咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是541-550 订阅
排序:
Analysis and Study on Detection of Credict Fraud in E-commerce
Analysis and Study on Detection of Credict Fraud in E-commer...
收藏 引用
2011 International Conference on Future Computer Sciences and Application(ICFCSA 2011)
作者: Kaiyong Deng Ru Zhang Dongfang Zhang WenFeng Jiang Xinxin Niu Kaiyong Deng Ru Zhang Hong Guo Key Laboratory of network and information attack& defence technology of MOE Beijing University of Posts and Telecommunications Key Lab of Information Network Security of Ministry of Public Security
An algorithm of applying Bedford's law to detect credit fraud in e-commerce is proposed in the paper and the feasibility is *** weakness of the algorithm for detecting financial fraud via Benford correlation coeff... 详细信息
来源: 评论
Conditions of parameter identification from time series
收藏 引用
Physical Review E 2011年 第3期83卷 036202-036202页
作者: Haipeng Peng Lixiang Li Yixian Yang Fei Sun Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications P.O. Box 145 Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China and National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
We study the problem of synchronization-based parameters identification of dynamical systems from time series. Through theoretical analysis and numerical examples, we show that some recent research reports on this iss... 详细信息
来源: 评论
A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless networks
A Privacy Preserving Handover Authentication Scheme for EAP-...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Qi Jing Yuqing Zhang Anmin Fu Xuefeng Liu Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China National Computer Network Intrusion Protection Center GUCAS Beijing China
Extensible Authentication Protocol (EAP) is a framework which aims to provide a flexible authentication for wireless networks. Due to the involvement of an EAP server and several round trips between a mobile node (MN)... 详细信息
来源: 评论
Efficient RFID authentication scheme with high security
Efficient RFID authentication scheme with high security
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Shuai Shao Guoai Xu Yanfei Liu Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China First Research Institute of Ministry of Public Security Beijing China
With the spread of RFID technology, Lots of authentication schemes for RFID have been proposed to provide user privacy and security. However, most of these protocols are limited in scalability, in which the server'... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Feasibility of columnar jointed basalt used for high-arch dam foundation
收藏 引用
Journal of Rock Mechanics and Geotechnical Engineering 2011年 第S1期3卷 461-468页
作者: Yunjie Wei1, Mo Xu2, Wenpei Wang1, Anchi Shi3, Mingfa Tang3, Zhiping Ye3 1 key laboratory of Urban security and Disaster Engineering of Ministry of Education, beijing University of technology, beijing, 100124, China 2 State key laboratory of Geohazard Prevention and Geoenvironment protection, Chengdu University of technology, Chengdu, 610059, China 3 East China Investigation and Design Institute, China Hydropower Engineering Consulting Group Corporation, Hangzhou, 310014, China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing 100124 China State Key Laboratory of Geohazard Prevention and Geoenvironment Protection Chengdu University of Technology Chengdu 610059 China East China Investigation and Design Institute China Hydropower Engineering Consulting Group Corporation Hangzhou 310014 China
Columnar jointed basalt, with a lot of small-spacing structural planes and poor integrity, is a kind of fractured rock mass. Through comprehensive study of columnar joints shape, roughness of fracture surface and chem... 详细信息
来源: 评论
EKMP: An enhanced key management protocol for IEEE 802.16m
EKMP: An enhanced key management protocol for IEEE 802.16m
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Anmin Fu Yuqing Zhang Zhenchao Zhu Jingyu Feng Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China National Computer Network Intrusion Protection Center Chinese Academy and Sciences Beijing China
Recently, IEEE 802.16m was submitted to the ITU and acknowledged as the candidate technology of the IMT-advanced standardization. In this paper, we point out several security issues, such as key agreement blocking and... 详细信息
来源: 评论
Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform
Runtime-Based Boot Components Re-measurement Scheme for Trus...
收藏 引用
2011 International Conference on Informatics,Cybernetics,and Computer Engineering(ICCE 2011)
作者: Peng Weiping Zhou Yajian Wang Cong Yang Yixian Key Laboratory of Network and Information Attack & Defence Technology of MOE Beijing University of Posts and Telecommunications School of Computer Science and Technology Henan Polytechnic University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured a... 详细信息
来源: 评论
Quantum broadcast communication with authentication
收藏 引用
Chinese Physics B 2010年 第7期19卷 63-67页
作者: 杨宇光 王叶红 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Two simple quantum broadcast communication schemes are proposed. A central party can broadcast his secret message to all the legitimate receivers simultaneously. Compared with the three schemes proposed recently (Wan... 详细信息
来源: 评论
Multi-User Private keyword Search for Cloud Computing
Multi-User Private Keyword Search for Cloud Computing
收藏 引用
IEEE International Conference on Cloud Computing technology and Science (CloudCom)
作者: Yanjiang Yang Haibing Lu Jian Weng Institute for Infocomm Research Singapore Department of Operations Management and Information Systems The Leavey School of Business Santa Clara University USA State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science and Emergency Technology Research Center of Risk Department of Computer Science and Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论