咨询与建议

限定检索结果

文献类型

  • 99 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 82 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 105 篇 理学
    • 60 篇 物理学
    • 48 篇 数学
    • 19 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 5 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...
  • 2 篇 cloud computing

机构

  • 74 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 167 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
175 条 记 录,以下是61-70 订阅
排序:
A dense state search method in edge computing environment  6
A dense state search method in edge computing environment
收藏 引用
6th International Conference on communication, Image and Signal Processings, CCISP 2021
作者: Peng, Haiyang Yao, Hao Zhao, Yue Chen, Yuxiang He, Yachen He, Shanxiang Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China 4 Hangzhou Hikvision Digital Technology Co. Ltd. China
In view of the common edge computing-based cloud-side collaborative environment summary existing search key and authentication key sharing caused by data information leakage, this paper proposes a cryptographic search... 详细信息
来源: 评论
Fast Decryption of Excel Document Encrypted by RC4 Algorithm  20
Fast Decryption of Excel Document Encrypted by RC4 Algorithm
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Zhang, Lijun Tan, Cheng Yu, Fei Science and Technology on Communication Security Laboratory Chengdu610041 China
In this paper, we give a fast decryption method of Excel document encrypted by RC4 algorithm. Through a detailed analysis of document storage structure and encryption process, we illustrate the inner principle of key ... 详细信息
来源: 评论
Improving key rates by tighter information reconciliation leakage estimation for quantum key distribution
arXiv
收藏 引用
arXiv 2025年
作者: Mao, Hao-Kun Yang, Bo Qiao, Yu-Cheng Yan, Bing-Ze Zhao, Qiang Xu, Bing-Jie Li, Qiong School of Cyberspace Science Faculty of Computing Harbin Institute of Technology Harbin150080 China Guangxi Key Lab Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China School of Information Engineering Zhejiang Ocean University Zhoushan316022 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
Previous research has aimed to precisely estimate information leakage to improve the secure key rate (SKR) and maximum transmission distance in quantum key distribution (QKD). However, existing methods repeatedly cons... 详细信息
来源: 评论
A Classification and Identification technology of TLS Encrypted Traffic Applications  4
A Classification and Identification Technology of TLS Encryp...
收藏 引用
2021 IEEE 4th International Conference on Big Data and Artificial Intelligence, BDAI 2021
作者: Zhao, Yue Yang, Yarang Niu, Yiru Wu, Kaijun Hao, Yao Su, Hong Zhao, Qi Science and Technology on Communication Security Laboratory Chengdu610041 China Kashi University College of Physics and Electrical Engineering Kashi84006 China The Thirtieth Research Institute of China Electronic Technology Group Corporation Chengdu610041 China
In the paper, regarding the transport layer security encrypted traffic of the Internet, the application program identification and application protocol classification technology of encrypted traffic based on hidden Ma... 详细信息
来源: 评论
Research on Data security of Unmanned Aerial Vehicles
Research on Data Security of Unmanned Aerial Vehicles
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Chen, Yuxiang Hao, Yao Wu, Kaijun Yi, Zhongqiang Peng, Haiyang Sijie, Liao Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Inst China Electronics Technology Group Corporation China China Electronics Technology Cyber security Co. Ltd China
With the development of unmanned platforms, there are large numbers of unmanned aerial vehicles(UAVs), due to UAVs' new features such as lightweight, high speed mobility and heterogeneous, UAVs are facing great ch... 详细信息
来源: 评论
A Lower Bound on the Third-Order Nonlinearity of the Simplest $Mathcal{Ps}_ap$ Bent Functions
SSRN
收藏 引用
SSRN 2023年
作者: Li, Zhaole Shen, Bing Tang, Deng School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China Science and Technology on Communication Security Laboratory Institute of Southwest Communication Research Sichuan Chengdu610041 China
Boolean functions used in symmetric-key encryption should have high higher-order nonlinearity to resist several known attacks, such as algebraic attack and low-degree approximation. The higher-order nonlinearity also ... 详细信息
来源: 评论
Experimental Demonstration of High-Rate Discrete-Modulated Continuous-Variable Quantum Key Distribution System
arXiv
收藏 引用
arXiv 2022年
作者: Pan, Yan Wang, Heng Shao, Yun Pi, Yaodi Li, Yang Liu, Bin Huang, Wei Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China College of Computer Science Chongqing University Chongqing 400044 China
A high-rate continuous-variable quantum key distribution (CV-QKD) system based on high-order discrete modulation is experimentally investigated. With the help of the novel system scheme, effective digital signal proce... 详细信息
来源: 评论
Tight Bound on Tilted Chsh Inequality with Measurement Dependence
SSRN
收藏 引用
SSRN 2023年
作者: Li, Runze Li, Dandan Huang, Wei Xu, Bingjie Gao, Fei State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
Measurement dependence is the property that the distribution of the underlying variable is correlated with the measurement settings. If there is measurement dependence in a Bell test, the upper bound of Bell inequalit... 详细信息
来源: 评论
Automatic Text Summarization Method Based on Improved Textrank Algorithm and K-Means Clustering
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Wenjun Sun, Yuyan Yu, Bao Wang, Hailan Peng, Qingcheng Hou, Mengshu Guo, Huan Wang, Hai Liu, Cheng Chengdu611731 China School of Computer and Software Engineering XiHua University Chengdu610039 China School of Big Data and Artificial Intelligence Chengdu Technological University Chengdu611730 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu610041 China
Automatic text summarization is to obtain a summary by compressing the text while retaining its important information, and then users can obtain the important content of the text by reading the summary. In the researc... 详细信息
来源: 评论
Experimental demonstration of 4-user quantum access network based on passive optical network
Experimental demonstration of 4-user quantum access network ...
收藏 引用
49th European Conference on Optical communications (ECOC 2023)
作者: Y. Pan Y. Bian H. Wang J. Dou Y. Shao Y. Pi T. Ye J. Yang Y. Li W. Huang S. Yu Y. Zhang B. Xu Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 People's Republic of China State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing 100876 People's Republic of China
A 4-user high-compatibility quantum access network using coherent states is experimentally demonstrated based on passive optical network. The achieved average secret key rate is around 4.1 Mbps between the transmitter...
来源: 评论