咨询与建议

限定检索结果

文献类型

  • 270 篇 会议
  • 224 篇 期刊文献

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 260 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 80 篇 信息与通信工程
    • 38 篇 生物工程
    • 35 篇 控制科学与工程
    • 34 篇 电气工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 163 篇 理学
    • 100 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 28 篇 物理学
    • 15 篇 系统科学
    • 13 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 40 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 shaanxi key labo...
  • 20 篇 school of comput...
  • 13 篇 key lab of infor...
  • 12 篇 shaanxi key labo...
  • 11 篇 xi'an university...
  • 11 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 school of comput...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 hei xinhong
  • 17 篇 liu jun
  • 17 篇 shen yulong
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 luo minnan
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 442 篇 英文
  • 37 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
494 条 记 录,以下是441-450 订阅
排序:
Research on the application security isolation model
Research on the application security isolation model
收藏 引用
作者: Gong, Lei Zhao, Yong Liao, Jianhua Institute of Electronic Technology Information Engineering University Zhengzhou China Key Lab of Information Network Security Ministry of Public Security Shanghai China Institute of Computer Science Beijing University of Technology Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China
With the rapid development of information technology, the secrutiy problems of information systems are being paid more and more attention, so the Chinese government is carrying out information security classified prot... 详细信息
来源: 评论
A Provably Secure Identity-based Authentication Multiple key Agreement Protocol
收藏 引用
China Communications 2011年 第2期8卷 26-33页
作者: 谭作文 School of Information Technology Jiangxi University of Finance and Economics Key Lab of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo... 详细信息
来源: 评论
A privilege separation method for security commercial transactions
A privilege separation method for security commercial transa...
收藏 引用
作者: Chen, Yasha Hu, Jun Gai, Xinmao Sun, Yu Department of Electrical and Information Engineering Naval University of Engineering Wuhan Hubei 430033 China Key Lab of Information Network Security Ministry of Public Security Shanghai 201204 China School of Computer Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... 详细信息
来源: 评论
Efficient and secure group key management based on EBS and attribute encryption
Efficient and secure group key management based on EBS and a...
收藏 引用
IEEE International Conference on computer Science and Automation Engineering (CSAE)
作者: Chen, Yanli Yang, Geng College of Computer Nanjing University of Posts and Telecommunications Nanjing China Key Lab of Network Security and Cryptology Fujian Normal University FuZhou China Department of Technology Nanjing University of Posts and Telecommunications Nanjing China
Exclusion Basis Systems (EBS) is a combinatorial optimization methodology for key management of group communication. The EBS approach proves to be very scalable for large networks and enables great flexibility in netw... 详细信息
来源: 评论
Study on Model-Based security Assessment of Information Systems
Study on Model-Based Security Assessment of Information Syst...
收藏 引用
The 2011 International Conference on Computing,Information and Control(ICCIC 2011)
作者: Xiangdong Li Xinchao Han Qiusheng Zheng Zhengzhou Key Lab of Computer Network Security Assessment School of Computer Science Zhengzhou University of Technology
security problems of an information system are mainly due to its internal vulnerabilities, by exploiting which external threats do harm to the system. security Assessment of Vulnerabilities(SAV) is, with appropriate m... 详细信息
来源: 评论
The availability of fast-flux service networks
The availability of fast-flux service networks
收藏 引用
International Conference on Selected Topics in Mobile and Wireless networking (iCOST)
作者: Yunfeng Xu Yansheng Lu Zhengbiao Guo Hubei Province Public Security Bureau To Defend The Corps Cyber Security Key Lab of Information NetWork Security Ministry of Public Security China School of Computer Science and Technology Hua Zhong University of Science and Technology Wuhan China
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov... 详细信息
来源: 评论
Chinese sentence correlation analyzing based on semantic dependency method
Chinese sentence correlation analyzing based on semantic dep...
收藏 引用
International Conference on Electronics, Communications and Control (ICECC)
作者: Haiping Zhu Yang Yang Yan Chen Qian Ma Department of Computer Science and Technology Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Technology Research and Development Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xian Jiaotong University Xian China Department of Computer Science and Technology Xian Jiaotong University Xian China
Based on the adoption of dependency grammar to analyze the structure of Chinese sentences, this paper suggests to analyze Chinese sentence with semantic dependency method. The correlation between words and phrases can... 详细信息
来源: 评论
Chosen ciphertext secure broadcast encryption in the standard model
Chosen ciphertext secure broadcast encryption in the standar...
收藏 引用
International Conference on Electric Information and Control Engineering
作者: Sun, Jin Hu, Yu-Pu Department of Application Mathematics Xi'An University of Technology Xi'an China Key Lab of Computer Network and Information Security Xidian University Xi'an China
In Eurocrypt'2005, Waters' identity-based encryption scheme suffers a drawback that the scheme only guarantees chosen plaintext security but chosen ciphertext security, and to give concurrent consideration bot... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Comments on a threshold authenticated encryption scheme
收藏 引用
International Journal of computers and Applications 2011年 第2期33卷 132-136页
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentia... 详细信息
来源: 评论