咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是191-200 订阅
排序:
Quantum-Enhanced Blockchain: A Secure and Practical Blockchain Scheme
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 259-277页
作者: Ang Liu Xiu-Bo Chen Gang Xu Zhuo Wang Xuefen Feng Huamin Feng Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Network and Information Management Division Beijing Electronic Science and Technology InstituteBeijing100070China School of Information Science and Technology North China University of TechnologyBeijing100144China School of Artificial Intelligence Beijing University of Posts TelecommunicationsBeijing100876China Mathematics Teaching and Research Center Beijing Fengtai Yihai High SchoolBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China
The rapid advancement of quantum technology poses significant security risks to blockchain ***,quantum technology can also provide solutions for enhancing blockchain *** this paper,we propose a quantum-enhanced blockc... 详细信息
来源: 评论
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1405-1414页
作者: Wei Zhou Xing Jiang Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China The 34th Research Institute of China Electronics Technology Group Corporation Guilin541004China Guangxi Key Laboratory of Optical Network and Optical Information Security Guilin541004China State Key Laboratory of Information Photonics and Optical Communications BeijingUniversity of Posts and TelecommunicationsBeijing100876China Department of Electrical and Computer Engineering University of New MexicoAlbuquerqueNM87131USA
In Software-Defined networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... 详细信息
来源: 评论
A PRC based key management method for wireless sensor networks
A PRC based key management method for wireless sensor networ...
收藏 引用
2010 IEEE International Conference on Information Theory and Information security, ICITIS 2010
作者: Li, Dong Yang, Yixian Xin, Yang Tian, Bin State Key Laboratory of Networking and Switching Technology Information Security Center Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing China Beijing Safe-Code Technology Co. Ltd. Beijing China
Wireless sensor networks are often deployed in hostile and unattended environments. Then two important problems for key management are presented. First, how to establish the encryption keys among sensor nodes to ensur... 详细信息
来源: 评论
CPSec manager: Secure content protection management technology with time and space constraint for E-document
CPSec manager: Secure content protection management technolo...
收藏 引用
2011 International Conference on Consumer Electronics, Communications and networks, CECNet 2011
作者: Xi-Xi, Yan Zhao-Feng, Ma Xiao-Feng, Lu Yi-Xian, Yang Xin-Xin, Niu Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China Beijing National Security Science and Technology Co. Ltd. Beijing 100086 China
In this paper, a secure Content protection Secure Management Scheme about electronic documents (named CPSec EDMS) will be proposed, in which the architecture, key technology and authorization protocol, security analys... 详细信息
来源: 评论
A new image restoration model based on the adaptive total variation
A new image restoration model based on the adaptive total va...
收藏 引用
International Conference on Digital Manufacturing and Automation
作者: Zhao, Feng Shi, Mingzhu Xu, Tingfa Wireless Network Laboratory Beijing University of Posts and Telecommunications Beijing 100876 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai 200030 China Key Laboratory of Photo Electronic Imaging Technology and System Ministry of Education of China Beijing Institute of Technology Beijing 100081 China
Traditional total variation model leads to an undesirable staircase effect and is hard to eliminate high frequency noises in image restoration. In this paper, to solve this problem, a novel image restoration model bas... 详细信息
来源: 评论
A novel symbolic execution framework for multi-procedure program analysis
A novel symbolic execution framework for multi-procedure pro...
收藏 引用
2009 2nd IEEE International Conference on Broadband network and Multimedia technology, IEEE IC-BNMT2009
作者: Wenqing, Fan Hongling, Liang Yixian, Yang Guoai, Xu Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
Modern software systems, which are often largescale, with multi-procedure and complex data structures, must be extremely high quality. We present a novel framework based on symbolic execution for automatic analysis of... 详细信息
来源: 评论
An application of modified optimal-type elliptic curve blind signature scheme to threshold signature
An application of modified optimal-type elliptic curve blind...
收藏 引用
2nd International Conference on networking and Digital Society, lCNDS 2010
作者: Peng, Jianfen Zhou, Yajian Wang, Cong Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
Expression of blind message in the optimal-type blind signature scheme was modified so that it can combine with threshold signature, which leads to an effective threshold blind signature scheme based on elliptic curve... 详细信息
来源: 评论
TM-RMRP: A trust model based on a recommendation mechanism of rewards and punishments
TM-RMRP: A trust model based on a recommendation mechanism o...
收藏 引用
2nd International Workshop on Education technology and Computer Science, ETCS 2010
作者: Zeng, Shuai Xin, Yang Yang, Yi-Xian Hu, Zheng-Ming Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications China Beijing Safe-Code Technology Co. Ltd China
As trust management can address the new security challenges in pervasive computing environments, we present our pervasive trust model TM-RMRP which is composed of input factors and trust evaluation. With the model pre... 详细信息
来源: 评论
An implicit identity authentication method based on deep connected attention CNN for wild environment  2021
An implicit identity authentication method based on deep con...
收藏 引用
9th International Conference on Communications and Broadband networking, ICCBN 2021
作者: Yang, Wenqing Wang, Meilin Zou, Shihong Peng, Junhao Xu, Guosheng Beijing University of Posts and Telecommunications National Engineering Laboratory of Mobile Network Security Beijing China China Information Technology Security Evaluation Center Beijing China School of Math and Information Science Guangdong Prov. Key Laboratory Co-sponsored by Province and City of Information Security Technology Guangzhou University Guangzhou China
Continuous Implicit Authentication (CIA) provides a imperceptible and passive validation in a whole process of operating the mobile devices. In this paper, we describe users' behavioral patterns through the build-... 详细信息
来源: 评论
An efficient method for analyzing widget intent of android system  2021
An efficient method for analyzing widget intent of android s...
收藏 引用
9th International Conference on Communications and Broadband networking, ICCBN 2021
作者: Qi, Chunhao Shao, Shuai Guo, Yanhui Peng, Junhao Xu, Guosheng Beijing University of Posts and Telecommunications National Engineering Laboratory of Mobile Network Security Beijing China China Information Technology Security Evaluation Center Beijing China School of Math and Information Science Guangdong Prov. Key Laboratory Co-sponsored by Province and City of Information Security Technology Guangzhou University Guangzhou China
With the improvement of the status of mobile phones and other mobile terminals in life, the privacy protection of mobile phones is still a big problem. Aiming at the Android system, the mobile terminal operating syste... 详细信息
来源: 评论