咨询与建议

限定检索结果

文献类型

  • 1,069 篇 会议
  • 1,001 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,072 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,372 篇 工学
    • 902 篇 计算机科学与技术...
    • 694 篇 软件工程
    • 440 篇 信息与通信工程
    • 197 篇 电子科学与技术(可...
    • 182 篇 电气工程
    • 139 篇 控制科学与工程
    • 92 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 77 篇 机械工程
    • 73 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 36 篇 土木工程
    • 36 篇 交通运输工程
    • 35 篇 航空宇航科学与技...
  • 609 篇 理学
    • 386 篇 数学
    • 137 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 365 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 36 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 164 篇 school of comput...
  • 160 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 71 篇 state key labora...
  • 62 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 school of inform...
  • 31 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 29 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,814 篇 英文
  • 150 篇 其他
  • 111 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2072 条 记 录,以下是1991-2000 订阅
排序:
key management in ad hoc networks using self-certified public key system
收藏 引用
International Journal of Mobile Communications 2007年 第1期5卷 94-106页
作者: Fagen, Li Xiangjun, Xin Yupu, Hu Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi 710071 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China
As various applications of ad hoc network have been proposed, security issues have become a central concern and are increasingly important. In this paper, we propose a distributed key management approach by using the ... 详细信息
来源: 评论
An Iris Biometric-Based Digital Multimedia Content Protection Scheme
收藏 引用
电子学报(英文版) 2007年 第2期16卷 271-275页
作者: FAN Kefeng WANG Meihua MO Wei WANG Zhanwu PEI Qingqi SHEN Ji Key Laboratory of Computer Networks and Information Security of MOE Xidian University Xi'an 710071 China Beijing Information Technology Institute Beijing 100101 China China Electronics Standardization Institute Beijing 100007 China
A Multimedia content protection (MCP) scheme based on joint iris code of the user and cryptography technologies is proposed in this paper. This scheme is novel by introducing iris-based identification into authenticat... 详细信息
来源: 评论
Hybrid heuristic for total flowtime minimization in no-wait flow shops
Hybrid heuristic for total flowtime minimization in no-wait ...
收藏 引用
11th International Conference on computer Supported Cooperative Work in Design, CSCWD 2007
作者: Zhu, Xia Li, Xiaoping Wang, Qian School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PH1 (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co... 详细信息
来源: 评论
Secure AODV Routing Protocol Using SL Multi-Signcryption
收藏 引用
电子学报(英文版) 2007年 第2期16卷 311-314页
作者: ZHANG Chuanrong YIN Zhonghai ZHANG Yuqing XIAO Guozhen Telecommunication Engineering Institute A irforce Engineering University Xi ' an 710077 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China The Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism... 详细信息
来源: 评论
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 17-20页
作者: LI Fagen HU Yupu LIU Shuanggen Key Laboratory of Computer Networks and InformationSecurity Ministry of Education Xidian University Xi'an 710071Shaanxi China College of Computer Information Engineering JiangxiNormal University Nanchang 330022 Jiangxi China
Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we... 详细信息
来源: 评论
Related-key impossible differential attacks on 31-round SHACAL-2
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 54-58页
作者: Yang, Shao-Ping Hu, Yu-Pu Zhong, Ming-Fu Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
SHACAL-2 is a block cipher of NESSIE selections. Recently, analysis of SHACAL-2 become the cryptology hotspot. The security of SHACAL-2 was discussed by using related-key impossible differential cryptanalysis. An 18-r... 详细信息
来源: 评论
A pairing-based signcryption scheme using self-certified public keys
收藏 引用
International Journal of computers and Applications 2007年 第3期29卷 278-282页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi 710071 China
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key gener... 详细信息
来源: 评论
Universally composable anonymous Hash certification model
收藏 引用
Science in China(Series F) 2007年 第3期50卷 440-455页
作者: ZHANG Fan MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian UniversityXi'an 710071 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dongBuk-ku Daeyu 702-701 Korea
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica... 详细信息
来源: 评论
Linear-Differential Cryptanalysis for SPN Cipher Structure and AES
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 37-40页
作者: WEI Yongzhuang HU Yupu Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi' an 710071 Shaanxi China Guilin University of Electronic Technology Guilin541004 Guangxi China
A new attack on block ciphers is introduced, which is termed linear-differential cryptanalysis. It bases the combining of linear cryptanalysis and differential cryptanalysis, and works by using linear-differential pro... 详细信息
来源: 评论
Dynamic mix anonymity algorithm for wireless ad hoc networks
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2007年 第4期44卷 560-566页
作者: Wu, Zhenqiang Ma, Jianfeng Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China College of Computer Science Shaanxi Normal University Xi'an 710062 China
A wireless ad hoc network is subject to various security attacks. The encryption and authentication methods protect communication partners from disclosure of their secret messages but cannot prevent traffic analysis. ... 详细信息
来源: 评论