咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是61-70 订阅
排序:
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment
收藏 引用
China Communications 2018年 第2期15卷 122-137页
作者: Jing Zhan Xudong Fan Lei Cai Yaqi Gao Junxi Zhuang College of Computer Science Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... 详细信息
来源: 评论
Load Feedback-Based Resource Scheduling and Dynamic Migration-Based Data Locality for Virtual Hadoop Clusters in OpenStack-Based Clouds
收藏 引用
Tsinghua Science and technology 2017年 第2期22卷 149-159页
作者: Dan Tao Zhaowen Lin Bingxu Wang School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003China Network and Information Center Institute of Network TechnologyScience and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryNational Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and TelecommunicationsBeijing 100876China
With cloud computing technology becoming more mature, it is essential to combine the big data processing tool Hadoop with the Infrastructure as a Service(Iaa S) cloud platform. In this study, we first propose a new ... 详细信息
来源: 评论
Data security and Privacy in Bitcoin System:A Survey
收藏 引用
Journal of Computer Science & technology 2020年 第4期35卷 843-862页
作者: Lie-Huang Zhu Bao-Kun Zheng Meng Shen Feng Gao Hong-Yu Li Ke-Xin Shi School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Information Management for Law China University of Political Science and LawBeijing 102249China Key Laboratory of Information Network Security Ministry of Public SecurityShanghai 201204China
To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and *** is an electronic payment system based on cryptography rather than on... 详细信息
来源: 评论
Bio-inspired design and stab resistance performance of flexible fiber composites
收藏 引用
Composites Part B: Engineering 2025年
作者: Yuhang Liu Peng Liu Mengqi Yuan Hongyuan Zhou Hong Zhang State Key Laboratory of Explosion Science and Technology Beijing Institute of Technology Beijing 100081 PR China Chongqing Innovation Center Beijing Institute of Technology Chongqing 401120 China Explosion Protection and Emergency Disposal Technology Engineering Research Center of the Ministry of Education Beijing Institute of Technology Beijing 100081 PR China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing 100124 China
Stab resistance clothing can protect personnel from sharp knives, but it is difficult to balance the softness and stab resistance performance. At present, the bionic stab resistance structure still has some shortcomin...
来源: 评论
A research framework for constructing the knowledge database of public security information
收藏 引用
International Journal of Wireless and Mobile Computing 2021年 第3期21卷 191-197页
作者: Zhong, Han Zhang, Shiqiang Liu, Jianli College of Information Technology and Network Security People’s Public Security University of China Xicheng Beijing China Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China
At present, the public security organs in China have accumulated a great deal of public security data. These data have broad sources, complex structures, large and increasing scales. How to effectively integrate, mana... 详细信息
来源: 评论
Siamese single object tracking algorithm with natural language prior
收藏 引用
Frontiers of Computer Science 2021年 第5期15卷 215-216页
作者: Qianli ZHOU Rong WANG Jinze LI Naiqian TIAN Wenjin ZHANG Police Information Engineering and Network Security College People s Public Security University of ChinaBeijing 100038China Beijing Public Security Bureau Beijing 100740China Key Laboratory Of Security Technology and Risk Assessment of Ministry of Public Security Beijing 100038China
1 Introduction Visual tracking has long been considered as a fundamental mission in computer vision,and it has been widely used for many *** trackers[1]utilize Siamese network to do template matching and achieve state... 详细信息
来源: 评论
Multi-policy threshold signature with distinguished signing authorities
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第1期18卷 113-120页
作者: WANG Feng ZHOU You-sheng GU Li-ze ZHENG Shi-hui YANG Yi-xian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China
Threshold signature plays an important role to distribute the power of a single authority in modem electronic society. In order to add functions and improve efficiency of threshold signatures, a multi-policy threshold... 详细信息
来源: 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 评论
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware  24
Semantic-Enhanced Static Vulnerability Detection in Baseband...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Liu, Yiming Zhang, Cen Li, Feng Li, Yeting Zhou, Jianhua Wang, Jian Zhan, Lanlan Liu, Yang Huo, Wei Institute of Information Engineering Cas School of Cyber Security Ucas Beijing China Key Laboratory of Network Assessment Technology Cas China Beijing Key Laboratory of Network Security and Protection Technology China Nanyang Technological University Singapore
Cellular network is the infrastructure of mobile communication. Baseband firmware, which carries the implementation of cellular network, has critical security impact on its vulnerabilities. To handle the inherent comp... 详细信息
来源: 评论
A User-Centric Data Secure Creation Scheme in Cloud Computing
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 753-760页
作者: SU Mang LI Fenghua SHI Guozhen GENG Kui XIONG Jinbo School of Computer Science and Engineering Nanjing University of Science and Technology State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Department of Information Security Beijing Electronic Science and Technology Institute State Key Laboratory of Integrated Services Network Xidian University
Due to the use of the cloud computing technology,the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds,which would bring new challenges ... 详细信息
来源: 评论