咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3961-3970 订阅
排序:
A Formal Approach for Obligation Analysis of E-Commerce
收藏 引用
电子学报(英文版) 2008年 第2期17卷 200-204页
作者: DU Yuyue JIANG Changjun College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China Department of Computer Science and Engineering Tongji University Shanghai 200092 China The State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
Existing methods for modeling E-commerce systems (ECSs) focus mostly on either mathematically abstract verification or graphical modeling, and cannot explicitly describe and analyze the obligations of partners. This w... 详细信息
来源: 评论
Study on seismic behavior of mid-rise rc composite shear walls with concealed truss under high axial compression
收藏 引用
Gongcheng Lixue/engineering Mechanics 2008年 第SUPPL. 2期25卷 158-163+203页
作者: Zhang, Jian-Wei Cao, Wan-Lin Wang, Zhi-Hui Yang, Ya-Bin College of Architecture and Civil Engineering Beijing University of Technology Beijing 100124 China Key Laboratory of Urban Security and Disaster Engineering Beijing 100124 China
The axial compression ratio has always been a vital element in shear wall seismic design. The experimental study on the seismic behavior of five 1/3 scale mid-rise shear walls with high axial compression ratio were ca... 详细信息
来源: 评论
Analysis and verification of dynamic stock trading systems
收藏 引用
Information technology Journal 2008年 第3期7卷 466-473页
作者: Du, Yuyue Zheng, Hong Yu, Shuxia College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
A dynamic stock trading system with a distributed shared memory is analyzed formally based on its temporal Petri net model. The functional correctness of the system is formally verified and some important properties o... 详细信息
来源: 评论
BIFI: Architectural support for information flow integrity measurement
BIFI: Architectural support for information flow integrity m...
收藏 引用
International Conference on Computer Science and software engineering, CSSE 2008
作者: Hao, Hu Dengguo, Feng Dept. of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China The State Key Lab. of Information Security Institute of Software Chinese Academy of Sciences National Engineering Research Center for Information Security Beijing 100190 China
Information flow security has been an important security requirement of existing operating systems, especially for distributed applications. We are interested in protecting information flow security with an eye to inf... 详细信息
来源: 评论
Modeling non-repudiation in distributed systems
收藏 引用
Information technology Journal 2008年 第1期7卷 228-230页
作者: Zheng, Hong Du, YuYue Yu, ShuXia Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security servi... 详细信息
来源: 评论
Practical hierarchical key management scheme based on one-way hash function
收藏 引用
beijing Daxue Xuebao (Ziran Kexue Ban)/Acta Scientiarum Naturalium Universitatis Pekinensis 2008年 第4期44卷 527-536页
作者: Han, Xinhui Long, Qin Si, Duanfeng Zhuge, Jianwei Ye, Zhiyuan Institute of Computer Science and Technology Peking University Beijing 100871 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
A formal definition and analysis on the hierarchical key management is presented for permission management and access control problem in the role hierarchy. Based on one-way hash function, a practical hierarchical key... 详细信息
来源: 评论
Bandelet image coding based on SPIHT
Bandelet image coding based on SPIHT
收藏 引用
2nd International Symposium on Information Technologies and Applications in Education, ISITAE 2008
作者: Xie, Guofu Qu, Xiaobo Yan, Jingwen Dept. of Software Engineering Xiamen University Xiamen China Key Laboratory of Computer Science Beijing China Dept. of Communication Engineering Xiamen University Xiamen China Key Laboratory of Intelligent Manufacturing Technology Ministry of Education Shantou China
Bandelet is a new image representation method, which can efficiently indicate the local directions and is adapted to the image geometry. The set partitioning in hierarchical trees (SPIHT) algorithm is an efficient met... 详细信息
来源: 评论
Error bounded algorithm for approximate B-spline surface skinning
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics 2008年 第11期20卷 1477-1482页
作者: Wang, Wenke Zhang, Hui Wang, Bin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
B-spline surface skinning is a commonly used tool in surface modeling. Huge amounts of control points will be introduced in the skinned surface by traditional skinning approach. This paper proposes an efficient approx... 详细信息
来源: 评论
New results on periodic sequences with large k-error linear complexity
New results on periodic sequences with large k-error linear ...
收藏 引用
2008 IEEE International Symposium on Information Theory, ISIT 2008
作者: Hu, Honggang Gong, Guang Feng, Dengguo Department of Electrical and Computer Engineering University of Waterloo Waterloo ON N2L 3G1 Canada State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
Niederreiter showed that there is a class of periodic sequences which possess large linear complexity and large k-error linear complexity simultaneously. This result disproved the conjecture that there exists a trade-... 详细信息
来源: 评论
Analysis and Improvement of Authenticatable Ring Signcryption Scheme
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2008年 第6期13卷 679-683页
作者: 李发根 Shirase Masaaki Takagi Tsuyoshi School of Computer Science and Engineering University of Electronic Scienceand Technology of ChinaChengdu 610054China State Key Laboratory of Information Security Graduate School of Chinese Academyof SciencesBeijing 100049China School of Systems Information Science Future University-HakodateHakodate 041-8655Japan
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext ***, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-... 详细信息
来源: 评论