咨询与建议

限定检索结果

文献类型

  • 99 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 82 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 105 篇 理学
    • 60 篇 物理学
    • 48 篇 数学
    • 19 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 5 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...
  • 2 篇 cloud computing

机构

  • 74 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 167 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
175 条 记 录,以下是71-80 订阅
排序:
Two types of special bases for integral lattices  16th
Two types of special bases for integral lattices
收藏 引用
16th International Workshop on Information security Applications, WISA 2015
作者: Liu, Renzhang Pan, Yanbin Key Laboratory of Mathematics Mechanization Academy of Mathematics and Systems Science NCMIS Chinese Academy of Sciences Beijing100190 China Science and Technology on Communication Security Laboratory Chengdu610041 China
Lattice basis reduction algorithms, such as LLL, play a very important role in cryptography, which usually aim to find a lattice basis with good "orthogonality". However, not every lattice has an orthogonal ... 详细信息
来源: 评论
A Classification and Identification technology of TLS Encrypted Traffic Applications  4
A Classification and Identification Technology of TLS Encryp...
收藏 引用
2021 IEEE 4th International Conference on Big Data and Artificial Intelligence, BDAI 2021
作者: Zhao, Yue Yang, Yarang Niu, Yiru Wu, Kaijun Hao, Yao Su, Hong Zhao, Qi Science and Technology on Communication Security Laboratory Chengdu610041 China Kashi University College of Physics and Electrical Engineering Kashi84006 China The Thirtieth Research Institute of China Electronic Technology Group Corporation Chengdu610041 China
In the paper, regarding the transport layer security encrypted traffic of the Internet, the application program identification and application protocol classification technology of encrypted traffic based on hidden Ma... 详细信息
来源: 评论
Research on Data security of Unmanned Aerial Vehicles
Research on Data Security of Unmanned Aerial Vehicles
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Chen, Yuxiang Hao, Yao Wu, Kaijun Yi, Zhongqiang Peng, Haiyang Sijie, Liao Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Inst China Electronics Technology Group Corporation China China Electronics Technology Cyber security Co. Ltd China
With the development of unmanned platforms, there are large numbers of unmanned aerial vehicles(UAVs), due to UAVs' new features such as lightweight, high speed mobility and heterogeneous, UAVs are facing great ch... 详细信息
来源: 评论
Linearized microwave downconversion link based on fast and intelligent impairment equalization for noncooperative systems
收藏 引用
Chinese Optics Letters 2023年 第2期21卷 143-147页
作者: 陈智宇 钟欣 蒋林 徐嘉鑫 刘静娴 盘艳 周涛 Key Laboratory of Science and Technology on Electronic Information Control Chengdu 610029China Center for Information Photonics&Communications School of Information Science&TechnologySouthwest Jiaotong UniversityChengdu 610031China Science and Technology on Communication Security Laboratory Institute of Southwestern CommunicationChengdu 610041China
We experimentally demonstrated the use of intelligent impairment equalization(IIE)for microwave downconversion link linearization in noncooperative *** an equalizer is realized based on an artificial neural network(AN... 详细信息
来源: 评论
Improvement of chopchop attack
Improvement of chopchop attack
收藏 引用
2nd International Conference on Information Engineering and Applications, IEA 2012
作者: Ji, Qingbing Zhang, Lijun Yu, Fei China Electronics Technology Group Corporation 30 Group Science and Technology on Communication Security Laboratory Venture Road No. 6 High-tech Development Zone Chengdu 610041 China
Wired equivalent privacy (WEP) is a security protocol in the IEEE 802.11 wireless standard. At present, three attacks are frequently exploited: chopchop attack, Korek attack, and PTW attack. The first can decrypt a pa... 详细信息
来源: 评论
Deciding irreducibility/indecomposability of feedback shift registers is NP-hard
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Lin Science and Technology on Communication Security Laboratory Chengdu610041 China
Feedback shift registers(FSRs) are a fundamental component in electronics and secure communication. An FSR f is said to be reducible if all the output sequences of another FSR g can also be generated by f and the FSR ... 详细信息
来源: 评论
The Forensic Analysis of WeChat Message
The Forensic Analysis of WeChat Message
收藏 引用
2016 Sixth International Conference on Instrumentation and Measurement,Computer,communication and Control (IMCCC2016)(第六届仪器测量、计算机通信与控制国际会议)
作者: Lijun Zhang Fei Yu Qingbing Ji Science and Technology on Communication Security Laboratory Chengdu 610041 China
WeChat is a popular instant messaging application on Android,iPhone and BlackBerry smart phones,whose chat messages are all stored in local installation *** paper studied the data forensic techniques of WeChat message... 详细信息
来源: 评论
Asymmetric Group Key Agreement Protocol from Short Signatures  8
Asymmetric Group Key Agreement Protocol from Short Signature...
收藏 引用
8th IEEE International Conference on Computer and communications, ICCC 2022
作者: Shen, Kunyu Zhang, Lei Zhang, Rui Fang, Qihao Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China
Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel not... 详细信息
来源: 评论
MPC-Based Privacy-Preserving Serverless Federated Learning  3
MPC-Based Privacy-Preserving Serverless Federated Learning
收藏 引用
3rd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2022
作者: Zhong, Liangyu Zhang, Lei Xu, Lin Wang, Lulu East China Normal University Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute Shanghai200062 China Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China
Federated learning (FL) enables multiple users to collaboratively train a global model by keeping their data sets local. Since a single server is used, traditional FL faces the single point of failure problem. An avai... 详细信息
来源: 评论
First demonstration of an 8-node Mbps quantum access network based on passive optical distribution network facilities
First demonstration of an 8-node Mbps quantum access network...
收藏 引用
Frontiers in Optics + Laser science 2023, FiO, LS 203: Part of Frontiers in Optics + Laser science 2023
作者: Bian, Yiming Pan, Yan Ma, Li Wang, Heng Dou, Jiayi Pi, Yaodi Yang, Jie Li, Yang Huang, Wei Yu, Song Zhang, Yichen Xu, Bingjie State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
Quantum access network with 8 nodes and a secret key rate of over 6 Mbps per user is firstly demonstrated using passive optical distribution network facilities, paving the way of high-performance and scalable quantum-... 详细信息
来源: 评论