咨询与建议

限定检索结果

文献类型

  • 92 篇 会议
  • 49 篇 期刊文献

馆藏范围

  • 141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 53 篇 计算机科学与技术...
    • 45 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 电子科学与技术(可...
    • 17 篇 电气工程
    • 12 篇 控制科学与工程
    • 8 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 光学工程
    • 6 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 网络空间安全
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 农业工程
  • 41 篇 理学
    • 21 篇 数学
    • 14 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 5 篇 系统科学
    • 2 篇 大气科学
  • 18 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 法学
  • 1 篇 教育学

主题

  • 6 篇 interference
  • 5 篇 simulation
  • 5 篇 wireless sensor ...
  • 4 篇 security of data
  • 4 篇 protocols
  • 4 篇 synchronization
  • 3 篇 blind source sep...
  • 3 篇 deep learning
  • 3 篇 relays
  • 3 篇 wireless communi...
  • 3 篇 resource managem...
  • 3 篇 energy consumpti...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 channel estimati...
  • 3 篇 satellites
  • 2 篇 jamming
  • 2 篇 virtual time dif...
  • 2 篇 reinforcement le...
  • 2 篇 compressed sensi...

机构

  • 8 篇 science and tech...
  • 6 篇 national mobile ...
  • 6 篇 purple mountain ...
  • 5 篇 state key labora...
  • 5 篇 institute of cyb...
  • 5 篇 frontiers scienc...
  • 5 篇 college of infor...
  • 4 篇 southeast univer...
  • 4 篇 state key labora...
  • 3 篇 state key lab of...
  • 3 篇 yangtze delta re...
  • 3 篇 science and tech...
  • 3 篇 school of teleco...
  • 3 篇 school of inform...
  • 3 篇 peng cheng labor...
  • 3 篇 moe frontiers sc...
  • 3 篇 science and tech...
  • 3 篇 center for flexi...
  • 3 篇 guangdong key la...
  • 3 篇 state key lab of...

作者

  • 7 篇 xiaoniu yang
  • 5 篇 yuan wu
  • 4 篇 li ping qian
  • 4 篇 zhao zhijin
  • 4 篇 yang wu
  • 4 篇 mingqing li
  • 3 篇 wei-bing lu
  • 3 篇 lei shen
  • 3 篇 jun-lin zhan
  • 3 篇 shen lei
  • 3 篇 ai bo
  • 3 篇 li ping
  • 3 篇 qianru wang
  • 3 篇 hao chen
  • 3 篇 ziyang cheng
  • 3 篇 zhen-guo liu
  • 3 篇 lu wei-bing
  • 3 篇 li ming
  • 3 篇 zishu he
  • 3 篇 chen ze-hui

语言

  • 128 篇 英文
  • 7 篇 其他
  • 6 篇 中文
检索条件"机构=State Key Lab. of Information Control and Security Technology in Communication"
141 条 记 录,以下是111-120 订阅
排序:
Poster abstract: Direct multi-hop time synchronization with constructive interference
Poster abstract: Direct multi-hop time synchronization with ...
收藏 引用
International Symposium on information Processing in Sensor Networks (IPSN)
作者: Yin Wang Gaofeng Pan Zhiyu Huang MOE Key Lab for Information System Security TNLIST Tsinghua University Science and technology on communication information security control laboratory Chinese Academy of Sciences
Multi-hop time synchronization in wireless sensor networks (WSNs) is often time-consuming and error-prone due to random time-stamp delays for MAC layer access and unstable clocks of intermediate nodes. Constructive in... 详细信息
来源: 评论
System of the mine gas detection and location based on WSN technology
收藏 引用
2nd World Congress on Computer Science and information Engineering, CSIE 2011
作者: Sun, Yingchun Fan, Jianying Xu, Jiandong School of Measure-Control Technology and Communication Engineering Harbin University of Science and Technology Harbin Heilongjiang Province China Springer-Verlag Computer Science Editorial Tiergartenstr. 17 69121 Heidelberg Germany Higher Educ. Key Lab. for Measuring and Contr. Technol. and Instrum. of Heilongjiang Prov. Harbin University of Science and Technology Harbin Heilongjiang Province China Information and Electronic Technology Institute Jiamusi University Jiamusi Heilongjiang Province China
In order to resolve the detection problem of coal mine gas content detection, and ensure the personal safety under the ground, we design the gas content detection system which based on the technology of ZigBee. The sy... 详细信息
来源: 评论
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher (extended abstract)
The higher-order meet-in-the-middle attack and its applicati...
收藏 引用
13th International Conference on Cryptology in India, INDOCRYPT 2012
作者: Lu, Jiqiang Wei, Yongzhuang Kim, Jongsung Pasalic, Enes Institute for Infocomm Research Agency for Science Technology and Research 1 Fusionopolis Way #19-01 Connexis Singapore 138632 Singapore Guilin University of Electronic Technology Guilin City Guangxi Province 541004 China State Key Lab. of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China Department of E-Business Kyungnam University 449 Wolyoung-dong Masan Kyungnam Korea Republic of University of Primorska FAMNIT Koper Slovenia
The meet-in-the-middle (MitM) attack is a technique for analysing the security of a block cipher. In this paper, we propose an extension of the MitM attack, which we call the higher-order meet-in-the-middle (HO-MitM) ... 详细信息
来源: 评论
A New Method for Meet-in-the-Middle Attacks on Reduced AES
收藏 引用
China communications 2011年 第2期8卷 21-25页
作者: 董晓丽 胡予濮 韦永壮 陈杰 Key Lab. of Computer Networks & Information Security Ministry of EducationXidian University School of Information and Communication Guilin University of Electronic Technology State Key Lab. of Information Security Institute of SoftwareChinese Academy of Sciences
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering ... 详细信息
来源: 评论
A new variable step size NLMS algorithm based on decorrelation for second-order Volterra filter
A new variable step size NLMS algorithm based on decorrelati...
收藏 引用
2011 International Conference on Automation and Robotics, ICAR 2011
作者: Zhao, Zhijin Yan, Pingping Shen, Lei Telecommunication School Hangzhou Dianzi University Zhejian 310018 China State Key Lab. of Information Control and Security Technology in Communication No. 36 Research Institute China Electronic Technology Corporation Jiaxing 314001 China
When the input signals are strongly correlated, the adaptive algorithm performance of Volterra filter deteriorates. Meanwhile, the correlativity of linear input signals of Volterra filter is different from that of non... 详细信息
来源: 评论
A fast sparsity adaptive matching pursuit algorithm for compressed sensing
A fast sparsity adaptive matching pursuit algorithm for comp...
收藏 引用
2011 International Conference on Automation and Robotics, ICAR 2011
作者: Ma, Chun-Hui Xu, Chun-Yun Shen, Lei Zheng, Shi-Lian Telecommunication School Hangzhou Dianzi University Zhejian 310018 China State Key Lab. of Information Control Technology in Communication System No.36 Research Institute Electronic Technology Corporation Jiaxing 314001 China
Sparsity adaptive matching pursuit algorithm (SAMP) is a compressed sensing signal reconstruction algorithm with good performance. However, as the support set expands one time, the backward pursuit should be processed... 详细信息
来源: 评论
A New Variable Step Size NLMS Algorithm Based on Decorrelation for Second-Order Volterra Filter
A New Variable Step Size NLMS Algorithm Based on Decorrelati...
收藏 引用
The 2011 International Conference on Automation and Robotics(ICAR 2011)
作者: Zhijin Zhao Pingping Yan Lei Shen Telecommunication School Hangzhou Dianzi University State Key Lab of Information Control and Security Technology in Communication of No.36 Research Institute China Electronic Technology Corporation
When the input signals are strongly correlated, the adaptive algorithm performance of Volterra filter deteriorates. Meanwhile, the correlativity of linear input signals of Volterra filter is different from that of non... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
A Fast Sparsity Adaptive Matching Pursuit Algorithm for Compressed Sensing
A Fast Sparsity Adaptive Matching Pursuit Algorithm for Comp...
收藏 引用
The 2011 International Conference on Automation and Robotics(ICAR 2011)
作者: Chun-hui Ma Chun-yun Xu Lei Shen Shi-lian Zheng Telecommunication School Hangzhou Dianzi University State Key Lab of Information Control Technology in Communication System of No.36 Research Institute China Electronic Technology Corporation
Sparsity adaptive matching pursuit algorithm(SAMP) is a compressed sensing signal reconstruction algorithm with good performance. However, as the support set expands one time, the backward pursuit should be processed ... 详细信息
来源: 评论
TinyStream: A lightweight and novel stream cipher scheme for wireless sensor networks
TinyStream: A lightweight and novel stream cipher scheme for...
收藏 引用
International Conference on Computational Intelligence and security
作者: Chen, Tieming Ge, Liang Wang, Xiaohao Cai, Jiamei College of Computer Sci. and Tech. Zhejiang University of Technology Hangzhou 310023 China State Key Lab. of Software Development Environment Beihang University Beijing 100191 China Zhejiang Key Laboratory of Information Security Hangzhou 310012 China College of Computer Sci. and Tech. Zhejiang University of Technology Hangzhou 310012 China
Implementation performance and key randomness are two key issues for stream cipher systems. In this paper, a lightweight stream cipher with good randomness of key stream is firstly proposed. It utilizes a novel propos... 详细信息
来源: 评论