咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3901-3910 订阅
排序:
VisualSec: A Secure Message Delivery Scheme for Online Social Networks Based on Profile Images
VisualSec: A Secure Message Delivery Scheme for Online Socia...
收藏 引用
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
作者: Meng Ge Kwok-yan Lam Xiuqun Wang Zhiguo Wan Bin Jiang Key Laboratory of Information System Security Ministry of Education Tsinghua National Laboratory of Information Science and Technology School of Software Tsinghua University Beijing China National Mobile Communications Research Laboratory South-East University Nanjing China
With rapid growth of Online Social Networks (OSN), more and more users are attracted to share their personal information or even cooperate in business via OSN. Therefore, the issues of privacy and security in OSN beco... 详细信息
来源: 评论
An Ultra-kernel Model for Dedicated security Systems
An Ultra-kernel Model for Dedicated Security Systems
收藏 引用
International Conference on Education technology and Computer, ICETC
作者: Jing Wang Luning Xia Jiwu Jing Department of Electronic Engineering and information Science University of Science and Technology Hefei China State Key Laboratory of information Security Chinese Academy and Sciences Beijing China
security, simplicity, efficiency, are three important aspects of system architecture design, especially for dedicated security systems. The legacy horizontal-layered architectures (e.g., microkernel model) suffer from... 详细信息
来源: 评论
Region of Interest Automatic Extraction for Color Image Based on Mathematical Morphology
Region of Interest Automatic Extraction for Color Image Base...
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Xiao-hong Zhang Yuan-yuan Zhu Zhong-kui Fan School of Information Engineering Jiangxi University of Science and Technology Ganzhou China Information Security Center State Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing China
Combined with human visual characteristics and morphological watershed algorithm, a novel image processing method was proposed for automatic region of interest (ROI) extraction. The color image would be converted into... 详细信息
来源: 评论
Model Checking Needham-Schroeder security Protocol Based on Temporal Logic of Knowledge
Model Checking Needham-Schroeder Security Protocol Based on ...
收藏 引用
International Conference on Networks security, Wireless Communications and Trusted Computing, NSWCTC
作者: Xiangyu Luo Yan Chen Ming Gu Lijun Wu School of Software Key Laboratory of Security for Information System of Ministry of Education Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the... 详细信息
来源: 评论
Novel high-order spring-dashpot-mass boundary for cylindrical-symmetry wave motions in infinite domain
收藏 引用
Lixue Xuebao/Chinese Journal of Theoretical and Applied Mechanics 2009年 第2期41卷 207-215页
作者: Du, Xiuli Zhao, Mi Key Laboratory of Urban Security and Disaster Engineering Beijing University of Technology Beijing 100124 China
A novel high-order spring-dashpot-mass model (SDMM) for convolution integral of force-displacement relationship in time domain is proposed and applied into the cylindrical-symmetry wave motions in infinite domain as a... 详细信息
来源: 评论
Modeling and design for dynamic workflows based on flexible activities
收藏 引用
Information technology Journal 2009年 第5期8卷 750-756页
作者: Li, Peng Du, Yuyue College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
A rapidly changing environment forces the workflow management systems to change their workflow processes ever more frequently. In order to improve the flexibility of workflow management systems, a dynamic workflow mod... 详细信息
来源: 评论
A process generation approach of dynamic workflows based description logics
收藏 引用
Information technology Journal 2009年 第7期8卷 998-1005页
作者: Zhang, Fu Xin Du, Yu Yue College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
To make workflow processes more flexible, a dynamic generation approach tor workflow processes corresponding to an instance is presented in this study. An activity, a part of a workflow, is defined as an action based ... 详细信息
来源: 评论
Measurement of micro-scale two-phase flow in a pulsating heat pipe using electrical capacitance tomography
收藏 引用
Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical engineering 2009年 第17期29卷 103-107页
作者: Li, Jing-Tao Xiao, Hai-Ping Dong, Xiang-Yuan Liu, Shi Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control North China Electric Power University Changping District Beijing 102206 China School of Energy and Environmental Engineering Zhongyuan Institute of Technology Zhengzhou 450007 Henan Province China
The electrical capacitance tomography (ECT) system was used to the visualization of the two-phase flow as well as the measurement of the film thickness in a pulsating heat pipe (PHP). The new-developed micro-sensor wa... 详细信息
来源: 评论
A Remote User Authentication Scheme Preserving User Anonymity and Traceability
A Remote User Authentication Scheme Preserving User Anonymit...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Shuai Shao Hui Li Xinxi Niu Yixian Yang Information Security Center Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Information Attack & Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory of Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
Many smart card based remote authentication schemes have been proposed to preserve user privacy against eavesdropper. However, none of the exiting scheme provides both users' anonymity to server and traceability t... 详细信息
来源: 评论
Development of an in vivo computer for 3-SAT problem
Development of an in vivo computer for 3-SAT problem
收藏 引用
International Conference on Bio-Inspired Computing: Theories and Applications, BICTA
作者: Xiangrong Liu Shudong Wang Xiaoli Qiang Key laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China College of Information Science and Engineering Shandong University of Science and Technology Qingdao Shandong China Peking University Beijing Beijing CN
DNA computing is a bio-computing paradigm based on the specific hybridization of DNA strands. Most of DNA computing models and experiments were held in vitro. In this paper, a DNA computing paradigm in vivo is present... 详细信息
来源: 评论