咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是561-570 订阅
排序:
Secure network coding in the presence of eavesdroppers
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1Information security Center, State key laboratory of networking and Switching technology, beijing University of Posts and Telecommunications, beijing 100876, China 2key laboratory of network and Information Attack and Defence technology of MOE, beijing University of Posts and Telecommunications, beijing 100876, China 3National Engineering laboratory for Disaster Backup and Recovery, beijing University of Posts and Telecommunications, beijing 100876, China 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 评论
A unified result for variable-rate linear network coding
收藏 引用
Journal of Harbin Institute of technology(New Series) 2010年 第5期17卷 657-660页
作者: 马松雅 卓新建 郭钦 罗明星 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery School of Mathematics and Information Sciences Henan University School of Science Beijing University of Posts and Telecommunications
Fong et *** variable-rate linear network coding for linear ***,the authors didn't investigate it for the other three types of linear network *** this paper,by simple and clear proofs,it is found that there are sim... 详细信息
来源: 评论
An improved PrefixSpan-based signatures mining algorithm with offset constraint
An improved PrefixSpan-based signatures mining algorithm wit...
收藏 引用
2nd International Workshop on Intelligent Systems and Applications, ISA2010
作者: Lin, Guanzhou Xin, Yang Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China
The approach based on payload signatures presents more accurately than that using port number and machine learning algorithms in network traffic identification. The performance of payload-based approach heavily depend... 详细信息
来源: 评论
Model checking based security policy verification and validation
Model checking based security policy verification and valida...
收藏 引用
2nd International Workshop on Intelligent Systems and Applications, ISA2010
作者: Ma, Jianli Zhang, Dongfang Xu, Guoai Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing China
Lots of security mechanisms have been applied in current information systems to assure the confidentiality and integrality for the information processed. These mechanisms are selected in accordance with the certain se... 详细信息
来源: 评论
Consistency of weighted feature set and polyspectral kernels in individual communication transmitter identification
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2010年 第4期5卷 488-492页
作者: Na SUN Yajian ZHOU Yixian YANG Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education Beijing University of Posts and TelecommunicationsBeijing 100876China
This paper presents a method using support vector machine with polyspectral kernels for classification of individual ***,the neighborhood-roughset-based weighted feature set is *** experiments of the algorithms mentio... 详细信息
来源: 评论
A scheme of trust management system for P2P network
A scheme of trust management system for P2P network
收藏 引用
12th International Conference on Advanced Communication technology: ICT for Green Growth and Sustainable Development, ICACT 2010
作者: Liang, Binbin Gu, Lize Sun, Bin Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications China
P2P network has become an important branch of Internet recently, with the significant advantages of full resource utilization, dynamics, openness and high scalable, which helps it achieve wide applications. But securi... 详细信息
来源: 评论
Identification of frequency-hopping spread spectrum signals using SVMs with wavelet kernels
Identification of frequency-hopping spread spectrum signals ...
收藏 引用
2nd International Workshop on Intelligent Systems and Applications, ISA2010
作者: Sun, Na Zhou, Yajian Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
This paper proposes a novel method of using wavelet kernel functions in Support Vector Machines (SVMs), and this method is applied to identification of individual communication transmitter which works in frequency-hop... 详细信息
来源: 评论
Improved tripartite concurrent signature
Improved tripartite concurrent signature
收藏 引用
2010 2nd International Conference on Computer technology and Development, ICCTD 2010
作者: Ge, Haihui Sun, Yanbin Gu, Lize Zheng, Shihui Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology MOE Beijing University of Posts and Telecommunications Beijing 100876 China
The concrete tripartite concurrent signature scheme designed by Susilo et aI. is found being unambiguity. In other words, any fourth party can identify who is the real signer of the publicly available valid signatures... 详细信息
来源: 评论
Steganalysis of MSU Stego Video based on discontinuous coefficient
Steganalysis of MSU Stego Video based on discontinuous coeff...
收藏 引用
2010 2nd International Conference on Computer Engineering and technology, ICCET 2010
作者: Wu, Jia Zhang, Ru Chen, Ming Niu, Xinxin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
MSU(Moscow State University) Stego Video is a public video steganographic tool. It uses a specific data distribution mode to load secret data, so that the message can be extracted correctly even the stego video are co... 详细信息
来源: 评论
A new authentication and key agreement protocol of 3G based on Diffie-Hellman Algorithm
A new authentication and key agreement protocol of 3G based ...
收藏 引用
2010 2nd International Conference on Computer Engineering and technology, ICCET 2010
作者: Zhang, Dongfang Zhang, Ru Niu, Xinxin Yang, Yixian Zhang, Zhentao Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Cybernet Security Ltd. 100088 United States
Third Generation (3G) wireless networks are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwidth, these 3G networks are generally more vulnerable th... 详细信息
来源: 评论