咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 623 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
665 条 记 录,以下是621-630 订阅
排序:
security Analysis of Two Remote User Authentication Schemes Using Bilinear Pairings
Security Analysis of Two Remote User Authentication Schemes ...
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Zuowen Tan Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou China School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing China
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remot... 详细信息
来源: 评论
Simulation and comparison of transient stability of power system including DFIGs wind farm based on detailed model
Simulation and comparison of transient stability of power sy...
收藏 引用
International Conference on Sustainable Power Generation and Supply, SUPERGEN
作者: Li Lin Hongjing Hou Wenxia Li Sheng Jing Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control Ministry of Education North China Electric Power University Beijing China Production & Technology Department Zhumadian Electric Power Company Henan China
This article is concerned with the impact of large-scale wind farms utilizing double fed induction generator (DFIG) on the transient stability to a general power system. In the first instance, the synthetical dynamic ... 详细信息
来源: 评论
Modal analysis concerning the control mode of doubly-fed induction generator
Modal analysis concerning the control mode of doubly-fed ind...
收藏 引用
International Conference on Sustainable Power Generation and Supply, SUPERGEN
作者: Li Lin Liangliang Song Wenxia Li Sheng Jing Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control Ministry of Education North China Electric Power University Beijing China Henan Electric Power Technical Institute Management of Production & Technology Department Zhumadian Electric Power Company China
The paper deals with the impact of wind power integration on power system small signal stability. The DFIG wind turbine consisting of a back-to-back PWM converter is introduced. Generator model is given first, ignorin... 详细信息
来源: 评论
Fuzzy analytic hierarchy process-based utilities evaluation and adoption for DRM security policies
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 126-131页
作者: Zhang, Zhi-Yong Ye, Chuan-Qi Fan, Ke-Feng Zhang, Li-Li Niu, Dan-Mei Electronics Information Engineering College Henan University of Science and Technology Luoyang 471003 China Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China Information Security Center for the State Key Laboratory of Network and Exchange Beijing Post and Telecom University Beijing 100158 China
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&... 详细信息
来源: 评论
Detection of drive-by downloads based on dynamic page views
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2126-2132页
作者: Zhang, Huilin Zhuge, Jianwei Song, Chengyu Han, Xinhui Zou, Wei Institute of Computer Science and Technology Peking University Beijing 100871 China Key Laboratory of Network and Software Security Assurance of Ministry of Education Peking University Beijing 100871 China
A dynamic page view based drive-by download detection method was developed to address the challenge hidden drive-by downloads which abuse inline linking dynamics creation and obfuscation. The method uses a script engi... 详细信息
来源: 评论
Novel evidence combination method based on proportional conjunctive and complementary pooling criterion
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2009年 第1期37卷 95-100页
作者: Lang, Feng-Hua Gu, Li-Ze Yang, Yi-Xian Niu, Xin-Xin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantage... 详细信息
来源: 评论
Overview security analysis of 3G authentication protocols and technical specifications
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2193-2199页
作者: Cao, Chenlei Zhang, Ru Niu, Xinxin Zhou, Linna Zhang, Zhentao Information Security Centre of State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China Department of Electronic Engineering Tsinghua University Beijing 100084 China National Cyber-Net Security Ltd Beijing 100088 China
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mat... 详细信息
来源: 评论
security and trust in digital rights management: A survey
收藏 引用
International Journal of network security 2009年 第3期9卷 247-263页
作者: Zhang, Zhiyong Pei, Qingqi Ma, Jianfeng Yang, Lin Ministry Of Education Key Laboratory of Computer Network and Information Security Xidian University Taibai South Road No.2 Xi'an Shannxi 710071 China Electronic Information Engineering College Henan University of Science and Technology Xiyuan Road No.48 Luoyang Henan 471003 China The Research Institute China Electronic Equipment and Systems Engineering Corporation Dacheng Road 13 Beijing 100141 China
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents ... 详细信息
来源: 评论
New method for interactive TCP traffic replay based on balance-checking between transmitted and received packets
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第4期32卷 835-846页
作者: Chu, Wei-Bo Cai, Zhong-Min Guan, Xiao-Hong Chen, Ming-Xu MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China State Key Laboratory for Manufacturing Systems Xi'an Jiaotong University Xi'an 710049 China Tsinghua National Laboratory for Information Science and Technology Department of Automation Tsinghua University Beijing 100084 China
Interactive network traffic replay is the newest method for testing and evaluation of network devices such as Firewalls, IPSes, routers, switches, etc. Currently state-checking method is used for interactive TCP traff... 详细信息
来源: 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology,beijing University of technology,beijing 100124,China 2 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,China 3 State key laboratory of Information security (Graduate University of Chinese Academy of Sciences),beijing 100049,China 4 State key laboratory of networking and Switching technology,beijing University of Posts and Tele-communications,beijing 100876,China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 评论