咨询与建议

限定检索结果

文献类型

  • 74 篇 期刊文献
  • 14 篇 会议

馆藏范围

  • 88 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 71 篇 工学
    • 48 篇 计算机科学与技术...
    • 23 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 10 篇 信息与通信工程
    • 9 篇 网络空间安全
    • 7 篇 材料科学与工程(可...
    • 5 篇 控制科学与工程
    • 4 篇 软件工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 生物医学工程(可授...
    • 1 篇 测绘科学与技术
    • 1 篇 地质资源与地质工...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 船舶与海洋工程
  • 28 篇 理学
    • 23 篇 数学
    • 2 篇 地球物理学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 天文学
    • 1 篇 地质学
    • 1 篇 系统科学
    • 1 篇 生态学
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 法学
    • 1 篇 公安学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学

主题

  • 88 篇 data security
  • 12 篇 cloud computing
  • 10 篇 cryptography
  • 9 篇 数据安全
  • 7 篇 data privacy
  • 6 篇 blockchain
  • 5 篇 access control
  • 5 篇 big data
  • 4 篇 privacy protecti...
  • 3 篇 data integrity
  • 3 篇 digital signatur...
  • 3 篇 protocols
  • 3 篇 internet softwar...
  • 3 篇 information secu...
  • 3 篇 other topics in ...
  • 2 篇 deep learning
  • 2 篇 computer vision ...
  • 2 篇 neural nets
  • 2 篇 data sharing
  • 2 篇 privacy-preservi...

机构

  • 1 篇 school of comput...
  • 1 篇 school of mathem...
  • 1 篇 college of harbo...
  • 1 篇 department of co...
  • 1 篇 state grid jiang...
  • 1 篇 research and dev...
  • 1 篇 department of co...
  • 1 篇 school of manage...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 future technolog...
  • 1 篇 information and ...
  • 1 篇 oak ridge nation...
  • 1 篇 school of comput...
  • 1 篇 state key labora...
  • 1 篇 shenzhen researc...
  • 1 篇 turabah universi...
  • 1 篇 department of in...
  • 1 篇 hunan engineerin...

作者

  • 2 篇 imran khan
  • 2 篇 徐洁磐
  • 2 篇 abdallah abdalla...
  • 2 篇 liu jian
  • 1 篇 k.sudharson
  • 1 篇 tang jiang
  • 1 篇 庞婷
  • 1 篇 noor ahmed sheik...
  • 1 篇 b.veerender redd...
  • 1 篇 邹纯龙
  • 1 篇 yang jun
  • 1 篇 夏庆霖
  • 1 篇 n.z.jhanjhi
  • 1 篇 dibin shan
  • 1 篇 muhammad usman s...
  • 1 篇 g.prasad acharya
  • 1 篇 kentaroh toyoda
  • 1 篇 amjad hussain za...
  • 1 篇 wei qiu
  • 1 篇 hongqian chen

语言

  • 66 篇 英文
  • 22 篇 中文
检索条件"主题词=Data security"
88 条 记 录,以下是41-50 订阅
排序:
Privacy beyond sensitive values
收藏 引用
Science China(Information Sciences) 2015年 第7期58卷 172-186页
作者: HUANG XueZhen LIU JiQiang HAN Zhen YANG Jun School of Computer and Information Technology Beijing Jiaotong University
Privacy-preserving data publishing(PPDP) has become one of the hot topics in the field of network security. The existing privacy-preserving work cannot deal with vulnerability in sensitivity, under which an attacker c... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Securing Cloud Storage by Remote data Integrity Check with Secured Key Generation
收藏 引用
Chinese Journal of Electronics 2021年 第3期30卷 489-499页
作者: Abdul Rehman LIU Jian Muhammad Qasim Yasin LI Keqiu College of Intelligence and Computing Tianjin University Tianjin Key Laboratory of Advance Networking National University of Modern Languages Faisalabad Campus
In recent decades, a number of protocols for Remote data integrity checking(RDIC) have been proposed. Identity(ID) based RDIC protocols are constructed to guarantee cloud data integrity and data privacy. The known pro... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure Scalar Product Protocols
收藏 引用
Chinese Journal of Electronics 2021年 第6期30卷 1059-1068页
作者: LI Shundong ZHANG Mengyu XU Wenting School of Computer Science Shaanxi Normal University
Secure scalar product computation is a special secure multi-party computation problem. A secure scalar product protocol can be used by two parties to jointly compute the scalar product of their private vectors without... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Extraction security of Sequential Aggregate Signatures
收藏 引用
Chinese Journal of Electronics 2021年 第5期30卷 885-894页
作者: ZHAI Jiaqi LIU Jian CHEN Lusheng School of Mathematical Sciences Nankai University School of Cybersecurity College of Intelligence and ComputingTianjin University
Aggregate signature schemes enable anyone to compress many signatures into one.Besides the unforgeability of aggregate signature,another property called aggregate extraction sometimes is useful.In sequential aggregate... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Asynchronous Quasi-Cloud/Edge/Client Collaborative Federated Learning Mechanism for Fault Diagnosis
收藏 引用
Chinese Journal of Electronics 2021年 第5期30卷 969-977页
作者: MA Xue WEN Chenglin School of Automation Hangzhou Dianzi University School of Automation Guangdong University of Petrochemical Technology
Although the federated learning method has the ability to balance data and protect data privacy by means of model aggregation, while the existing methods are difficult to achieve the effectiveness of centralized learn... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Securing Cloud data Using a Pirate Scheme
收藏 引用
Chinese Journal of Electronics 2017年 第6期26卷 1289-1296页
作者: CHENG Hongbing QIAN Manyun YU Shui College of Computer Science Zhejiang University of Technology State Key Laboratory for Novel Software Technology Nanjing University School of Information Technology Deakin University
Inspired by the approach of smart pirates dealing with their treasures, the paper proposed a scheme to protect the data security and privacy in cloud computing. In the proposed scheme, cloud data will be divided into ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure Cloud Architecture for 5G Core Network
收藏 引用
Chinese Journal of Electronics 2021年 第3期30卷 516-522页
作者: LI Lingshu WU Jiangxing HU Hongchao LIU Wenyan GUO Zehua PLA Strategic Support Force Information Engineering University Beijing Institute of Technology
Service-based architecture(SBA) is a profound advancement in the novel 5 G Core network(5 GC). Existing studies show that SBA can benefit from cloud computing to achieve extensibility, modularity,reusability, and open... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Targeted Adversarial Examples Generating Method Based on cVAE in Black Box Settings
收藏 引用
Chinese Journal of Electronics 2021年 第5期30卷 866-875页
作者: YU Tingyue WANG Shen ZHANG Chunrui WANG Zhenbang LI Yetian YU Xiangzhan School of Cyberspace Science Harbin Institute of Technology Institute of Computer Application China Academy of Engineering Physics State Grid Heilongjiang Power Co. Ltd.
In recent years, adversarial examples has become one of the most important security threats in deep learning applications. For testing the security of deep learning models in adversarial environment,many researches fo... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks
收藏 引用
Chinese Journal of Electronics 2021年 第5期30卷 947-955页
作者: DU Hongzhen WEN Qiaoyan ZHANG Shanshan GAO Mingchu School of Mathematics and Information Science Baoji University of Arts and Sciences State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications School of Telecommunications Engineering Xidian University Department of Mathematics Louisiana College
Vehicular ad hoc networks(VANETs) create an vital platform for communication between vehicles,which can realize accident warning, auxiliary driving, road traffic information query, passenger communication and other ap... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Importance of the reputation of data manager in the acceptance of connected vehicles
收藏 引用
Communications in Transportation Research 2022年 第1期2卷 24-32页
作者: Sailesh Acharya Michelle Mekker Department of Civil and Environmental Engineering Utah State UniversityLoganUT84322-4110USA
With the known evidence that potential connected vehicle(CV)users are worried about sharing data because of the associated data privacy and security issues,this study investigates the importance of the reputation of t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论