咨询与建议

限定检索结果

文献类型

  • 101 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 84 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 37 篇 信息与通信工程
    • 29 篇 电子科学与技术(可...
    • 22 篇 电气工程
    • 13 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 8 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 7 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 106 篇 理学
    • 60 篇 物理学
    • 49 篇 数学
    • 20 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 法学
    • 3 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 6 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 passive optical ...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 privacy protecti...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 matrix algebra
  • 2 篇 blockchain
  • 2 篇 field programmab...

机构

  • 76 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 9 篇 zhang wenzheng

语言

  • 170 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
177 条 记 录,以下是61-70 订阅
排序:
Vulnerability Analysis of Passwords Based on Real Data  6
Vulnerability Analysis of Passwords Based on Real Data
收藏 引用
6th International Conference on Frontier Technologies of Information and Computer, ICFTIC 2024
作者: Yu, Wei Ni, Lulin Shi, Yu Liu, Cheng Ji, Qingbing No.30 Institute of Cetc National key laboratory of security communication Sichuan Chengdu610041 China School of Computer Science and Engineering University of Electronic Science and Technology of China No.30 Institute of Cetc National Key Laboratory of Security Communication Sichuan Chengdu610041 China
A password represents the initial line of security for the majority of information systems, and plays a pivotal role in the protection of personal information and the security of digital assets. Based on a substantial... 详细信息
来源: 评论
Improved multiparty quantum key agreement in travelling mode
收藏 引用
science China(Physics,Mechanics & Astronomy) 2016年 第12期59卷 12-21页
作者: Wei Huang Qi Su BingJie Xu Bin Liu Fan Fan HengYue Jia YingHui Yang Science and Technology on Communication Security Laboratory Chengdu 610041China State Key Laboratory of Cryptology Beijing 100878China College of Computer Science Chongqing UniversityChongqing 400044China School of Information Central University of Finance and EconomicsBeijing 100081China School of Mathematics and Information Science Henan Polytechnic UniversityJiaozuo 454000China
The need to simultaneously balance security and fairness in quantum key agreement(QKA) makes it challenging to design a flawless QKA protocol, especially a multiparty quantum key agreement(MQKA) protocol. When designi... 详细信息
来源: 评论
The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems
The Cooperative Authentication Mechanism and Performance Eva...
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Zhao, Yue Yang, Yarang Niu, Yiru Yang, Dongyu Tian, Bo Hao, Yao Wu, Kaijun Science and Technology on Communication Security Laboratory Chengdu610041 China Kashi University College of Physics and Electrical Engineering Kashi84006 China
The paper proposed a wireless access authentication mechanism for unmanned systems, which can effectively solve the problem of secure access authentication under the dynamic change of network topology. The authenticat... 详细信息
来源: 评论
On the minimum the sum-of-squares indicator of a balanced boolean function  11th
On the minimum the sum-of-squares indicator of a balanced bo...
收藏 引用
11th EAI International Conference on communications and Networking in China, ChinaCom 2016
作者: Zhou, Yu Zhuo, Zepeng Science and Technology on Communication Security Laboratory Chengdu610041 China School of Mathematical Sciences Huaibei Normal University Huaibei235000 China
Boolean functions can be used in Cryptography (especially, the global avalanche characteristics of one Boolean function is an important property in symmetric Cipher). In this paper, when an n-variable balanced Boolean... 详细信息
来源: 评论
A security access control scheme of smart community under epidemic situation  6
A security access control scheme of smart community under ep...
收藏 引用
6th International Conference on communication, Image and Signal Processings, CCISP 2021
作者: Zhao, Yue Niu, Yiru Lin, Leyu Wu, Kaijun Hao, Yao Su, Hong Yang, Yarang Science and Technology on Communication Security Laboratory Chengdu610041 China College of Physics and Electrical Engineering Kashi University Kashi84006 China
Identity authentication and access control are important technologies to realize the security control of the smart park. In this paper, attribute-based access control technology is used to judge whether users can pass... 详细信息
来源: 评论
Research on Privacy Preserving Computing technology in Edge Computing
Research on Privacy Preserving Computing Technology in Edge ...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Wang, Yuyao Chen, Lei Ni, Siyuan Yu, Fei He, Yuanhang Fang, Qiang Zhou, Yuzheng Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China
With the rapid development of mobile Internet and Internet of Things applications, the traditional cloud computing model can provide centralized remote services, but when the amount of data increases sharply, it has b... 详细信息
来源: 评论
On the rotation Boolean permutation
收藏 引用
International Journal of Intelligent Information and Database Systems 2018年 第2-3期11卷 100-116页
作者: Zhou, Yu Science and Technology on Communication Security Laboratory Chengdu610041 China
Internet of things need the encryption algorithm with a piece of small area with small-scale. This paper obtains some rotation Boolean permutations by the matrix of linear expressions, and constructs three methods of ... 详细信息
来源: 评论
ECC-based Secure communication Platform for Unmanned Systems
ECC-based Secure Communication Platform for Unmanned Systems
收藏 引用
2023 International Conference on Advances in Artificial Intelligence and Applications, AAIA 2023
作者: Hu, Shiji Yang, Daohong Li, Lei Zhou, Wanting He, Yuanhang The Integrated Circuit Engineering University of Electronic Science and Technology of China Sichuan Chengdu China Research Institute of Electronic Science and Technology University of Electronic Science and Technology of China Sichuan Chengdu China Science and Technology on Communication Security Laboratory Institute of Southwest Communication Sichuan Chengdu610041 China
With the rapid development of information technology, information security has become particularly important in the field of communication. To address the limited resources and low computing power of traditional edge ... 详细信息
来源: 评论
A dense state search method in edge computing environment  6
A dense state search method in edge computing environment
收藏 引用
6th International Conference on communication, Image and Signal Processings, CCISP 2021
作者: Peng, Haiyang Yao, Hao Zhao, Yue Chen, Yuxiang He, Yachen He, Shanxiang Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China 4 Hangzhou Hikvision Digital Technology Co. Ltd. China
In view of the common edge computing-based cloud-side collaborative environment summary existing search key and authentication key sharing caused by data information leakage, this paper proposes a cryptographic search... 详细信息
来源: 评论
RAISE:A Resilient Anonymous Information Sharing Environment
收藏 引用
Computer Modeling in Engineering & sciences 2023年 第12期137卷 2743-2759页
作者: Ning Hu Ling Liu Xin Liu Kaijun Wu Yue Zhao Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group CorporationChengdu610041China College of Computer Engineering and Applied Math Changsha UniversityChangsha410022China
With the widespread application of cloud computing and network virtualization technologies,more and more enterprise applications are directly deployed in the ***,the traditional TCP/IP network transmission model does ... 详细信息
来源: 评论