咨询与建议

限定检索结果

文献类型

  • 101 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 84 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 37 篇 信息与通信工程
    • 29 篇 电子科学与技术(可...
    • 22 篇 电气工程
    • 13 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 8 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 7 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 106 篇 理学
    • 60 篇 物理学
    • 49 篇 数学
    • 20 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 法学
    • 3 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 6 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 passive optical ...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 privacy protecti...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 matrix algebra
  • 2 篇 blockchain
  • 2 篇 field programmab...

机构

  • 76 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 9 篇 zhang wenzheng

语言

  • 170 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
177 条 记 录,以下是1-10 订阅
排序:
Delayed interference-based broadband optical chaos generation in a mutual coupled RSOA and DFB system
收藏 引用
Optics Letters 2025年 第10期50卷 3381-3384页
作者: Qian, Jiahao Jiang, Ning Li, Anran Zhang, Yiqun Xu, Bingjie Huang, Wei Qiu, Kun School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China Tianfu Jiangxi Laboratory Chengdu 641419 China National Key Laboratory of Security Communication Chengdu 610041 China
In this Letter, a delayed interference (DI)-based chaos generation scheme in a mutually coupled system consisting of a reflective semiconductor optical amplifier (RSOA) and a distributed feedback (DFB) semiconductor l... 详细信息
来源: 评论
Threshold Password-Hardening Updatable Oblivious Key Management
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4799-4814页
作者: Jiang, Changsong Xu, Chunxiang Liu, Zhen Dong, Xinfeng Zhang, Wenzheng University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Singapore Management University School of Computing and Information Systems Bras Basah 188065 Singapore Huzhou313001 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Science and Technology on Communication Security Laboratory Chengdu610041 China
We propose a threshold password-hardening updatable oblivious key management system dubbed TPH-UOKM for cloud storage. In TPH-UOKM, a group of key servers share a user-specific secret key for a user, and assist the us... 详细信息
来源: 评论
Vertin: Fast, communication-friendly and Key-compact secure inference system for NNs and LLMs
收藏 引用
Journal of Information security and Applications 2025年 91卷
作者: Bie, Xin Liu, Zhenhua Liang, Han School of Mathematics and Statistics Xidian University Xi'an710071 China Science and Technology on Communication Security Laboratory Chengdu610041 China
Existing secure inference schemes based on function secret sharing (FSS) allow the client to obtain inference results while protecting the client's inputs, the server's neural networks (NNs), and large languag... 详细信息
来源: 评论
Fault-tolerant multi-biometric recognition system based on neural network
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年 74卷
作者: Zhang, Zhongxia Zhang, Wenzheng Pan, Shanhai China Electronics Technology Cyber Security Co Lt Chengdu610041 China Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Institute of China Electronics Technology Group Corporation Chengdu610041 China
The multi-biometric system ingeniously integrates multiple homogenous or heterogeneous biometric features, enhancing the precision and security of identity verification compared to single biometric systems. However, t... 详细信息
来源: 评论
Attribute-Based Policy-Hiding Redactable Blockchain With Authorizable Verification for Energy Internet
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Xue, Jingting Liu, Liang Li, Fagen Jing, Ximin Zhang, Wenzheng Zhang, Xiaojun Zhou, Yu Southwest Petroleum University School of Computer Science and Software Engineering Engineering Research Center for Intelligent Oil and Gas Exploration Chengdu 610500 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu 611731 China Institute of Southwestern Communication Science and Technology on Communication Security Laboratory Chengdu 610041 China
The goal of the energy internet is to enable communication between distributed energy endpoints to facilitate information exchange and trading matching. Blockchain, which ensures content consistency, bridges the gaps ... 详细信息
来源: 评论
Improving key rates by tighter information reconciliation leakage estimation for quantum key distribution
arXiv
收藏 引用
arXiv 2025年
作者: Mao, Hao-Kun Yang, Bo Qiao, Yu-Cheng Yan, Bing-Ze Zhao, Qiang Xu, Bing-Jie Li, Qiong School of Cyberspace Science Faculty of Computing Harbin Institute of Technology Harbin150080 China Guangxi Key Lab Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China School of Information Engineering Zhejiang Ocean University Zhoushan316022 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
Previous research has aimed to precisely estimate information leakage to improve the secure key rate (SKR) and maximum transmission distance in quantum key distribution (QKD). However, existing methods repeatedly cons... 详细信息
来源: 评论
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem
收藏 引用
Chinese Physics B 2018年 第3期27卷 161-176页
作者: Zeyu Liu Tiecheng Xia Jinbo Wang Department of Mathematics Shanghai UniversityShanghai 200444China Science and Technology on Communication Security Laboratory Chengdu 610041China
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional ***,the chaos behaviors of the proposed map are observed and the bifurcation diagram... 详细信息
来源: 评论
Decoy-state method for quantum-key-distribution-based quantum private query
收藏 引用
science China(Physics,Mechanics & Astronomy) 2022年 第4期65卷 41-48页
作者: Bin Liu Shuang Xia Di Xiao Wei Huang Bingjie Xu Yang Li College of Computer Science Chongqing UniversityChongqing 400044China Science and Technology on Communication Security Laboratory Institute of Southwestern CommunicationChengdu 610041China
The quantum private query(QPQ)is a quantum solution for the symmetrically private information retrieval *** study the security of quantum-key-distribution-based QPQ with weak coherent *** result shows that multiphoton... 详细信息
来源: 评论
New State Recovery Attacks on the Grain v1 Stream Cipher
收藏 引用
China communications 2016年 第11期13卷 180-188页
作者: Lin Ding Chenhui Jin Jie Guan Shaowu Zhang Junzhi Li Hong Wang Wei Zhao Zhengzhou Information Science and Technology Institute 450000 Zhengzhou China Science and Technology on Communication Security Laboratory 610041 Chengdu China
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key... 详细信息
来源: 评论
Construction of balanced Boolean functions with high nonlinearity, good local and global avalanche characteristics
收藏 引用
Frontiers of Mathematics in China 2016年 第2期11卷 339-352页
作者: Luyang LI Yujuan SUN Weiguo ZHANG ISN Laboratory Xidian University Xi'an 710071 China Science and Technology on Communication Security Laboratory Chengdu 610041 China
Boolean functions possessing multiple cryptographic criteria play an important role in the design of symmetric cryptosystems. The following criteria for cryptographic Boolean functions are often considered: high nonl... 详细信息
来源: 评论