咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是491-500 订阅
排序:
DMAT: A new network and computer attack classification
收藏 引用
Journal of Engineering Science and technology Review 2013年 第5期6卷 101-106页
作者: Jiang, Wei Tian, Zhi-Hong Cui, Xiang College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha 410073 China Key Laboratory of Information and Network Security Ministry of Public Security Shanghai 201204 China School of Computer Science and Technology Harbin Institute of Technology Haerbin 150001 China The Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
With the rapid development of computer network and information technology, the Internet has been suffering from a variety of security attacks over the past few years. Attacks have become both numerous and complex, and... 详细信息
来源: 评论
Changes of net primary productivity in China during recent 11 years detected using an ecological model driven by MODIS data
收藏 引用
Frontiers of Earth Science 2013年 第1期7卷 112-127页
作者: Yibo LIU Weimin JU Honglin HE Shaoqiang WANG Rui SUN Yuandong ZHANG Jiangsu Provincial Key Laboratory of Geographic Information Science and Technology Nanjing University Nanjing 210093 China International Institute for Earth System Science Nanjing University Nanjing 210093 China Key Laboratory of Ecosystem Network Observation and Modeling Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing 100101 China State Key Laboratory of Remote Sensing Science Jointly Sponsored by Beijing Normal University and Institute of Remote Sensing Applications of Chinese Academy of Sciences Beijing 100875 China Key Laboratory of Forest Ecology and Environment State Forestry Administration Institute of Forest Ecology Environment and Protection Chinese Academy of Forestry Beijing 100091 China
Net primary productivity (NPP) is an important component of the terrestrial carbon cycle. Accurately mapping the spatial-temporal variations of NPP in China is crucial for global carbon cycling study. In this study ... 详细信息
来源: 评论
Cryptanalysis of 2-layer nonlinear piece in hand method
Cryptanalysis of 2-layer nonlinear piece in hand method
收藏 引用
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and security Engineering, MoCrySEn 2013 and 3rd International Workshop on security and Cognitive Informatics for Homeland Defense, SeCIHD 2013
作者: Nie, Xuyun Petzoldt, Albrecht Buchmann, Johannes School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Technische Universität Darmstadt Department of Computer Science Hochschulstraße 10 64289 Darmstadt Germany State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Network and Data Security Key Laboratory of Sichuan Province China
Piece in Hand method is a security enhancement method for Multivariate Public key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece... 详细信息
来源: 评论
LSB replacement steganography software detection based on model checking
LSB replacement steganography software detection based on mo...
收藏 引用
11th International Workshop on Digital Forensics and Watermaking, IWDW 2012
作者: Zhao, Zheng Liu, Fenlin Luo, Xiangyang Xie, Xin Yu, Lu Department of Network Engeering Zhengzhou Information Science and Technology Institute Zhengzhou 450002 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science Beijing 100093 China Department One Academy of National Defense Information 430000 Wuhan China
Steganography software detection is one of effective approaches for steganography forensics using software analysis. In this paper a method of LSB replacement steganography software detection is proposed. Firstly thre... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on security and Privacy in Communication networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
An in-depth measurement and analysis of popular private tracker systems in China
An in-depth measurement and analysis of popular private trac...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Qiang Li Tao Qin Xiaohong Guan Qinghua Zheng Qiuzhen Huang Department of Automation Tsinghua National Laboratory for Information Science and Technology Beijing China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
In recent years, a novel BitTorrent (BT) technology, Private Tracker (PT), has received extensive attentions in academia. Due to its huge amount of traffic volumes and population, it is essential to understand the cha... 详细信息
来源: 评论
Shaking table model test on failure of tunnel portal section under strong earthquake
收藏 引用
Rock Characterisation,Modelling and Engineering Design Methods——The 3rd ISRM SINOROCK Symposium
作者: X.Zhao T.B.Li L.J.Tao S.Hou Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of TechnologyPingleyuanChaoyang District State Key laboratory of Geohazard Prevention and Geoenvironment Protection Chenghua District Institute for Geotechnical Engineering and Underground Construction Beijing University of TechnologyPingleyuanChaoyang District
Mountainous tunnel portal section is one of the most easily damaged parts during strong earthquake. Failures of this part may block roads,which greatly influences the transportation of the local area after *** tests o... 详细信息
来源: 评论
Performance Comparison on network-Wide Time Synchronization Approaches in Wireless Sensor networks
Performance Comparison on Network-Wide Time Synchronization ...
收藏 引用
2013 IEEE International Conference on Microwave technology & Computational Electromagnetics
作者: Rong Fan Wenlong Xu LiLi Wu Li Han School of Information and Electronics Beijing Institute of Technology Shaanxi Key Laboratory of Network and System Security Xidian university
Wireless sensor networks(WSNs) have received a lot of attention recently due to their enormous potential in different *** in all distributed systems,time synchronization is very important in a sensor network since the... 详细信息
来源: 评论
Mining protocol state machines by interactive grammar inference
Mining protocol state machines by interactive grammar infere...
收藏 引用
2012 3rd International Conference on Digital Manufacturing and Automation, ICDMA 2012
作者: Zhang, Zhao Wen, Qiao-Yan Tang, Wen State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China IT Security Cooperate Technology Siemens Ltd. Beijing 100102 China
Protocol state machine is very essential in network security and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short tim... 详细信息
来源: 评论