咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 12 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 2 篇 土木工程
    • 2 篇 船舶与海洋工程
    • 2 篇 网络空间安全
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
  • 5 篇 理学
    • 2 篇 海洋科学
    • 1 篇 数学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 4 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 security
  • 3 篇 technological in...
  • 2 篇 internet of thin...
  • 2 篇 deep learning
  • 2 篇 throughput
  • 2 篇 software enginee...
  • 2 篇 semantics
  • 2 篇 decision making
  • 2 篇 software design
  • 2 篇 open source soft...
  • 1 篇 phenology
  • 1 篇 software systems
  • 1 篇 conservation bio...
  • 1 篇 parallel process...
  • 1 篇 scalability
  • 1 篇 productivity
  • 1 篇 passive acoustic...
  • 1 篇 libraries
  • 1 篇 roads
  • 1 篇 relays

机构

  • 6 篇 the state key la...
  • 5 篇 zhejiang univers...
  • 5 篇 singapore manage...
  • 4 篇 school of comput...
  • 4 篇 software enginee...
  • 3 篇 zhejiang univers...
  • 3 篇 jiangxi provinci...
  • 3 篇 the hong kong po...
  • 3 篇 school of softwa...
  • 2 篇 management scien...
  • 2 篇 school of softwa...
  • 2 篇 school of comput...
  • 2 篇 guangdong provin...
  • 2 篇 harbin institute...
  • 2 篇 huanggang polyte...
  • 2 篇 guangzhou instit...
  • 2 篇 concordia univer...
  • 2 篇 guizhou provinci...
  • 2 篇 china mobile inf...
  • 2 篇 school of manage...

作者

  • 6 篇 lo david
  • 5 篇 xia xin
  • 5 篇 hu xing
  • 3 篇 xing hu
  • 3 篇 david lo
  • 3 篇 yang xiaohu
  • 3 篇 xin xia
  • 2 篇 xiong hu
  • 2 篇 lu yong
  • 2 篇 yuehua fan
  • 2 篇 li shanping
  • 2 篇 li zhiyang
  • 2 篇 jinquan nie
  • 2 篇 zhan qi
  • 2 篇 zhan xian
  • 2 篇 yeh kuo-hui
  • 2 篇 pan zhiyuan
  • 1 篇 scheider simon
  • 1 篇 simon elise
  • 1 篇 marconi campos-c...

语言

  • 27 篇 英文
  • 4 篇 其他
检索条件"机构=Software Solutions-Data Security and Data Management"
31 条 记 录,以下是1-10 订阅
排序:
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, Key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
PS3: Precise Patch Presence Test Based on Semantic Symbolic Signature  24
PS3: Precise Patch Presence Test Based on Semantic Symbolic ...
收藏 引用
44th ACM/IEEE International Conference on software Engineering, ICSE 2024
作者: Zhan, Qi Hu, Xing Li, Zhiyang Xia, Xin Lo, David Li, Shanping Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei China Singapore Management University Singapore
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论
A Cross-Chain Protocol Based on Main-SubChain Architecture  4
A Cross-Chain Protocol Based on Main-SubChain Architecture
收藏 引用
4th International Conference on Computer Science and Blockchain, CCSB 2024
作者: Zhang, Feng Le, Yu Wang, Rong Yuan, Minfu Tsai, Wei-Tek Dong, Yuansheng China Mobile Information Security Management and Operation Center Beijing China Guangzhou Institute of Software Guangzhou China College of Computer and Data Science Fuzhou University Arizona State University TempeAZ United States Huanggang Polytechnic College Huanggang China
Addressing the current surge in blockchain applications and the increasingly significant throughput and scalability challenges of single-chain systems, we propose a cross-chain protocol based on a main-subchain archit... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on software Engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
Code Search Is All You Need? Improving Code Suggestions with Code Search  24
Code Search Is All You Need? Improving Code Suggestions with...
收藏 引用
44th ACM/IEEE International Conference on software Engineering, ICSE 2024
作者: Chen, Junkai Hu, Xing Li, Zhenhao Gao, Cuiyun Xia, Xin Lo, David School of Software Technology Zhejiang University Ningbo China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Concordia University Montreal Canada Harbin Institute of Technology Shenzhen China Zhejiang University Hangzhou China Singapore Management University Singapore
Modern integrated development environments (IDEs) provide various automated code suggestion techniques (e.g., code completion and code generation) to help developers improve their efficiency. Such techniques may retri... 详细信息
来源: 评论
Integration of Process Optimization and Automation: A Way to AI Powered Digital Transformation
Integration of Process Optimization and Automation: A Way to...
收藏 引用
Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), International Conference on
作者: Kulasekhara Reddy Kotte Latha Thammareddi Divya Kodi Venkateswara Rao Anumolu Arun Kumar K Shubham Joshi SLRI Solutions INC India Project Management Operations India Cyber Security Senior Data Analyst Truist Financial India Technical Architect ERP Solutions- Information Technology India Big Data Architect India Department of Computer Science & Engineering Bipin Tripathi Kumaon Institute of Technology Almora India
One of the most important factors facilitating AI-powered digital transformation is the combination of process automation and optimisation. Organisations may improve operational efficacy, save costs, and streamline pr... 详细信息
来源: 评论
A Secure Device management Scheme with Audio-Based Location Distinction in IoT
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第1期138卷 939-956页
作者: Haifeng Lin Xiangfeng Liu Chen Chen Zhibo Liu Dexin Zhao Yiwen Zhang Weizhuang Li Mingsheng Cao College of Economics and Management Nanjing University of Aeronautics and AstronauticsNanjing211106China Chengdu Aircraft Industrial(Group)Co. Ltd.Chengdu610073China Academy of Military Sciences of PLA Beijing100091China School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China Ningbo Web King Technology Joint Stock Co. Ltd.Ningbo315000China The Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using a... 详细信息
来源: 评论
PS3: Precise Patch Presence Test Based on Semantic Symbolic Signature
PS3: Precise Patch Presence Test Based on Semantic Symbolic ...
收藏 引用
International Conference on software Engineering (ICSE)
作者: Qi Zhan Xing Hu Zhiyang Li Xin Xia David Lo Shanping Li The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei China Singapore Management University Singapore
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论
Attribute-Based data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
PS3: Precise Patch Presence Test based on Semantic Symbolic Signature
arXiv
收藏 引用
arXiv 2023年
作者: Zhan, Qi Xia, Xin Hu, Xing Lo, David Li, Zhiyang Li, Shanping The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab China Singapore Management University Singapore Zhejiang University Hangzhou China
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论