咨询与建议

限定检索结果

文献类型

  • 270 篇 会议
  • 224 篇 期刊文献

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 260 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 80 篇 信息与通信工程
    • 38 篇 生物工程
    • 35 篇 控制科学与工程
    • 34 篇 电气工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 163 篇 理学
    • 100 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 28 篇 物理学
    • 15 篇 系统科学
    • 13 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 40 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 shaanxi key labo...
  • 20 篇 school of comput...
  • 13 篇 key lab of infor...
  • 12 篇 shaanxi key labo...
  • 11 篇 xi'an university...
  • 11 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 school of comput...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 hei xinhong
  • 17 篇 liu jun
  • 17 篇 shen yulong
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 luo minnan
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 442 篇 英文
  • 37 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
494 条 记 录,以下是471-480 订阅
排序:
An improvement on a three-party password-based key exchange protocol using weil pairing
收藏 引用
International Journal of network security 2010年 第1期11卷 17-22页
作者: Yong, Zeng Jianfeng, Ma Moon, Sangjae Key Lab of Computer Networks and Information Security Ministry of Education Xidian University No.2 South Taibai Road Xi'an 710071 China Mobile Network Security Technology Research Center Kyungpook National University Korea Republic of
The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem, we show an improved protocol, which ... 详细信息
来源: 评论
An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
收藏 引用
Journal of Convergence Information technology 2010年 第4期5卷
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange ... 详细信息
来源: 评论
A privacy-preserving mutual authentication protocol for vehicle Ad Hoc networks
收藏 引用
Journal of Convergence Information technology 2010年 第7期5卷 24-24页
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authent... 详细信息
来源: 评论
An enhanced three-party authentication key exchange protocol for mobile commerce environments
收藏 引用
Journal of Communications 2010年 第5期5卷 436-443页
作者: Tan, Zuowen Department of Computer Science Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang City 330032 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007Fujian Province China
Recently, Yang et al. proposed a three-party encrypted key exchange protocol (3PAKE) which is based on Elliptic curve cryptography. Their 3PAKE protocol is efficient because it requires less computation cost and less ... 详细信息
来源: 评论
Analysis and improvement of a user authentication improved protocol
收藏 引用
Journal of networks 2010年 第5期5卷 622-630页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang City 330013 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
Remote user authentication always adopts the method of password to login the server within insecure network environments. Recently, Peyravin and Jeffries proposed a practical authentication scheme based on one-way col... 详细信息
来源: 评论
Improvement on a threshold authenticated encryption scheme
Journal of Software
收藏 引用
Journal of Software 2010年 第7期5卷 697-704页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang City 330013 Jiangxi Province China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
The authenticated encryption scheme allows one signer to generate an authenticated cipher-text so that no one except the designated verifier can recover the message and verify the message. In a (t, n) threshold authen... 详细信息
来源: 评论
A new abuse-free fair electronic payment protocol
A new abuse-free fair electronic payment protocol
收藏 引用
5th International Conference on Information Assurance and security, IAS 2009
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt... 详细信息
来源: 评论
security analysis of the kerberos protocol using BAN logic
Security analysis of the kerberos protocol using BAN logic
收藏 引用
5th International Conference on Information Assurance and security, IAS 2009
作者: Fan, Kai Li, Hui Wang, Yue Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
An efficient broadcast encryption scheme for wireless sensor network
An efficient broadcast encryption scheme for wireless sensor...
收藏 引用
5th International Conference on Wireless Communications, networking and Mobile Computing, WiCOM 2009
作者: Yanli, Chen Geng, Yang College of Computer Sciences and Technology Nanjing University of Posts and Telecommunications Nanjing China Key Lab of Network Security and Cryptology Fujian Normal University FuZhou China
It is a significant challenge to find out suitable cryptography for wireless sensor networks owing to limitations of power, computation capability and storage resources. Many schemes based on public or symmetric key c... 详细信息
来源: 评论
The Algorithm of Short Message Hot Topic Detection Based on Feature Association
收藏 引用
Information technology Journal 2009年 第2期8卷 236-240页
作者: Sun, Qindong Wang, Qian Qiao, Hongli School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aiming at the mobile short message (SMS) hot topic extraction, the text features and statistical regularity of SMS are analyzed in this study. The formal description of SMS hot topic is given and an algorithm of SMS h... 详细信息
来源: 评论