咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 19 篇 期刊文献

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 工学
    • 23 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 5 篇 信息与通信工程
    • 4 篇 电气工程
    • 4 篇 控制科学与工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 网络空间安全
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 6 篇 理学
    • 5 篇 生物学
    • 2 篇 数学
    • 2 篇 化学
    • 1 篇 统计学(可授理学、...
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
    • 2 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 5 篇 deep learning
  • 4 篇 cloud computing
  • 4 篇 training
  • 3 篇 reinforcement le...
  • 3 篇 unceratinty
  • 3 篇 data mining
  • 3 篇 cloud model
  • 3 篇 trust model
  • 3 篇 feature extracti...
  • 3 篇 context aware
  • 3 篇 biological syste...
  • 3 篇 bayesian network
  • 2 篇 runtime
  • 2 篇 big data
  • 2 篇 authentication
  • 2 篇 wireless sensor ...
  • 2 篇 annotations
  • 2 篇 machine learning
  • 2 篇 encryption
  • 2 篇 privacy

机构

  • 6 篇 guangxi key labo...
  • 4 篇 national languag...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 3 篇 key lab of infor...
  • 3 篇 tianjin key labo...
  • 2 篇 central china no...
  • 2 篇 college of compu...
  • 2 篇 guangxi key lab ...
  • 2 篇 school of comput...
  • 2 篇 software center ...
  • 2 篇 guangxi key labo...
  • 2 篇 national languag...
  • 2 篇 haihe lab of ita...
  • 2 篇 guangxi key lab ...
  • 2 篇 state key labora...
  • 2 篇 college of compu...
  • 2 篇 school of softwa...
  • 2 篇 school of mathem...
  • 2 篇 key lab of netwo...

作者

  • 4 篇 weizhong zhao
  • 4 篇 tingting he
  • 4 篇 xingpeng jiang
  • 4 篇 meng deyu
  • 3 篇 jingfeng xue
  • 3 篇 zhenyan liu
  • 3 篇 bo jin
  • 3 篇 muhammad adnan k...
  • 3 篇 yong wang
  • 2 篇 xiong hu
  • 2 篇 yang yi
  • 2 篇 hussam al hamadi
  • 2 篇 huimin zhang
  • 2 篇 cao xiangyong
  • 2 篇 atifa athar
  • 2 篇 li kaiyu
  • 2 篇 qian xueming
  • 2 篇 he tingting
  • 2 篇 sagheer abbas
  • 2 篇 zhao weizhong

语言

  • 43 篇 英文
检索条件"机构=Software Technology and Network Security Lab"
43 条 记 录,以下是41-50 订阅
排序:
A Trust Model Based on Cloud Model and Bayesian networks
A Trust Model Based on Cloud Model and Bayesian Networks
收藏 引用
2011 2nd International Conference on Challenges in Environmental Science and Computer Engineering (CESCE 2011)
作者: Bo Jin Yong Wang Zhenyan Liu Jingfeng Xue Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) Shanghai School of Software Beijing Institute of Technology
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The app... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
security Analysis of Two Password Authentication Schemes
Security Analysis of Two Password Authentication Schemes
收藏 引用
第八届国际移动商务会议(Eighth International Conference on Mobile Business)
作者: Zuowen Tan School of Information Technology Jiangxi University of Finance & EconomicsNanchang 330013JiangxiChina State Key Laboratory of Information Security Institute of Software of Chinese Academy of SciencesBeijing 100080China Key Lab of Network Security and
Recently,Rhee,Kwon and Lee proposed a practical authentication scheme only based on the common storage *** the scheme the remote user does not need to use smart *** is convenient for the users to use a common storage ... 详细信息
来源: 评论