia Algeria
来源: 评论
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]
收藏 引用
Journal of Information Security and Applications 2024年 83卷
作者: Saher Tegane Khaled Hamouid Mawloud Omar Fouzi Semchedine Abdelmalek Boudries Faculty of Exact Sciences Bejaia University Algeria LIGM ESIEE Paris Université Gustave Eiffel Noisy-le-Grand France INZU - Opportunistic computing and networking for secure and dependable applications IRISA Université Bretagne Sud France Institute of Optics and Precision Mechanics Ferhat Abbas University Setif Algeria Laboratory LMA Commercial Science Dept Faculty of Economics Business & Management Bejaia University Bejaia Algeria
来源: 评论