咨询与建议

限定检索结果

文献类型

  • 99 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 82 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 36 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 电气工程
    • 12 篇 网络空间安全
    • 11 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 光学工程
    • 6 篇 控制科学与工程
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
  • 105 篇 理学
    • 60 篇 物理学
    • 48 篇 数学
    • 19 篇 统计学(可授理学、...
    • 6 篇 化学
    • 6 篇 系统科学
    • 3 篇 生物学
  • 16 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 5 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 32 篇 quantum cryptogr...
  • 11 篇 cryptography
  • 6 篇 boolean function...
  • 5 篇 random number ge...
  • 4 篇 authentication
  • 4 篇 quantum optics
  • 3 篇 energy utilizati...
  • 3 篇 quantum informat...
  • 3 篇 edge computing
  • 3 篇 random processes
  • 3 篇 quantum communic...
  • 3 篇 autocorrelation
  • 2 篇 internet of thin...
  • 2 篇 quadrature ampli...
  • 2 篇 unmanned aerial ...
  • 2 篇 blockchain
  • 2 篇 field programmab...
  • 2 篇 passive optical ...
  • 2 篇 quantum key dist...
  • 2 篇 cloud computing

机构

  • 74 篇 science and tech...
  • 42 篇 science and tech...
  • 29 篇 state key labora...
  • 17 篇 science and tech...
  • 12 篇 no.30 research i...
  • 9 篇 china electronic...
  • 6 篇 state key labora...
  • 5 篇 science and tech...
  • 5 篇 college of compu...
  • 5 篇 institute of sou...
  • 5 篇 state key labora...
  • 4 篇 key laboratory o...
  • 4 篇 school of inform...
  • 4 篇 national key lab...
  • 4 篇 cyberspace insti...
  • 3 篇 school of comput...
  • 3 篇 cas key laborato...
  • 3 篇 science and tech...
  • 3 篇 state key labora...
  • 3 篇 state key labora...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 34 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 17 篇 yang jie
  • 13 篇 guo hong
  • 13 篇 zhao yue
  • 12 篇 bingjie xu
  • 11 篇 wu kaijun
  • 11 篇 ma li
  • 10 篇 liu jinlu
  • 10 篇 zhou yu
  • 9 篇 hao yao
  • 9 篇 wei huang
  • 8 篇 xu bing-jie

语言

  • 167 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Science and Technology on Communication Security Laboratory.Chengdu 610041"
175 条 记 录,以下是81-90 订阅
排序:
A Fast Method for Shortest-Path Cover Identification in Large Complex Networks
收藏 引用
Computers, Materials & Continua 2020年 第5期63卷 705-724页
作者: Qiang Wei Guangmin Hu Chao Shen Yunfei Yin School of Information and Communication Engineering University of Electronic Science and Technology of ChinaChengdu611731China National Key Laboratory of Science and Technology on Blind Signal Processing Chengdu610041China MOE Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong UniversityXi’an710049China The Electronic Engineering Department Universidad de SevillaSeville41004Spain School of Astronautics Harbin Institute of TechnologyHarbin150001China
Fast identifying the amount of information that can be gained by measuring a network via shortest-paths is one of the fundamental problem for networks exploration and ***,the existing methods are time-consuming for ev... 详细信息
来源: 评论
Experimental demonstration of 4-user quantum access network based on passive optical network  49
Experimental demonstration of 4-user quantum access network ...
收藏 引用
49th European Conference on Optical communications, ECOC 2023
作者: Pan, Yan Bian, Yiming Wang, Heng Dou, Jiayi Shao, Yun Pi, Yaodi Ye, Ting Yang, Jie, 2 Li, Yang Huang, Wei Yu, Song Zhang, Yichen Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China
A 4-user high-compatibility quantum access network using coherent states is experimentally demonstrated based on passive optical network. The achieved average secret key rate is around 4.1 Mbps between the transmitter... 详细信息
来源: 评论
Identification of block ciphers under CBC mode  8
Identification of block ciphers under CBC mode
收藏 引用
8th International Congress of Information and communication technology, ICICT 2018
作者: Tan, Cheng Deng, Xiaoyan Zhang, Lijun Science and Technology on Communication Security Laboratory No. 8 of Venture Road Chengdu Sichuan Province610041 China College of Applied Mathematics Chengdu University of Information Technology No. 24 of Xuefu Road Chengdu Sichuan Province610103 China
It has been challenging work to identify block ciphers under CBC mode over the past few decades. But we can still conduct the identification of block ciphers under CBC mode if enough ciphertext streams are available. ... 详细信息
来源: 评论
An Asymmetric Channel Attack Monitoring Method for Round-Trip Fiber Time Synchronization System  37
An Asymmetric Channel Attack Monitoring Method for Round-Tri...
收藏 引用
37th European Frequency and Time Forum, EFTF 2024
作者: Xu, Xuesong Zhang, Yichen Xu, Hailong Bian, Yiming Li, Yang Xu, Bingjie Yu, Song School of Electronic Engineering Beijing University of Posts and Telecommunications State Key Laboratory of Information Photonics and Optical Communications Beijing100876 China Institute of Southwestern Communication Science and Technology on Communication Security Laboratory Chengdu610041 China
We present a method for monitoring potential asymmetric channel attacks within a round-trip fiber time synchronization system. This is achieved by observing and tracking the time difference at the remote end. Experime... 详细信息
来源: 评论
Decoy-state quantum-key-distribution-based quantum private query with error tolerance bound
收藏 引用
Physical Review A 2024年 第5期109卷 052442-052442页
作者: Bin Liu Zhonghao Liang Wei Huang Fei Gao Jiayi Yuan Bingjie Xu College of Computer Science The State Key Laboratory of Networking and Switching Technology Center for Network and Information Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 China
Quantum private query (QPQ) faces many challenges in practical applications. At present, some scholars have made substantial work on overcoming channel loss, channel noise, and nonideal light sources, respectively. Ho... 详细信息
来源: 评论
Simple and Fast Polarization Tracking algorithm for Continuous-Variable Quantum Key Distribution System Using Orthogonal Pilot Tone
arXiv
收藏 引用
arXiv 2023年
作者: Pan, Yan Wang, Heng Shao, Yun Pi, Yaodi Ye, Ting Zhang, Shuai Li, Yang Huang, Wei Xu, Bingjie The Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
To reduce the influence of random channel polarization variation, especially fast polarization perturbation, for continuous-variable quantum key distribution (CV-QKD) systems, a simple and fast polarization tracking a... 详细信息
来源: 评论
Performance analysis for OFDM-based multi-carrier continuous-variable quantum key distribution with arbitrary modulation protocol
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Heng Pan, Yan Shao, Yun Pi, Yaodi Ye, Ting Li, Yang Zhang, Tao Liu, Jinlu Yang, Jie Ma, Li Huang, Wei Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
Multi-carrier continuous-variable quantum key distribution (CV-QKD) is considered to be a promising way to boost the secret key rate (SKR) over the existing single-carrier CV-QKD scheme. However, the extra excess nois... 详细信息
来源: 评论
An Invocation Chain Test and Evaluation Method Based on Knowledge Graph
An Invocation Chain Test and Evaluation Method Based on Know...
收藏 引用
2020 International Conference on Networking and Network Applications, NaNA 2020
作者: Zhao, Yue Yang, Yarang Tian, Bo Zhang, Tianle Science and Technology on Communication Security Laboratory Chengdu610041 China College of Physics and Electrical Engineering Kashi University Kashi844006 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
The paper, on basis of the software vulnerability description specification, works out the vulnerability knowledge base for vulnerability combination, completes the specification modeling of target environment informa... 详细信息
来源: 评论
A Task Scheduling Algorithm based on QoS-Driven in Cloud Computing
收藏 引用
Procedia Computer science 2013年 17卷 1162-1169页
作者: Xiaonian Wu Mengqing Deng Runlian Zhang Bing Zeng Shengyuan Zhou School of Information and Communication Guilin University of Electronic Technology Guilin 541004 China Science and Technology on Communication Security Laboratory Chengdu 610041 China
Quality of Service is an inevitable issue needing to be deal with in task scheduling of cloud computing. This paper proposes a task scheduling algorithm based on QoS-driven for cloud computing. Firstly, in order to re... 详细信息
来源: 评论
A Trust Evaluation Model for Cloud Computing
收藏 引用
Procedia Computer science 2013年 17卷 1170-1177页
作者: Xiaonian Wu Runlian Zhang Bing Zeng Shengyuan Zhou School of Information and Communication Guilin University of Electronic Technology Guilin 541004 China Science and Technology on Communication Security Laboratory Chengdu 610041 China
Trust has attracted extensive attention in social science and computer science as a solution to enhance the security of the system. This paper proposes a trust evaluation model based on D-S evidence theory and sliding... 详细信息
来源: 评论