咨询与建议

限定检索结果

文献类型

  • 25 篇 会议
  • 22 篇 期刊文献

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 29 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 11 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 生物工程
    • 2 篇 交通运输工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 航空宇航科学与技...
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 7 篇 理学
    • 4 篇 数学
    • 3 篇 生物学
    • 2 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 4 篇 servers
  • 3 篇 authentication
  • 3 篇 protocols
  • 3 篇 encryption
  • 3 篇 cloud computing
  • 2 篇 data processing
  • 2 篇 time delay
  • 2 篇 ports (computers...
  • 2 篇 benchmarking
  • 2 篇 vehicles
  • 2 篇 privacy
  • 1 篇 internet of thin...
  • 1 篇 global positioni...
  • 1 篇 node.js
  • 1 篇 implicit emotion...
  • 1 篇 patents
  • 1 篇 system domain is...
  • 1 篇 ntru lattice
  • 1 篇 elliptic curve
  • 1 篇 parallel process...

机构

  • 10 篇 school of comput...
  • 7 篇 beijing engineer...
  • 6 篇 department of co...
  • 4 篇 department of el...
  • 4 篇 beijing engineer...
  • 4 篇 beijing engineer...
  • 3 篇 beijing engineer...
  • 3 篇 shanghai radio e...
  • 3 篇 beijing eng. res...
  • 2 篇 school of comput...
  • 2 篇 beijing eng. res...
  • 2 篇 overhaul branch ...
  • 2 篇 beijing engineer...
  • 2 篇 research center ...
  • 1 篇 beijing eng. res...
  • 1 篇 faculty of engin...
  • 1 篇 science and tech...
  • 1 篇 beijing engineer...
  • 1 篇 school of comput...
  • 1 篇 beijing institut...

作者

  • 11 篇 zhu liehuang
  • 7 篇 liehuang zhu
  • 6 篇 du xiaojiang
  • 6 篇 gao yang
  • 6 篇 guizani mohsen
  • 5 篇 zhang chuan
  • 5 篇 xu chang
  • 5 篇 heyan huang
  • 5 篇 sharif kashif
  • 5 篇 huang heyan
  • 4 篇 yang yizhe
  • 4 篇 li jiawei
  • 4 篇 li yinghao
  • 4 篇 sun huashan
  • 3 篇 li yuanzhang
  • 3 篇 tan yu'an
  • 3 篇 tan yu-an
  • 3 篇 yu xiao
  • 2 篇 zhang quanxin
  • 2 篇 wu yixiao

语言

  • 46 篇 英文
  • 1 篇 中文
检索条件"机构=Research Center of Massive Language Information Processing and Cloud Computing Application"
47 条 记 录,以下是1-10 订阅
排序:
A novel secure group RFID authentication protocol
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2014年 第1期21卷 94-103页
作者: GUO Cong ZHANG Zi-jian ZHU Lie-huang TAN Yu-an YANG Zhen Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of ComputerBeijing Institute of Technology
The trend of researching group radio frequency identification devices(RFID) authentication protocol has become increasingly popular in recent years. One of the newest work in this area is from Batina and Lee, they p... 详细信息
来源: 评论
Scalable protocol for cross-domain group password-based authenticated key exchange
收藏 引用
Frontiers of Computer Science 2015年 第1期9卷 157-169页
作者: Cong GUO Zijian ZHANG Liehuang ZHU Yu-an TAN Zhen YANG Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing 100081 China
Cross-domain password-based authenticated key exchange (PAKE) protocols have been studied for many years. However, these protocols are mainly focusing on multi-participant within a single domain in an open network e... 详细信息
来源: 评论
Isolating Host Environment by Booting Android from OTG Devices
收藏 引用
Chinese Journal of Electronics 2018年 第3期27卷 617-624页
作者: XUE Yuan ZHANG Xiaosong YU Xiao ZHANG Yaoyuan TAN Yu'an LI Yuanzhang School of Computer Science and Technology Beijing Institute of Technology Department of Computer Science and Technology Tangshan University Research Center of Massive Language Information Processing and Cloud Computing Application
With the integration of smartphone into daily life, end users store a large amount of sensitive information into Android device. For protecting the sensitive information, a method of multi-booting Android OS from On-T... 详细信息
来源: 评论
An Identity-Based Proxy Signature on NTRU Lattice
收藏 引用
Chinese Journal of Electronics 2018年 第2期27卷 297-303页
作者: ZHU Hongfei TAN Yu'an YU Xiao XUE Yuan ZHANG Qikun ZHU Liehuang LI Yuanzhang The School of Computer Science and Technology Beijing Institute of Technology Institute of Computer and Communication Engineering Zhengzhou University of Light Industry Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application
Proxy signature plays an important role in distributed systems, mobile agent applications, distributed shared object systems, global distribution networks and mobile communications etc., since it allows the original s... 详细信息
来源: 评论
Answer Extraction Based on Merging Score Strategy of Hot Terms
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 614-620页
作者: LE Juan ZHANG Chunxia NIU Zhendong School of Computer Science and Technology Beijing Institute of Technology School of Software Beijing Institute of Technology Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application Beijing Institute of Technology
Answer extraction(AE) is one of the key technologies in developing the open domain Question & answer(Q&A) *** task is to yield the highest score to the expected answer based on an effective answer score *** in... 详细信息
来源: 评论
An Effective RAID Data Layout for Object-Based De-duplication Backup System
收藏 引用
Chinese Journal of Electronics 2016年 第5期25卷 832-840页
作者: YAN Fang TAN Yu'an ZHANG Quanxin WU Fei CHENG Zijing ZHENG Jun School of Computer Science and Technology Beijing Institute of Technology School of Information Beijing Wuzi University Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Space Star Technology CO. LtdChina Academy of Space Technology
We propose an alternative Redundant array of independent disks(RAID) data layout, Asymmetrical grouping data organization(AGDO), for object-based data de-duplication backup system. Object-based data deduplication is a... 详细信息
来源: 评论
Improving Parallel Corpus Quality for Chinese-Vietnamese Statistical Machine Translation
收藏 引用
Journal of Beijing Institute of Technology 2018年 第1期27卷 127-136页
作者: Huu-anh Tran Yuhang Guo Ping Jian Shumin Shi Heyan Huang Department of Computer Science and Technology Beijing Institute of Technology Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Application Beijing Institute of Technology
The performance of a machine translation system heavily depends on the quantity and quality of the bilingual language resource. However,getting a parallel corpus,which has a large scale and is of high quality,is a ver... 详细信息
来源: 评论
A VoLTE Encryption Experiment for Android Smartphones  5th
A VoLTE Encryption Experiment for Android Smartphones
收藏 引用
5th International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2017
作者: Liu, Shaoru Wang, Yao Zhang, Quanxin Li, Yuanzhang School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China Research Center of Massive Language Information Processing and Cloud Computing Application Beijing100081 China
With the increasing popularity of 4G networks, communication technology based on VoLTE protocol has gradually become more and more mature. However, the public pay more attention to data security in the communication. ... 详细信息
来源: 评论
A novel audio information hiding scheme based on rMAC
A novel audio information hiding scheme based on rMAC
收藏 引用
2012 International Conference on information Technology and Software Engineering, ITSE 2012
作者: Yu, Litao Zhu, Liehuang Liu, Dan Xie, Yuzhou Beijing Eng. Res. Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing 100086 China
We present a novel audio information hiding scheme based on robust message authentication code (rMAC). By combining coefficient quantization based information hiding scheme with rMAC and chaotic encryption, proposed s... 详细信息
来源: 评论
The adaptive multicast data origin authentication protocol
The adaptive multicast data origin authentication protocol
收藏 引用
2nd CCF Internet Conference of China, ICoC 2013
作者: Zhu, Liehuang Yang, Hao Yang, Zhenghe Beijing Eng. Research Center of Massive Language Info. Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing China
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into account. However, the network conditions will obviously influence the... 详细信息
来源: 评论