咨询与建议

限定检索结果

文献类型

  • 100 篇 期刊文献
  • 14 篇 会议

馆藏范围

  • 114 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 95 篇 工学
    • 62 篇 计算机科学与技术...
    • 40 篇 电气工程
    • 36 篇 电子科学与技术(可...
    • 32 篇 网络空间安全
    • 14 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 14 篇 软件工程
    • 8 篇 材料科学与工程(可...
    • 7 篇 仪器科学与技术
    • 6 篇 机械工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 生物医学工程(可授...
    • 2 篇 测绘科学与技术
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
  • 44 篇 理学
    • 37 篇 数学
    • 3 篇 物理学
    • 3 篇 生物学
    • 2 篇 天文学
    • 2 篇 地球物理学
    • 1 篇 化学
    • 1 篇 地质学
  • 19 篇 管理学
    • 19 篇 管理科学与工程(可...
  • 9 篇 军事学
    • 9 篇 军队指挥学
  • 5 篇 法学
    • 3 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 114 篇 data security
  • 17 篇 cryptography
  • 12 篇 数据安全
  • 12 篇 cloud computing
  • 11 篇 blockchain
  • 7 篇 internet softwar...
  • 7 篇 data privacy
  • 6 篇 privacy protecti...
  • 5 篇 access control
  • 5 篇 big data
  • 5 篇 other topics in ...
  • 4 篇 data integrity
  • 4 篇 computer vision ...
  • 4 篇 feature extracti...
  • 4 篇 protocols
  • 4 篇 cloud storage
  • 3 篇 pattern classifi...
  • 3 篇 invasive softwar...
  • 3 篇 digital signatur...
  • 3 篇 algebra

机构

  • 3 篇 school of comput...
  • 2 篇 state key labora...
  • 2 篇 pla strategic su...
  • 2 篇 school of comput...
  • 2 篇 university of ch...
  • 2 篇 school of cybers...
  • 2 篇 china electronic...
  • 2 篇 trusted computin...
  • 2 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 school of mathem...
  • 1 篇 college of harbo...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 state grid jiang...
  • 1 篇 research and dev...
  • 1 篇 department of co...
  • 1 篇 school of manage...
  • 1 篇 department of co...
  • 1 篇 department of co...

作者

  • 2 篇 imran khan
  • 2 篇 徐洁磐
  • 2 篇 wang shen
  • 2 篇 abdallah abdalla...
  • 2 篇 willy susilo
  • 2 篇 li chao
  • 2 篇 zhou yanwei
  • 2 篇 liu jian
  • 2 篇 马海群
  • 2 篇 zhang yi
  • 2 篇 yu xiangzhan
  • 1 篇 yang qiliang
  • 1 篇 k.sudharson
  • 1 篇 le-you zhang
  • 1 篇 tang jiang
  • 1 篇 庞婷
  • 1 篇 noor ahmed sheik...
  • 1 篇 b.veerender redd...
  • 1 篇 wang binqiang
  • 1 篇 ma jianfeng

语言

  • 96 篇 英文
  • 18 篇 中文
检索条件"主题词=Data security"
114 条 记 录,以下是21-30 订阅
排序:
Rectangle Attack Against Type-I Generalized Feistel Structures
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 713-720页
作者: ZHANG Yi LIU Guoqiang SHEN Xuan LI Chao College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering Research Center of Commercial Cryptography Theory and Technology Innovation State Key Laboratory of Information security Institute of Information Engineering Chinese Academy of Sciences College of Information and Communication National University of Defense Technology
Type-I generalized Feistel networks(GFN) are widely used frameworks in symmetric-key primitive designs such as CAST-256 and Lesamnta. Different from the extensive studies focusing on specific block cipher instances, t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Binary Image Steganalysis Based on Symmetrical Local Residual Patterns
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 752-763页
作者: LUO Junwei YU Mujian YIN Xiaolin LU Wei School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security TechnologyMinistry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University
Residual computation is an effective method for gray-scale image steganalysis. For binary images, the residual computation calculated by the XOR operation is also employed in the local residual patterns(LRP) model for... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Enhanced Privacy Preserving for Social Networks Relational data Based on Personalized Differential Privacy
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 741-751页
作者: KANG Haiyan JI Yuanrui ZHANG Shuxuan School of Information Management Beijing Information Science and Technology University Computer School Beijing Information Science and Technology University
With the popularization and development of social software, more and more people join the social network, which produces a lot of valuable information, but also contains plenty of sensitive privacy information. To ach... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Novel Trustworthiness Measurement Model Based on Weight and User Feedback
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 612-625页
作者: ZHOU Wei MA Yanfang PAN Haiyu School of Computer Science and Technology Huaibei Normal University School of Computer Science and Information Engineering Changzhou Institute of Technology School of Computer Science and Information security Guilin University of Electronic Technology
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Double-Layer Positional Encoding Embedding Method for Cross-Platform Binary Function Similarity Detection
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 604-611页
作者: JIANG Xunzhi WANG Shen YU Xiangzhan GONG Yuxin School of Cyberspace Science Harbin Institute of Technology
The similarity detection between two cross-platform binary functions has been applied in many fields, such as vulnerability detection, software copyright protection or malware classification. Current advanced methods ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Android Malware Detection Method Based on Permission Complement and API Calls
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 773-785页
作者: YANG Jiyun TANG Jiang YAN Ran XIANG Tao College of Computer Science Chongqing University
The dynamic code loading mechanism of the Android system allows an application to load executable files externally at runtime. This mechanism makes the development of applications more convenient, but it also brings s... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Cooperative security Monitoring Mechanism Aided by Optimal Multiple Slave Cluster Heads for UASNs
收藏 引用
China Communications 2023年 第5期20卷 148-169页
作者: Yougan Chen Wei Wang Xiang Sun Yi Tao Zhenwen Liu Xiaomei Xu Key Laboratory of Underwater Acoustic Communication and Marine Information Technology Xiamen UniversityXiamen 361005China Shenzhen Research Institute of Xiamen University Shenzhen 518000China Dongshan Swire Marine Station College of Ocean and Earth SciencesXiamen UniversityXiamen 361102China State Key Laboratory of Robotics Shenyang Institute of AutomationChinese Academy of SciencesShenyang 110016China Department of Electrical and Computer Engineering University of New MexicoAlbuquerqueNM 87131USA College of Harbour and Coastal Engineering Jimei UniversityXiamen 361021China
As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very *** this paper,a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Hybrid Approach for Privacy Enhancement in data Mining Using Arbitrariness and Perturbation
收藏 引用
Computer Systems Science & Engineering 2023年 第3期44卷 2293-2307页
作者: B.Murugeshwari S.Rajalakshmi K.Sudharson Department of Computer Science and Engineering Velammal Engineering CollegeChennai600066India Department of Information Technology Velammal Institute of TechnologyChennai601204India
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this *** several data mining methods,privacy has beco... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3011-3026页
作者: Amjad Hussain Zahid Muhammad Junaid Arshad Musheer Ahmad Naglaa F.Soliman Walid El-Shafai School of Systems and Technology University of Management and TechnologyLahore54700Pakistan Department of Computer Science University of Engineering and TechnologyLahore54700Pakistan Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chao... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Secure Method for data Storage and Transmission in Sustainable Cloud Computing
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 2741-2757页
作者: Muhammad Usman Sana Zhanli Li Tayybah Kiren Hannan Bin Liaqat Shahid Naseem Atif Saeed College of Computer Science and Technology Xi’an University of Science and TechnologyXi’anShaanxi710054China Department of Computer Science(RCET Campus) University of Engineering and TechnologyLahore39161Pakistan Department of Information Sciences Division of Science&TechnologyUniversity of EducationLahore54700Pakistan Department of Computer Science COMSATS UniversityIslamabadLahore54700Pakistan
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论