咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是4071-4080 订阅
排序:
Study on Xiluodu and Xiangjiaba UHVDC Earth Electrodes
Study on Xiluodu and Xiangjiaba UHVDC Earth Electrodes
收藏 引用
International Conference on Power System technology (POWERCON)
作者: Mingde Cui Lianguang Liu Zhongming Sun Key Laboratory of Power System Protection andDynamic Security Monitoring and Control Ministry of Education North China Electric Power University Beijing China Beijing Wanglian HVDC Engineering Technology Company Limited Beijing China
Grounding characteristics of linear, star-type and toroidal electrodes are discussed in this paper. Based on the analysis of the performance of double-ring in uniform and horizontal two-layer soils, an electrode model... 详细信息
来源: 评论
Disaster recovery system model with e-government case study
收藏 引用
Natural Hazards Review 2006年 第4期7卷 145-149页
作者: Wang, Kun Li, Long-Hai Yuan, Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Xidian Univ. Ministry of Education Xi'an 710071 Shaanxi China Dept. of Computer Science and Technology Xidian Univ. Xi'an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ... 详细信息
来源: 评论
Certificateless Convertible Limited Verifier Signature Scheme
Certificateless Convertible Limited Verifier Signature Schem...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Chenhuang Wu Zhenjie Huang Department of Computer Science and Engineering Zhangzhou Normal University Fujian China Department of Computer Science and Engineering Shanghai JiaoTong University Shanghai China State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing China
Certificateless public key cryptography (CL-PKC) as a new paradigm was introduced by Al-Riyami and Paterson in Asiacrypt 2003, which removes the use of certificate to ensure the authenticity of the user's public k... 详细信息
来源: 评论
A Simulink-to-FPGA Co-Design of Encryption Module
A Simulink-to-FPGA Co-Design of Encryption Module
收藏 引用
IEEE Asia-Pacific Conference on Circuits and Systems
作者: Xiaoying Li Fuming Sun Enhua Wu Department of Computer and Information Science FST University of Macau Macao China School of Information Engineering University of Science and Technology Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China
In this paper, circuit design of an arithmetic module applied to cryptography - modulo multiplicative inverse is presented and implemented using FPGA hardware technology. This modular arithmetic function contains iter... 详细信息
来源: 评论
Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor
Data Distribution Algorithm of High-Speed Intrusion Detectio...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Cheng Xu Cheng Xu Fei Yu Fei Yu Zhenghui Dai Zhenghui Dai Guangxue Yue Guangxue Yue Renfa Li Renfa Li Provincial Key Laboratory of Computer Information Processing Technology Suzhou Jiangsu China State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China School of Computer & Communication Hunan University Changsha China College of Informationg Engineering JiaXing University China
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
来源: 评论
Polar LEO satellite constellation measurement by delay probing
Polar LEO satellite constellation measurement by delay probi...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Junfeng Wang Hongxia Zhou Fanjiang Xu Mingtian Zhou College of Computer Science and Engineering University of Electronic Science and Technology ChengDu China National Key Laboratory of Integrated Information System Technology Institute of Software Chinese Academy and Sciences Beijing China Chongqing Communication College Chongqing China
Low Earth orbit (LEO) satellite networks are capable of providing wireless connectivity seamlessly and continuously to any part of the world with guaranteed short round-trip propagation delay. As a key part of next ge... 详细信息
来源: 评论
Topological dynamics characterization for layered satellite networks
Topological dynamics characterization for layered satellite ...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Junfeng Wang Yuemei Hu Hongxia Zhou Mingtian Zhou College of Computer Science and Engineering University of Electronic Science and Technology ChengDu China National Key Laboratory of Integrated Information System Technology Institute of Software Chinese Academy and Sciences Beijing China Chongqing Communication College Chongqing China
The highly topological dynamics characterize the most fundamental property of satellite networks contrary to the terrestrial networks. This manifest feature directs the researches on various aspects of satellite netwo... 详细信息
来源: 评论
Framework for supporting extended transaction models in J2EE platform
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2006年 第7期43卷 1273-1279页
作者: Zhang, Xin Ding, Xiaoning Jin, Beihong Li, Jing Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100080 China Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
As for the development of the Internet applications and distributed computing, the need for supporting these distributed, collaborative, loosely coupled and complex applications emerges. Although powerful, the flat mo... 详细信息
来源: 评论
Worthy-of-note option for urban natural gas consumption-dual source heating/air conditioning system
收藏 引用
Kung Cheng Je Wu Li Hsueh Pao/Journal of engineering Thermophysics 2006年 第2期27卷 181-184页
作者: Song, Zhi-Ping Beijing Key Laboratory of Security and Clean Energy Technology Department of Thermal Power Engineering North China Electric Power University Beijing 102206 China
Dual Source Heating (Air Conditioning) System is a system proposed in patent 00100102.7. A full exposition of its performance is presented in this paper. It is found that in comparison with conventional system it cons... 详细信息
来源: 评论
Research on User Authentication for Grid Computing security
Research on User Authentication for Grid Computing Security
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Ronghui Wu Ronghui Wu Renfa Li Renfa Li Fei Yu Fei Yu Guangxue Yue Guangxue Yue Cheng Xu Cheng Xu State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China School of Computer & Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu Province China College of Informationg Engineering JiaXing University JiaXing China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
来源: 评论