咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是651-660 订阅
排序:
Quantum secret sharing between multiparty and multiparty with entanglement swapping
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2008年 第4期15卷 63-68页
作者: LIN Song GAO Fei QIN Su-juan WEN Qiao-yan ZHU Fu-chen State key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China National Laboratory for Modern Communications Chengdu 610041 China
A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping t... 详细信息
来源: 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer Science and technology,beijing University of technology,beijing 100124,China 2 State key laboratory of networking and Switching technology,beijing University of Posts and Tele-communications,beijing 100876,China 3 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,China 4 State key laboratory of Information security(Graduate University of Chinese Academy of Sciences) ,beijing 100049,China 1. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China 3. State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China 4. State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China 2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 评论
MPMAC and its security analysis
收藏 引用
beijing Gongye Daxue Xuebao / Journal of beijing University of technology 2008年 第SUPPL. 2期34卷 62-66页
作者: Zhang, Shao-Lan Yang, Yi-Xian Xing, Guo-Bo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Shandong Jianzhu University Jinan 250101 China
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran... 详细信息
来源: 评论
Action-Based Access Control Modelt
收藏 引用
电子学报(英文版) 2008年 第3期17卷 396-401页
作者: LI Fenghua WANG Wei MA Jianfeng Sang JaeMoon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an 710071 China) Graduate School Beijing Electronic Science and Technology Institute Beijing 100070 China) Mobile Network Security Technology Research Center Kyungpook National UniversitySankyuk-dong~ Buk-ku~ Daeyu 702-701~ KoreaI
来源: 评论
A VSC-HVDC fuzzy controller to damp oscillation of AC/DC power system
A VSC-HVDC fuzzy controller to damp oscillation of AC/DC pow...
收藏 引用
IEEE International Conference on Sustainable Energy Technologies, ICSET
作者: Chunye Li Sheng Li Fuchun Han Jingfu Shang Ermin Qiao College of Electrical and Power Engineering Taiyuan University of Technology Taiyuan China Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control Ministry of Education Beijing China China Electrical Power Research Institute China
The fast control capability of the VSC-HVDC and the process of area mode oscillations are analyzed. An auxiliary fuzzy logic controller designed in Matlab for the voltage source converter based HVDC transmission syste... 详细信息
来源: 评论
Multi-target controller of three-level NPC based VSC-HVDC transmission system and Its RTDS simulation
Multi-target controller of three-level NPC based VSC-HVDC tr...
收藏 引用
IEEE International Conference on Sustainable Energy Technologies, ICSET
作者: Jianhua Zhang Sheng Li Jingfu Shang Weiwei Zhao Chunye Li Department of Electrical Engineering the School of Electrical and Electronic Engineering North China Electric Power University Beijing China Key laboratory of Power System Protection and Dynamic Security Monitoring and Control under Ministry of Education Beijing China College of Electrical and Power Engineering Taiyuan University of Technology Taiyuan China
This paper builds the dynamic mathematic model of the three-level Neutral Point Diode Clamped (NPC) converter, discusses the fundamental principles of the active and reactive power control for three-level Voltage Sour... 详细信息
来源: 评论
Secure AODV Routing Protocol Using SL Multi-Signcryption
收藏 引用
电子学报(英文版) 2007年 第2期16卷 311-314页
作者: ZHANG Chuanrong YIN Zhonghai ZHANG Yuqing XIAO Guozhen Telecommunication Engineering Institute A irforce Engineering University Xi ' an 710077 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China The Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism... 详细信息
来源: 评论
Performance evaluation on IEEE 802.11e considering emergency calls in congested situation
收藏 引用
中国邮电高校学报(英文版) 2007年 第z1期14卷 50-54页
作者: CUI Lu-ming OKADA Kazunori KATO Toshihiko CHEN Xing-yi Information Security Center National Institute of Information and Communications Technology Tokyo 184-8795 Japan Department of Information Network System Science The University of Electro-Communications Tokyo 182-8585 Japan States Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing 100876 China
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-ba... 详细信息
来源: 评论
Study of image recognition used for unattended substation
Study of image recognition used for unattended substation
收藏 引用
2006 International Conference on Power System technology, POWERCON2006
作者: Jun, Yang Xin, Ai Xiufang, Jia Yansong, Li Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control Ministry of Education North China Electric Power University Deshengmenwaizhuxinzhuang Beijing 102206 China Electric Power Company of Jinzhou Engineering Technology Department Liaohe Petroleum Exploration Bureau Linghai City Liaoning Province 121209 China
It is a trend to construct unattended substation in power system *** paper systematically analyses the superiority and limitation of MATLAB and Visual C++ and illustrates how to compile m-files to cpp-files by MATLAB ... 详细信息
来源: 评论
Research on identifiability of equivalent motor in composite load model
Research on identifiability of equivalent motor in composite...
收藏 引用
2007 IEEE Lausanne POWERTECH
作者: Ma, Jin Han, Dong He, Renmu Dong, Zhaoyang Hill, David J. IEEE Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control Ministry of Education North China Electric Power University 102206 Beijing China School of Information Technology and the Electrical Engineering University of Queensland St. Lucia QLD 4072 Australia Department of Information Engineering Australian National University
Load modeling is very important for power system dynamic analysis and control. The composite load model widely applied recently in the power system operation centre consists of the static load and the equivalent motor... 详细信息
来源: 评论