咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是121-130 订阅
排序:
Seal-based secure boot scheme for trusted computing platform
收藏 引用
Journal of China Universities of Posts and Telecommunications 2010年 第SUPPL. 2期17卷 16-21页
作者: Song, Cheng Peng, Wei-Ping Xin, Yang Luo, Shou-Shan Zhu, Hong-Liang Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Safe-Code Technology Co. Ltd Beijing 100876 China
Secure boot is one important way to ensure the security of system for the terminal computing platform. The existing solutions for platform secure boot are based on verification by matching the reference measurements w... 详细信息
来源: 评论
A vulnerability test method for speech recognition systems based on frequency signal processing  3
A vulnerability test method for speech recognition systems b...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Yang, Honghao Liang, Dong Kuang, Xiaohui Xu, Changqiao Institute of Network Technology Beijing University of Posts and Telecommunications Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
With the development of information technology and the popularity of smart devices, voice recognition system, which is installed in many devices such as smartphones and automatic control equipment, is playing an incre... 详细信息
来源: 评论
An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems
收藏 引用
International Journal of Wireless and Mobile Computing 2019年 第1期16卷 41-49页
作者: Ye, Tao Cai, Yongquan Zhao, Xu Yang, Yongli Wang, Wei Zhu, Yi Faculty of Information Technology Beijing University of Technology Beijing China College of Computer Qinghai Nationalities University Xining China Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China College of Applied Sciences Beijing University of Technology Beijing100124 China
The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large,... 详细信息
来源: 评论
network traffic classification based on semi-supervised clustering
收藏 引用
Journal of China Universities of Posts and Telecommunications 2010年 第SUPPL. 2期17卷 84-88页
作者: Lin, Guan-Zhou Xin, Yang Niu, Xin-Xin Jiang, Hui-Bai Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Beijing Safe-Code Technology Co. Ltd Beijing 100876 China
The diminished accuracy of port-based and payload-based classification motivates use of transport layer statistics for network traffic classification. A semi-supervised clustering approach based on improved K-Means cl... 详细信息
来源: 评论
Quantum secure direct communication with cluster states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2010年 第7期53卷 1271-1275页
作者: CAO WeiFeng YANG YuGuang WEN QiaoYan College of Electric and Information Engineering Zhengzhou University of Light IndustryZhengzhou 450002China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China College of Computer Science and Technology Beijing University of TechnologyBeijing 100124China State Key Laboratory of Integrated Services Network Xidian UniversityXi’an 710071China State key Laboratory of Information Security Gradute University of Chinese Academy of Sciences Beijing 100049China
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol ca... 详细信息
来源: 评论
Variable-rate convolutional network coding
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第3期17卷 91-96,117页
作者: MA Song-ya CHEN Xiu-bo LUO Ming-xing Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China School of Mathematics and Information Sciences Henan University Kaifeng 475004 China
Four types of variable-rate convolutional network codes are investigated over a single-source finite cyclic network. It is found that variable-rate generic, dispersion and broadcast can be implemented on the same netw... 详细信息
来源: 评论
Secure AODV Routing Protocol Using SL Multi-Signcryption
收藏 引用
电子学报(英文版) 2007年 第2期16卷 311-314页
作者: ZHANG Chuanrong YIN Zhonghai ZHANG Yuqing XIAO Guozhen Telecommunication Engineering Institute A irforce Engineering University Xi ' an 710077 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China The Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism... 详细信息
来源: 评论
Passive Beamforming Design for Intelligent Reflecting Surface Assisted MIMO Systems
收藏 引用
China Communications 2021年 第3期18卷 18-28页
作者: Chenghao Feng Wenqian Shen Xinyu Gao Jianping An School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China Shaanxi Key Laboratory of Information Communication Network and Security Xian University of Posts and TelecommunicationsXianShaanxi 710121China Huawei Technologies Co.Ltd. Beijing 100085China
Intelligent reflecting surfaces(IRSs)constitute passive devices,which are capable of adjusting the phase shifts of their reflected signals,and hence they are suitable for passive *** this paper,we conceive their desig... 详细信息
来源: 评论
An Overview of General Theory of security
收藏 引用
China Communications 2017年 第7期14卷 1-10页
作者: Min Lei Yixian Yang Xinxin Niu Yu Yang Jie Hao Information Security Center Beijing University of Posts and Telecommunications Guizhou University Guizhou Provincial Key Laboratory of Public Big Data Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... 详细信息
来源: 评论
Construction of Integrated protection System for Industrial Control System Based on Trusted Computing
Construction of Integrated Protection System for Industrial ...
收藏 引用
2021 International Conference on Intelligent Computing, Automation and Applications, ICAA 2021
作者: Tao, Yuan Hu, Wei Li, Sheng Third Research Institute of Ministry of Public Security Shanghai China National Engineering Laboratory for Key Technology of Classified Information Security Protection Beijing China
Industrial control system requires high availability. In principle, security measures should not adversely affect the basic functions of high availability industrial control system. The method of building a secure and... 详细信息
来源: 评论