×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
研究生院
1
个人在本单位外知识产出
11
作者
贾维嘉
3
骆宗伟
3
吴盖宇
1
ASPALTER Christian
1
文献类型
期刊论文
9
会议论文
2
著作章节
1
发表日期
2021
1
2017
1
2014
1
2012
3
2011
1
2006
1
更多...
语种
英语English
11
收录类别
SCIE
4
CPCI-S
2
资助机构
关键词
System security
3
9/11 attack, vulnerabilitie...
1
Access control
1
Administration of Social Po...
1
Application of internationa...
1
Authorization
1
更多...
出处
Beijing Daxue Xuebao (Ziran...
1
Computer Communications
1
Guofang Keji Daxue Xuebao/J...
1
IEEE Communications Letters
1
IEEE Transactions on Mobile...
1
Journal of Intelligent Info...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共12条,第1-10条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning
期刊论文
IEEE Transactions on Mobile Computing,2021, 卷号: 22, 期号: 1, 页码: 237-252
作者:
Qian, Liping
;
Wu, Yuan
;
Yu, Ningning
;
Wang, Daohang
;
Jiang, Fuli
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2021/05/10
and Joint Computation and Communication Resource Allocations
Communication system security
Energy consumption
Multi-Access Mobile Edge Computing
Optimization
Resource management
Secrecydriven Computation Offloading
Servers
Task analysis
Wireless communication
Fog-based evaluation approach for trustworthy communication in sensor-cloud system
期刊论文
IEEE Communications Letters,2017, 卷号: 21, 期号: 11, 页码: 2532-2535
作者:
Wang, Tian
;
Li, Yang
;
Chen, Yonghong
;
Tian, Hui
;
Cai, Yiqiao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/05/10
least squares
multiple linear regression
security
Sensor-cloud system
trust
Automated enforcement for relaxed information release with reference points
期刊论文
Science China Information Sciences,2014, 卷号: 57, 期号: 11, 页码: 1-19
作者:
Sun,Cong
;
Xi,Ning
;
Gao,Sheng
;
Chen,Zhong
;
Ma,Jian Feng
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2025/08/05
declassification
information flow
noninterference
program analysis
pushdown system
security policy
Port Security: The ISPS Code
著作章节
出自: The Blackwell Companion to Maritime Economics, UK:Wiley-Blackwell, 2012, 页码: 674-700
作者:
Ng, Adolf K.Y.
;
Vaggelas, George K.
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2021/05/27
9/11 attack, vulnerabilities in transportation
Application of international guidelines locally, lacking
Global trade system, disruption
ISPS code and obligations of ports
New " securitized port environment"
Port of hong kong, three-tiered security levels
Port security
Port security, and counter-terrorism
Ports, intermodal logistical supply
Dual system encryption revisited: Attaining fully secure identity-based encryption and its extensions
期刊论文
Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology,2012, 卷号: 34, 期号: 2, 页码: 6-9
作者:
Luo,Song
;
Chen,Yu
;
Chen,Zhong
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2025/08/05
Dual system encryption
Full security
Identity-based encryption
Declassification enforcement on program with reachability analysis of pushdown system
期刊论文
Ruan Jian Xue Bao/Journal of Software,2012, 卷号: 23, 期号: 8, 页码: 2149-2162
作者:
Sun,Cong
;
Tang,Li Yong
;
Chen,Zhong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Automated verification
Declassification
Information flow security
Program analysis
Pushdown system
Research challenges towards the Future Internet
期刊论文
Computer Communications,2011, 卷号: 34, 期号: 18, 页码: 2115-2134
作者:
Conti, Marco
;
Chong, Song
;
Fdida, Serge
;
Jia, Weijia
;
Karl, Holger
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/05/10
Cognitive networks
Data and communication security
Future internet
Green networking
Internet architecture and protocols
Optical networks
System security
Wireless networks
Experimental analysis of an RFID security protocol
会议论文
Proceedings - IEEE International Conference on e-Business Engineering, ICEBE 2006, Shanghai, China, OCT 24-26, 2006
作者:
Luo, Zongwei
;
Chan, Terry
;
Li, Jenny S.
;
Wong, Edward
;
Cheung, William
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/11/25
RFID applications
Sensor systems
System security
A lightweight mutual authentication protocol for RFID networks
会议论文
Proceedings - ICEBE 2005: IEEE International Conference on e-Business Engineering, Beijing, China, OCT 18-21, 2005
作者:
Luo, Zongwei
;
Chan, Terry
;
Li, Jenny S.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2021/11/25
Sensor systems and RFID applications
System security
Analysis on combined security efficiency and vulnerability for information system security evaluation
期刊论文
Beijing Daxue Xuebao (Ziran Kexue Ban)/Acta Scientiarum Naturalium Universitatis Pekinensis,2005, 卷号: 41, 期号: 3, 页码: 484-490
作者:
Duan,Yunsuo
;
Liu,Xin
;
Chen,Zhong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Criterion
Evaluation
Information system
Security level