咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是71-80 订阅
排序:
Cryptanalysis and Improvement of Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations
收藏 引用
Chinese Physics Letters 2009年 第12期26卷 35-38页
作者: 林崧 温巧燕 刘晓芬 Key Lab of Network Security and Cryptography Fujian Normal University Fuzhou 350007 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
In a recent paper [Yan F L et al. ***. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the security of... 详细信息
来源: 评论
Genuine Einstein-Podolsky-Rosen steering of generalized three-qubit states via unsharp measurements
收藏 引用
Chinese Physics B 2023年 第4期32卷 215-225页
作者: 陈玉玉 郭奋卓 魏士慧 温巧燕 School of Science Beijing University of Posts and TelecommunicationsBeijing 100876China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China CETC Cyberspace Security Technology Co. Ltd.Beijing 100041China
We aim to explore all possible scenarios of(1→2)(where one wing is untrusted and the others two wings are trusted)and(2→1)(where two wings are untrusted,and one wing is trusted)genuine tripartite Einstein-Podolsky-R... 详细信息
来源: 评论
Influencing factors and mechanism of high-temperature oxidation of high-entropy alloys: A review
收藏 引用
International Journal of Minerals,Metallurgy and Materials 2021年 第6期28卷 915-930页
作者: Ya Wei Yu Fu Zhi-min Pan Yi-chong Ma Hong-xu Cheng Qian-cheng Zhao Hong Luo Xiao-gang Li National Materials Corrosion and Protection Data Center Institute for Advanced Materials and TechnologyUniversity of Science and Technology BeijingBeijing 100083China Key Laboratory for Corrosion and Protection of The Ministry of Education(MOE) Beijing 100083China BRI Southeast Asia Network for Corrosion and Protection(MOE) Shunde Graduate School of University of Science and Technology BeijingFoshan 528000China
High-temperature oxidation is a common failure in high-temperature environments,which widely occur in aircraft engines and aerospace thrusters;as a result,the development of anti-high-temperature oxidation materials h... 详细信息
来源: 评论
Threshold Quantum Secret Sharing of Secure Direct Communication
收藏 引用
Chinese Physics Letters 2009年 第1期26卷 21-24页
作者: 李宝奎 杨宇光 温巧燕 Department of Automatic Control School of Information Science and Technology Beijing Institute of Technology Beijing 100081 College of Computer Science and Technology Beijing University of Technology Beijing 100124 State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71... 详细信息
来源: 评论
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
收藏 引用
Communications in Theoretical Physics 2013年 第5期59卷 547-553页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information Engineering Chinese Academy of Sciences)
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... 详细信息
来源: 评论
High-efficiency quantum steganography based on the tensor product of Bell states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2013年 第9期56卷 1745-1754页
作者: XU ShuJiang CHEN XiuBo NIU XinXin YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa... 详细信息
来源: 评论
A static technique for detecting input validation vulnerabilities in Android apps
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 210-225页
作者: Zhejun FANG Qixu LIU Yuqing ZHANG Kai WANG Zhiqiang WANG Qianru WU National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing Electronic Science and Technology Institute
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t... 详细信息
来源: 评论
Universal Three-Party Quantum Secret Sharing Against Collective Noise
收藏 引用
Communications in Theoretical Physics 2011年 第4期55卷 589-593页
作者: 杨宇光 王园 滕义伟 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Information Security(Graduate University of Chinese Academy of Sciences) State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless... 详细信息
来源: 评论
Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers
收藏 引用
Communications in Theoretical Physics 2010年 第7期54卷 84-88页
作者: 杨宇光 王园 腾义伟 柴海平 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo... 详细信息
来源: 评论
A trusted behaviour measurement scheme based on feedback and control in trusted network
收藏 引用
International Journal of Wireless and Mobile Computing 2021年 第2期20卷 99-106页
作者: Zhuang, Junxi Zhao, Xu Gong, Bei Zhan, Jing College of Computer Science Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing University of Technology Beijing100124 China
To solve the real-time trusted measurement of user behaviour in trusted networks, a new combination of dynamic and static, subjective and objective behaviour trusted measurement scheme is presented. The scheme analyse... 详细信息
来源: 评论