咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是551-560 订阅
排序:
Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers
收藏 引用
Communications in Theoretical Physics 2010年 第7期54卷 84-88页
作者: 杨宇光 王园 腾义伟 柴海平 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo... 详细信息
来源: 评论
A Digital Interface-based Digital Rights Management Scheme for Digital Cinema
收藏 引用
电子学报(英文版) 2010年 第3期19卷 481-485页
作者: FAN Kefeng MA Zhaofeng YANG Yixiani NIU Xinxin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China
Digital rights management (DRM) is indispensable to prevent various kinds of illegal content usage. In this paper, we present a Digital interface-based DRM scheme (DI-DRM) for digital cinema, which can provide a new m... 详细信息
来源: 评论
An attack graph based network security evaluation model for hierarchical network
An attack graph based network security evaluation model for ...
收藏 引用
2010 IEEE International Conference on Information Theory and Information security, ICITIS 2010
作者: Ge, Haihui Gu, Lize Yang, Yixian Liu, Kewei Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing China Laboratory of network security Information Technology Security Evaluation Center Beijing China
To evaluate the security situation of hierarchical network, a novel evaluation algorithm based on the method of constructing a security risk function is proposed. The proposed algorithm is the aggregation of qualitati... 详细信息
来源: 评论
Performance analysis of sign quantized projection
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第1期17卷 62-66页
作者: YE Tian-yu NIU Xin-xin MA Zhao-feng YANG Yi-xian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
Quantized projection technology (QP) is the version of quantization index modulation (QIM) working in the projection domain. It essentially belongs to a double-sided additive embedder. In this article, the concept... 详细信息
来源: 评论
A security framework for wireless sensor networks
收藏 引用
Journal of China Universities of Posts and Telecommunications 2010年 第SUPPL. 2期17卷 118-122页
作者: Tian, Bin Yang, Yi-Xian Li, Dong Li, Qi Xin, Yang Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Safe-Code Technology Co. Ltd Beijing 100876 China
Recently, wireless Sensor networks (WSNs) have been paid more and more attention and are widely used in a lots of military and commercial applications. Due to the limited communication and computation capabilities, th... 详细信息
来源: 评论
Efficient ID-based TPM key loading scheme for trusted platform
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第4期17卷 74-79页
作者: SONG Cheng LIU Bing HU Zheng-ming XIN Yang YANG Yi-xian YIN Han Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Safe-Code Technology Co. Ltd Beijing 100876 China Huawei Technology Ltd Beijing 100093 China
One important function in trusted computing is protected storage, which can protect unlimited amount of data and keys. In the existing trusted platform module (TPM) key loading scheme for trusted platform, a computi... 详细信息
来源: 评论
Seal-based secure boot scheme for trusted computing platform
收藏 引用
Journal of China Universities of Posts and Telecommunications 2010年 第SUPPL. 2期17卷 16-21页
作者: Song, Cheng Peng, Wei-Ping Xin, Yang Luo, Shou-Shan Zhu, Hong-Liang Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Safe-Code Technology Co. Ltd Beijing 100876 China
Secure boot is one important way to ensure the security of system for the terminal computing platform. The existing solutions for platform secure boot are based on verification by matching the reference measurements w... 详细信息
来源: 评论
network traffic classification based on semi-supervised clustering
收藏 引用
Journal of China Universities of Posts and Telecommunications 2010年 第SUPPL. 2期17卷 84-88页
作者: Lin, Guan-Zhou Xin, Yang Niu, Xin-Xin Jiang, Hui-Bai Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Beijing Safe-Code Technology Co. Ltd Beijing 100876 China
The diminished accuracy of port-based and payload-based classification motivates use of transport layer statistics for network traffic classification. A semi-supervised clustering approach based on improved K-Means cl... 详细信息
来源: 评论
Quantum secure direct communication with cluster states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2010年 第7期53卷 1271-1275页
作者: CAO WeiFeng YANG YuGuang WEN QiaoYan College of Electric and Information Engineering Zhengzhou University of Light IndustryZhengzhou 450002China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China College of Computer Science and Technology Beijing University of TechnologyBeijing 100124China State Key Laboratory of Integrated Services Network Xidian UniversityXi’an 710071China State key Laboratory of Information Security Gradute University of Chinese Academy of Sciences Beijing 100049China
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol ca... 详细信息
来源: 评论
Variable-rate convolutional network coding
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第3期17卷 91-96,117页
作者: MA Song-ya CHEN Xiu-bo LUO Ming-xing Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China School of Mathematics and Information Sciences Henan University Kaifeng 475004 China
Four types of variable-rate convolutional network codes are investigated over a single-source finite cyclic network. It is found that variable-rate generic, dispersion and broadcast can be implemented on the same netw... 详细信息
来源: 评论