咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是521-530 订阅
排序:
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
收藏 引用
China Communications 2012年 第10期9卷 33-39页
作者: Zhao Wentao Fu Shaojing Li Chao Qu Longjiang College of Computer National University of Defense Technology Changsha 410073 P. R. China Department of Mathematics and System Science National University of Defense Technology Changsha 410073 P. R. China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 P. R. China State key Laboratory of Information Security Chinese Academy of Science Beijing 100049 P. R. China
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation o... 详细信息
来源: 评论
A bilateral secure threshold signature scheme with distinguished signing authorities
收藏 引用
International Journal of Advancements in Computing technology 2012年 第8期4卷 100-107页
作者: Lize, Gu Feng, Wang Yousheng, Zhou Shi-hui, Zheng Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Mathematic Department of Dezhou University Dezhou 253023 China Chongqing University of Posts and Telecommunications Chongqing 400065 China Key Laboratory of network and information attack and defence technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
Forward secure threshold signature plays an important role in distributed signature. In order to enhance the security and efficient of the forward secure threshold signature, a new forward secure threshold signature i... 详细信息
来源: 评论
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
Identity-based proxy cryptosystems with revocability and hie...
收藏 引用
作者: Wang, Lihua Wang, Licheng Mambo, Masahiro Okamoto, Eiji Network Security Research Institute Koganei-shi 184-8795 Japan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Faculty of Electrical and Computer Engineering Institute of Science and Engineering Kanazawa University Kanazawa-shi 920-1192 Japan School of Systems and Information Engineering University of Tsukuba Tsukuba-shi 305-8573 Japan
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera... 详细信息
来源: 评论
A Survey on Problems in Smart Grid with Large Capacity Wind Farm Interconnected
收藏 引用
Energy Procedia 2012年 17卷 776-782页
作者: Yang Peihong Liu Wenying Wei Yili School of Information Engineering Inner Mongolia University of Science and Technology Baotou China Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control Under Ministry of Education North China Electric Power University Beijing China
The basic concepts and development of smart grid is described. The influence of large capacity wind farm interconnected on the smart grid is analyzed particularly, following contents are emphatically presented: model ... 详细信息
来源: 评论
Analysis on Token-Controlled Public key Encryption
Analysis on Token-Controlled Public Key Encryption
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Changlu Lin Yong Li Sriramkrishnan Srinivasan Li Lu Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Key Laboratory of Communication & Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing China Department of Computing University of Surrey Guildford UK School of Computer Science University of Electronic Science and Technology Chengdu China
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example... 详细信息
来源: 评论
A secure message delivery scheme with path tracking for delay tolerant networks
A secure message delivery scheme with path tracking for dela...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Zhongtian Jia Muhammad Ali Raffay Lixiang Li Xiaodong Lin Yixian Yang Information Security Center Beijing University of Posts and Telecommunications China Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan China Faculty of Business and Information Technology Institute of Technology University of Ontario Oshawa ONT Canada
In delay tolerant networks (DTNs), message delivery is operated in an opportunistic way through store-carry and forward relaying, and every DTN node is in anticipation of cooperation for data forwarding from others. U... 详细信息
来源: 评论
A method of zero self-modification and temperature compensation for indoor air quality etection based on a software model
A method of zero self-modification and temperature compensat...
收藏 引用
International Conference on Control, Automation and Systems ( ICCAS)
作者: Cuiping Li Jiuqiang Han Qibin Huang Xiaoqiang Dong Xuequan Ding Yaming Ding Dianguo Hang Ning Mu Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xian Jiaotong University Xian Shanxi China Beijing Institute of Pharmaceutical Chemistry Beijing China Beijing Kang Er Xing Technology Development Company Limited Beijing China Beijing Kang Er Xing Technology Development Co. Ltd. Beijing 100088 P. R. China
It is very difficult to apply non-dispersive infrared sensor to detect the indoor air quality and maintain very low zero and temperature drift over long periods. Frequently manual zero setting and calibration are requ... 详细信息
来源: 评论
Multi-policy threshold signature with distinguished signing authorities
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第1期18卷 113-120页
作者: WANG Feng ZHOU You-sheng GU Li-ze ZHENG Shi-hui YANG Yi-xian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China
Threshold signature plays an important role to distribute the power of a single authority in modem electronic society. In order to add functions and improve efficiency of threshold signatures, a multi-policy threshold... 详细信息
来源: 评论
Universal Three-Party Quantum Secret Sharing Against Collective Noise
收藏 引用
Communications in Theoretical Physics 2011年 第4期55卷 589-593页
作者: 杨宇光 王园 滕义伟 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Information Security(Graduate University of Chinese Academy of Sciences) State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless... 详细信息
来源: 评论
Anomaly detection of user behavior based on DTMC with states of variable-length sequences
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第6期18卷 106-115页
作者: XIAO Xi XIA Shu-tao TIAN Xin-guang ZHAI Qi-bin Graduate School at Shenzhen Tsinghua University Shenzhen 518055 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
In anomaly detection, a challenge is how to model a user's dynamic behavior. Many previous works represent the user behavior based on fixed-length models. To overcome their shortcoming, we propose a novel method base... 详细信息
来源: 评论