工学 >>> 信息与通信工程 >>> 信息处理技术 通信技术 广播与电视工程技术 雷达工程
搜索结果: 1-14 共查到信息与通信工程 security相关记录14条 . 查询时间(0.249 秒)
Graphical security models provide an intuitive but systematic approach to analyze security weaknesses of systems and to evaluate potential protection measures. Cyber security researchers, as well as s...
The third IEEE International Workshop on Trust and Security in Wireless Sensor Networks (TrustWSN 2017), in conjunction with "The 16th IEEE International Conference on Trust, Security and Privacy in C...
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, ...
IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise a...
IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise a...
Cyber-physical systems (CPS) are ubiquitous in critical infrastructures such as electrical power generation, transmission, and distribution networks, water management, medical systems management, and ...
SECRYPT is an annual international conference covering research in information and communication security. The 13th International Conference on Security and Cryptography (SECRYPT 2016) will be held in...
The Federal Geographic Data Committee (FGDC) Homeland Security Working Group (HSWG) ensures that the National Spatial Data Infrastructure (NSDI) supports the preparation for, prevention of, protection...
The protection of sensitive healthcare information has been a concern since the Common Law of Confidentiality and its protection of the doctor-patient relationship. Although there was no legislation s...
Traditionally, spread-spectrum systems have been employed to provide low probability-of-intercept (LPI) and low probability-of-detection (LPD) performances at the physical layer, but the messages tran...
This dissertation focuses on both theoretic and practical aspects of using a new approach, dynamic secrets, to provide secrecy to cryptographic keys in secure communications. In the conventional parad...
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
This work aims to investigate how the Security-by-Contract (SxC)paradigm, developed for providing security assurances to mobileapplications, can be used for guaranteeing the security ofcommunicating s...
The question of how well radio-frequency identification (RFID) technology can maintain security in business applications continues to plague both information system developers and endconsumers. Today’...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...