咨询与建议

限定检索结果

文献类型

  • 99 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 82 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 105 篇 理学
    • 60 篇 物理学
    • 48 篇 数学
    • 19 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 5 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...
  • 2 篇 cloud computing

机构

  • 74 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 167 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
175 条 记 录,以下是41-50 订阅
排序:
The autocorrelation distribution of balanced Boolean function
收藏 引用
Frontiers of Computer science 2013年 第2期7卷 272-278页
作者: Yu ZHOU Weiguo ZHANG Juan LI Xinfeng DONG Guozhen XIAO Science and Technology on Communication Security Laboratory China Chengdu 610041 State Key Laboratory of Integrated Service Networks Xidian UniversityChina Xi'an 710071 Foreign Language Department Emei Campus Southwest Jiaotong University China Emei 614202 State Key Laboratory of Information Security Chinese Academy of SciencesChina Beijing 100093
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower ... 详细信息
来源: 评论
Expression Tree-based Policy Conflict Detection Algorithm
Expression Tree-based Policy Conflict Detection Algorithm
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Wang, Xue Zhang, Hao Wu, Kaijun Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
In attribute-based access control services, there are problems such as cumbersome policy control, prone to authorization conflicts, and conflicts caused by complex attribute structures are not easy to identify. Due to... 详细信息
来源: 评论
Data security Storage Scheme For UAV Cluster Based On Distributed Storage
Data Security Storage Scheme For UAV Cluster Based On Distri...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Wu, Kaijun Tian, Bo Wang, Xue Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
UAVs have been widely used in various fields such as emergency rescue and disaster relief, weather detection, scientific research measurement, aerial surveying and mapping, and military reconnaissance. The concept of ... 详细信息
来源: 评论
An efficient authentication scheme based on Zero Trust for UAV swarm
An efficient authentication scheme based on Zero Trust for U...
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Yang, Dongyu Zhao, Yue Wu, Kaijun Guo, Xiaoyu Peng, Haiyang Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
In recent years, the concept of UAV (Unmanned Aerial Vehicle) swarm has been proposed and developed, which effectively solves the shortcomings of relatively small payload and relatively weak information perception pro... 详细信息
来源: 评论
A secure and anonymous communication scheme based on Internet public service environment
A secure and anonymous communication scheme based on Interne...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Wu, Kaijun Tian, Bo Wang, Xue Zhao, Qi Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
With the continuous expansion of the Internet and the full popularization of intelligent terminal devices, the risk of a large amount of personal privacy data such as identity, location, and preferences being leaked d... 详细信息
来源: 评论
Efficient registration-based signature schemes
收藏 引用
Journal of Systems Architecture 2025年 166卷
作者: Zhenhua Liu Yujing Yuan Zhiqing Chen Yu Han Baocang Wang School of Mathematics and Statistics Xidian University Xi’an 710071 China Science and Technology on Communication Security Laboratory Chengdu 610041 China School of Cyber Engineering Xidian University Xi’an 710071 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an 710071 China
Registration-based cryptography is a newly emerging variant of the public-key cryptosystem that addresses the key-escrow issue inherent in identity-based encryption. However, the key-escrow problem in identity-based s...
来源: 评论
A Design Scheme and security Analysis of Unmanned Aerial Vehicle  12th
A Design Scheme and Security Analysis of Unmanned Aerial Veh...
收藏 引用
12th International Conference on Wireless and Satellite Services, WiSATS 2021
作者: Yang, Dongyu Zhao, Yue Wu, Kaijun Yi, Zhongqiang Peng, Haiyang Science and Technology on Communication Security Laboratory Chengdu610041 China No. 30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd. Chengdu610041 China
Since the 21st century, informatization, modernization and intellectualization have become an important direction of national science and technology development. Especially in recent years, with the continuous improve... 详细信息
来源: 评论
A Survey of Edge Computing Resource Allocation Strategies Based on Federated Learning
A Survey of Edge Computing Resource Allocation Strategies Ba...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Ni, Siyuan He, Yuanhang Chen, Lei Wang, Yuyao Yu, Fei Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu China
In the edge computing environment, the data on edge computing is at risk of leakage due to the variety and wide distribution of nodes. As a new distributed machine learning framework, federated learning can effectivel... 详细信息
来源: 评论
IDV:Internet Domain Name Verification Based on Blockchain
收藏 引用
Computer Modeling in Engineering & sciences 2021年 第10期129卷 299-322页
作者: Ning Hu Yu Teng Yan Zhao Shi Yin Yue Zhao Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Zhong Zi Hua Ke Traffic Construction Technology Co. Ltd.Beijing100195China Science and Technology on Communication Security Laboratory Chengdu610041China
The rapid development of blockchain technology has provided new ideas for network security ***-based network security enhancement solutions are attracting widespread *** paper proposes an Internet domain name verifica... 详细信息
来源: 评论
Modulation noise model for multi-carrier Gaussian modulated continuous-variable quantum key distribution based on OFDM technology  10
Modulation noise model for multi-carrier Gaussian modulated ...
收藏 引用
Quantum and Nonlinear Optics X 2023
作者: Ye, Ting Wang, Heng Pan, Yan Pi, Yaodi Shao, Yun Gan, Zhiwang Li, Yang Huang, Wei Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China China Electronics Technology Group Corporation Beijing100846 China
In this paper, a multi-carrier Gaussian modulated continuous variable quantum key distribution (CV-QKD) scheme has been proposed based on orthogonal frequency division multiplexing (OFDM) for distributing multiplexing... 详细信息
来源: 评论