咨询与建议

限定检索结果

文献类型

  • 101 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 84 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 37 篇 信息与通信工程
    • 29 篇 电子科学与技术(可...
    • 22 篇 电气工程
    • 13 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 8 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 7 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 106 篇 理学
    • 60 篇 物理学
    • 49 篇 数学
    • 20 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 法学
    • 3 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 6 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 passive optical ...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 privacy protecti...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 matrix algebra
  • 2 篇 blockchain
  • 2 篇 field programmab...

机构

  • 76 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 9 篇 zhang wenzheng

语言

  • 170 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
177 条 记 录,以下是41-50 订阅
排序:
A secure face authentication scheme based on honeypot technology  6
A secure face authentication scheme based on honeypot techno...
收藏 引用
6th International Conference on communication, Image and Signal Processings, CCISP 2021
作者: He, Yachen Dong, Guishan Liu, Dong Hao, Yao Peng, Haiyang Chen, Yuxiang No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China Science and Technology on Communication Security Laboratory Chengdu610041 China
Biometric verification is considered to be one of the most reliable approaches to identity authentication. But biometric characteristics cannot be changed. The loss of privacy is permanent if they are ever compromised... 详细信息
来源: 评论
PUF-assisted Anonymous Authentication Scheme for 6G VANET  24
PUF-assisted Anonymous Authentication Scheme for 6G VANET
收藏 引用
2024 Guangdong-Hong Kong-Macao Greater Bay Area International Conference on Digital Economy and Artificial Intelligence, DEAI 2024
作者: Wang, Yu Zhao, Yue Meng, Jintao Zhang, Hao Yang, Dongyu The Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China
Breaking the traditional external security defense concept, digging into the common endogenous attributes of communication and security, and integrating cryptography technology and chip fingerprint to effectively enab... 详细信息
来源: 评论
The autocorrelation distribution of balanced Boolean function
收藏 引用
Frontiers of Computer science 2013年 第2期7卷 272-278页
作者: Yu ZHOU Weiguo ZHANG Juan LI Xinfeng DONG Guozhen XIAO Science and Technology on Communication Security Laboratory China Chengdu 610041 State Key Laboratory of Integrated Service Networks Xidian UniversityChina Xi'an 710071 Foreign Language Department Emei Campus Southwest Jiaotong University China Emei 614202 State Key Laboratory of Information Security Chinese Academy of SciencesChina Beijing 100093
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower ... 详细信息
来源: 评论
Expression Tree-based Policy Conflict Detection Algorithm
Expression Tree-based Policy Conflict Detection Algorithm
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Wang, Xue Zhang, Hao Wu, Kaijun Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
In attribute-based access control services, there are problems such as cumbersome policy control, prone to authorization conflicts, and conflicts caused by complex attribute structures are not easy to identify. Due to... 详细信息
来源: 评论
Data security Storage Scheme For UAV Cluster Based On Distributed Storage
Data Security Storage Scheme For UAV Cluster Based On Distri...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Wu, Kaijun Tian, Bo Wang, Xue Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
UAVs have been widely used in various fields such as emergency rescue and disaster relief, weather detection, scientific research measurement, aerial surveying and mapping, and military reconnaissance. The concept of ... 详细信息
来源: 评论
An efficient authentication scheme based on Zero Trust for UAV swarm
An efficient authentication scheme based on Zero Trust for U...
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Yang, Dongyu Zhao, Yue Wu, Kaijun Guo, Xiaoyu Peng, Haiyang Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
In recent years, the concept of UAV (Unmanned Aerial Vehicle) swarm has been proposed and developed, which effectively solves the shortcomings of relatively small payload and relatively weak information perception pro... 详细信息
来源: 评论
A secure and anonymous communication scheme based on Internet public service environment
A secure and anonymous communication scheme based on Interne...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Wu, Kaijun Tian, Bo Wang, Xue Zhao, Qi Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
With the continuous expansion of the Internet and the full popularization of intelligent terminal devices, the risk of a large amount of personal privacy data such as identity, location, and preferences being leaked d... 详细信息
来源: 评论
Efficient registration-based signature schemes
收藏 引用
Journal of Systems Architecture 2025年 166卷
作者: Zhenhua Liu Yujing Yuan Zhiqing Chen Yu Han Baocang Wang School of Mathematics and Statistics Xidian University Xi’an 710071 China Science and Technology on Communication Security Laboratory Chengdu 610041 China School of Cyber Engineering Xidian University Xi’an 710071 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an 710071 China
Registration-based cryptography is a newly emerging variant of the public-key cryptosystem that addresses the key-escrow issue inherent in identity-based encryption. However, the key-escrow problem in identity-based s...
来源: 评论
A Design Scheme and security Analysis of Unmanned Aerial Vehicle  12th
A Design Scheme and Security Analysis of Unmanned Aerial Veh...
收藏 引用
12th International Conference on Wireless and Satellite Services, WiSATS 2021
作者: Yang, Dongyu Zhao, Yue Wu, Kaijun Yi, Zhongqiang Peng, Haiyang Science and Technology on Communication Security Laboratory Chengdu610041 China No. 30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd. Chengdu610041 China
Since the 21st century, informatization, modernization and intellectualization have become an important direction of national science and technology development. Especially in recent years, with the continuous improve... 详细信息
来源: 评论
A Survey of Edge Computing Resource Allocation Strategies Based on Federated Learning
A Survey of Edge Computing Resource Allocation Strategies Ba...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Ni, Siyuan He, Yuanhang Chen, Lei Wang, Yuyao Yu, Fei Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu China
In the edge computing environment, the data on edge computing is at risk of leakage due to the variety and wide distribution of nodes. As a new distributed machine learning framework, federated learning can effectivel... 详细信息
来源: 评论