咨询与建议

限定检索结果

文献类型

  • 2,060 篇 期刊文献
  • 1,987 篇 会议
  • 10 册 图书

馆藏范围

  • 4,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,939 篇 工学
    • 1,735 篇 计算机科学与技术...
    • 1,438 篇 软件工程
    • 502 篇 信息与通信工程
    • 311 篇 土木工程
    • 282 篇 控制科学与工程
    • 269 篇 电气工程
    • 230 篇 材料科学与工程(可...
    • 230 篇 电子科学与技术(可...
    • 218 篇 机械工程
    • 217 篇 生物工程
    • 214 篇 化学工程与技术
    • 208 篇 建筑学
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 124 篇 安全科学与工程
    • 121 篇 网络空间安全
    • 119 篇 力学(可授工学、理...
    • 110 篇 光学工程
    • 104 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,432 篇 理学
    • 750 篇 数学
    • 399 篇 物理学
    • 240 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 120 篇 地球物理学
  • 609 篇 管理学
    • 404 篇 管理科学与工程(可...
    • 229 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 108 篇 法学
  • 76 篇 医学
  • 41 篇 军事学
  • 38 篇 经济学
  • 33 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 71 篇 cryptography
  • 65 篇 authentication
  • 65 篇 feature extracti...
  • 61 篇 training
  • 57 篇 deep learning
  • 57 篇 security
  • 54 篇 privacy
  • 52 篇 laboratories
  • 48 篇 information secu...
  • 47 篇 computational mo...
  • 47 篇 protocols
  • 43 篇 data mining
  • 40 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 36 篇 optimization
  • 36 篇 blockchain
  • 35 篇 accuracy
  • 32 篇 computer science

机构

  • 226 篇 state key labora...
  • 154 篇 school of cyber ...
  • 151 篇 key laboratory o...
  • 105 篇 university of ch...
  • 91 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 state key labora...
  • 77 篇 department of co...
  • 76 篇 information secu...
  • 75 篇 school of softwa...
  • 70 篇 school of comput...
  • 64 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 54 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 32 篇 cao xiaochun
  • 32 篇 yingmin jia
  • 30 篇 xiuli du
  • 25 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,734 篇 英文
  • 206 篇 中文
  • 119 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4057 条 记 录,以下是3981-3990 订阅
排序:
Self-management unit-based and differentiated service-enable web container
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2007年 第8期44卷 1418-1428页
作者: Li, Yang Chen, Ningjiang Jin, Beihong Zuo, Lin Huang, Tao Technology Center of Software Engineering Institute of Software Chinese Acad. of Sci. Beijing 100080 China State Key Laboratory of Computer Science Institute of Software Chinese Acad. of Sci. Beijing 100080 China Graduate University Chinese Acad. of Sci. Beijing 100049 China College of Computer and Electronic Information Guangxi University Nanning 530004 China
Web container conforming to J2EE specification, which provides runtime environment for servlet and JSP and adopts best-effort service mode, has become an effective platform to deploy enterprise Web applications on Int... 详细信息
来源: 评论
Pseudorandomness on the Round-Structure of Skipjack
收藏 引用
电子学报(英文版) 2006年 第3期15卷 378-383页
作者: WU Wenling WEI Hongru State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China School of Applied Science Beijing University of Science and Technology Beijing 100083 China
Skipjack is a simple cipher, and one interesting feature is the use of two different types of rounds. These are referred to as A and B-rounds. Earlier researchers have studied the security of Skipjack against some att... 详细信息
来源: 评论
Experimental Studies on High-Frequency Performance of the Inverse Control Magneto-Rheological Damper
收藏 引用
Transactions of Tianjin University 2006年 第B9期12卷 61-64页
作者: DU Xiuli LIAO Weizhang NIU Dongxu Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing 100022 China
Severe vibration of underground structures may be induced under blast loads. According to the characteristics of the explosion-induced ground shock wave, a new-type damper, inverse control magneto-rheological(MR) da... 详细信息
来源: 评论
An application-semantics-based relaxed transaction model for internetware
收藏 引用
Science in China(Series F) 2006年 第6期49卷 774-791页
作者: HUANG Tao DING Xiaoning WEI Jun Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100080 China Key laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing100080 China Graduate School of Chinese Academy of Sciences Beijing 100080 China
An internetware application is composed by existing individual services, while transaction processing is a key mechanism to make the composition reliable. The existing research of transactional composite service (TCS... 详细信息
来源: 评论
Robust Disaster Recovery System Model
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第1期11卷 170-174页
作者: WANG Kun SU Rui-dan LI Zeng-xin CAI Zhen ZHOU Li-hua Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi' an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante... 详细信息
来源: 评论
Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1903-1906页
作者: ZHANG Jianhong ZOU Wei College of Science North China University of Technology Beijing 100041 China Institute of Software of Chinese Academy of Sciences/State Key Laboratory of Information Security Beijing 100080 China
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the... 详细信息
来源: 评论
Remark on S. Saeednia and H. Ghodosi's Group-Oriented Cryptosystem
收藏 引用
电子学报(英文版) 2006年 第4期15卷 725-726页
作者: XU Chunxiang ZHOU Junhui XIAO Guozhen School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100039 China Information Security and Privacy Institute Xidian University Xi'an 710071 China
S. Saeednia and H. Ghodosi proposed a self-certified group-oriented cryptosystem that allows the participants to decrypt the ciphertext themselves, and the participants' public keys are publicly certifiable. In th... 详细信息
来源: 评论
An ID-based watermarking scheme for Java programs
An ID-based watermarking scheme for Java programs
收藏 引用
EUC 2006: Embedded and Ubiquitous Computing Workshops
作者: Yuan, Zheng Wen, Qiaoyan Wu, Wenling Zhang, Qing School of Science Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Electronic Science and Technology Institute Beijing 100036 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
In this paper, we propose an identities(JD) based watermarking scheme for Java programs. In our scheme, the watermark is generated by participants' identities, embedded via the watermarked opaque predicates, and v... 详细信息
来源: 评论
Access control model for P2P file-sharing systems based on trust and recommendation
Access control model for P2P file-sharing systems based on t...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Yue, Guang-Xue Yu, Fei Chen, Yi-Jun Wu, Rong-Hui An, Ji-Yao Li, Ren-Fa College of Information Engineering JiaXing University JiaXing 314000 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China School of Computer and Communication Hunan University Changsha 410082 China
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Ronghui, Wu Renfa, Li Fei, Yu Guangxue, Yue Cheng, Xu School of Computer and Communication Hunan University Changsha410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论