咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是2611-2620 订阅
排序:
Threshold Multiparty Controlled Teleportation of Arbitrary m-Qubit Quantum information
收藏 引用
Communications in Theoretical Physics 2009年 第10期52卷 593-596页
作者: YANG Yu-Guang WEN Qiao-Yan College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 China State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
We present a (t, .n) threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubit quantum state between two remote parties. The unknown m-qubit quantum state can be recovered by the receive... 详细信息
来源: 评论
A Fast Correlation Attack via Parallel Computing
A Fast Correlation Attack via Parallel Computing
收藏 引用
The Fifth International Conference on information Assurance and security(第五届信息保障与安全国际会议)
作者: Qiong Liu Yupu Hu Key Laboratory of Computer Network and Information Security Xidian University Xi'an China
For stream ciphers which use binary linear feedback shift registers as stream generators, fast correlation attack is one of the most important attacks. Aiming at the shortcomings of serial algorithm, the proposed tech... 详细信息
来源: 评论
Efficient Schnorr type identity-based blind signatures from bilinear pairings
Efficient Schnorr type identity-based blind signatures from ...
收藏 引用
2009 WRI World Congress on computer Science and information Engineering, CSIE 2009
作者: Zhenjie, Huang Qunshan, Chen Rufen, Huang Xuanzhi, Lin Department of Computer Science and Engineering Zhangzhou Normal University Zhangzhou 363000 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
Identity-based cryptosystem has a property that a user's public key can be easily calculated from his identity by a publicly available function, and can be hence a good alternative for certificate-based public key... 详细信息
来源: 评论
An improved identity-based group signature scheme
An improved identity-based group signature scheme
收藏 引用
2009 International Conference on Computational Intelligence and security, CIS 2009
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 Jiangxi Province China Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ... 详细信息
来源: 评论
Ideal perfect multilevel threshold secret sharing scheme
Ideal perfect multilevel threshold secret sharing scheme
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Lin, Changlu Harn, Lein Ye, Dingfeng Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences China Key Laboratory of Communication and Information System Beijing Jiaotong University Beijing Municipal Commission of Education China Department of Computer Science Electrical Engineering University of Missouri-Kansas City United States
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
Study of secret sharing schemes based on quantum theory
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 127-132+139页
作者: Zhu, Zhen-Chao Zhang, Yu-Qing Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China National Computer Network Intrusion Protection Center GUCAS Beijing 100043 China
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quant... 详细信息
来源: 评论
A practical electronic payment scheme
A practical electronic payment scheme
收藏 引用
2009 9th International Symposium on Communications and information Technology, ISCIT 2009
作者: Liu, Jingwei Kwak, Kyung Sup Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China UWB Wireless Communications Research Center Inha University Incheon 402-751 Korea Republic of
In this paper, by converse using blind signature, we propose a practical electronic payment scheme for electronic commerce. This scheme is different from the existing schemes used widely in the internet at present and... 详细信息
来源: 评论
A secure multi-party computing model based on trusted computing platform
A secure multi-party computing model based on trusted comput...
收藏 引用
IEEE 9th International Conference on computer and information Technology, CIT 2009
作者: Yan, Fei Zhang, Huanguo Zhao, Bo Computer School Wuhan University Wuhan Hubei 430079 China Key Lab. of Aerospace Information Security and Trusted Computing MOE Wuhan Hubei 430079 China
With the increasing requirement of resource sharing, security has become a crucial item of application system. In order to improve the secure assurance of resource sharing, many researches have been carried out. Aimin... 详细信息
来源: 评论
Improved differential fault attack on the AES-128
收藏 引用
Journal of Computational information Systems 2009年 第1期5卷 223-228页
作者: Liu, Shuanggen Ni, Haiying Hu, Yupu Zhu, Hui College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 China Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
The differential fault attack is a kind of side channel attacks. This paper proposes a differential fault analysis on the AES key schedule and shows how an entire 128-bit AES key can be retrieved. In the workshop at F... 详细信息
来源: 评论
Research on unified network access control architecture
Research on unified network access control architecture
收藏 引用
IEEE 9th International Conference on computer and information Technology, CIT 2009
作者: Liu, Yabin Zhang, Huanguo Zhang, Liqiang Zhao, Bo Computer School Wuhan University Wuhan Hubei China Key Lab. of Aerospace Information Security and Trusted Computing MOE Wuhan Hubei China State Key Lab. of Software Engineering Wuhan University Wuhan Hubei China
Border access control, network security mechanism and system access control are three separately access control procedures when user accessing the resource on network. network access control mechanism, which adding th... 详细信息
来源: 评论