咨询与建议

限定检索结果

文献类型

  • 92 篇 会议
  • 49 篇 期刊文献

馆藏范围

  • 141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 53 篇 计算机科学与技术...
    • 45 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 电子科学与技术(可...
    • 17 篇 电气工程
    • 12 篇 控制科学与工程
    • 8 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 光学工程
    • 6 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 网络空间安全
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 农业工程
  • 41 篇 理学
    • 21 篇 数学
    • 14 篇 物理学
    • 7 篇 化学
    • 7 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 5 篇 系统科学
    • 2 篇 大气科学
  • 18 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 法学
  • 1 篇 教育学

主题

  • 6 篇 interference
  • 5 篇 simulation
  • 5 篇 wireless sensor ...
  • 4 篇 security of data
  • 4 篇 protocols
  • 4 篇 synchronization
  • 3 篇 blind source sep...
  • 3 篇 deep learning
  • 3 篇 relays
  • 3 篇 wireless communi...
  • 3 篇 resource managem...
  • 3 篇 energy consumpti...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 channel estimati...
  • 3 篇 satellites
  • 2 篇 jamming
  • 2 篇 virtual time dif...
  • 2 篇 reinforcement le...
  • 2 篇 compressed sensi...

机构

  • 8 篇 science and tech...
  • 6 篇 national mobile ...
  • 6 篇 purple mountain ...
  • 5 篇 state key labora...
  • 5 篇 institute of cyb...
  • 5 篇 frontiers scienc...
  • 5 篇 college of infor...
  • 4 篇 southeast univer...
  • 4 篇 state key labora...
  • 3 篇 state key lab of...
  • 3 篇 yangtze delta re...
  • 3 篇 science and tech...
  • 3 篇 school of teleco...
  • 3 篇 school of inform...
  • 3 篇 peng cheng labor...
  • 3 篇 moe frontiers sc...
  • 3 篇 science and tech...
  • 3 篇 center for flexi...
  • 3 篇 guangdong key la...
  • 3 篇 state key lab of...

作者

  • 7 篇 xiaoniu yang
  • 5 篇 yuan wu
  • 4 篇 li ping qian
  • 4 篇 zhao zhijin
  • 4 篇 yang wu
  • 4 篇 mingqing li
  • 3 篇 wei-bing lu
  • 3 篇 lei shen
  • 3 篇 jun-lin zhan
  • 3 篇 shen lei
  • 3 篇 ai bo
  • 3 篇 li ping
  • 3 篇 qianru wang
  • 3 篇 hao chen
  • 3 篇 ziyang cheng
  • 3 篇 zhen-guo liu
  • 3 篇 lu wei-bing
  • 3 篇 li ming
  • 3 篇 zishu he
  • 3 篇 chen ze-hui

语言

  • 128 篇 英文
  • 7 篇 其他
  • 6 篇 中文
检索条件"机构=State Key Lab. of Information Control and Security Technology in Communication"
141 条 记 录,以下是131-140 订阅
排序:
Step-size optimization EASI algorithm for blind source separation
Step-size optimization EASI algorithm for blind source separ...
收藏 引用
2007 International Conference on Computational Intelligence and security, CIS'07
作者: Weihong, Fu Xiaoniu, Yang Naian, Liu State Key Lab. of Integrated Service Networks Xidian University Xi'an 710071 China National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang 31403 China
Aiming at the problem of blind source separation of the communication signals, we propose a step size optimization equivariant adaptive source separation via independence (SO-EASI) algorithm basing on the EASI block b... 详细信息
来源: 评论
Wireless authentication scheme providing perfect forward secrecy and user anonymity
Wireless authentication scheme providing perfect forward sec...
收藏 引用
GMC'2006: 2006 Global Mobile Congress
作者: Wei, Yongzhuang Qiu, Hongbing Hu, Yupu Department of Communication and Information Engineering Guilin University of Electronic Technology Guilin 541004 China Information Security and Privacy Institute ISN National Key Lab. Xidian University xi'an 710071 China
In this paper, we present an efficient authentication scheme with providing perfect forward secrecy and mobile user anonymity in wireless environment. When a mobile user and his visited network mutually authenticate e... 详细信息
来源: 评论
security analysis of authentication scheme with anonymity for wireless environments
Security analysis of authentication scheme with anonymity fo...
收藏 引用
2006 International Conference on communication technology, ICCT '06
作者: Yongzhuang, Wei Hongbing, Qiu Hu, Yupu Department of Communication and Information Engineering Guilin University of Electronic Technology Guilin Guangxi China Information Security and Privacy Institute ISN National Key Lab. Xidian University Xi'an Shanxi China
Authentication is the most essential procedure to ensure that the service is properly used for wireless environments. Recently, Zhu and Ma proposed a novel authentication scheme with anonymity for wireless environment... 详细信息
来源: 评论
Access control model for P2P file-sharing systems based on trust and recommendation
Access control model for P2P file-sharing systems based on t...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Yue, Guang-Xue Yu, Fei Chen, Yi-Jun Wu, Rong-Hui An, Ji-Yao Li, Ren-Fa College of Information Engineering JiaXing University JiaXing 314000 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China School of Computer and Communication Hunan University Changsha 410082 China
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,... 详细信息
来源: 评论
security Analysis of Timestamp-based Remote User Authentication Scheme Using Smart Cards
Security Analysis of Timestamp-based Remote User Authenticat...
收藏 引用
2006 International Conference on communications,Circuits and Systems(第四届国际通信、电路与系统学术会议)
作者: Yong-Zhuang Wei Yu-Pu Hu Department of Communication and Information Engineering Guilin University of Electronic TechnologyG Information Security & Privacy Institute ISN National Key Lab.Xidian UniversityXi'an Shaanxi Ch
recently, Shen, Lin, and Hwang proposed a modified Yang-Shieh`s password authentication scheme to enhance security. In 2004,Yang and Chen et al. point out that Shen-Lin-Hwang`s scheme was vulnerable to the forged logi... 详细信息
来源: 评论
Impossible Differential Cryptanalysis for SPN Cipher Structure and Advanced Encryption Standard
Impossible Differential Cryptanalysis for SPN Cipher Structu...
收藏 引用
2006 International Conference on communications,Circuits and Systems(第四届国际通信、电路与系统学术会议)
作者: Yongzhuang Wei Jie Chen Yupu Hu Department of communication and Information Engineering Guilin University of Electronic TechnologyG Information Security & Privacy Institute ISN National Key Lab. Xidian University Xi'an Shaanxi Ch National Laboratory for Modern Communications Chengdu Sichuan China
In this correspondence, we examine the security of block ciphers referred to as substitution-permutation networks (SPN) by considering the impossible differential characteristics of given S-boxes. When the SPN has 2-r... 详细信息
来源: 评论
Design and analysis of a self-tuning proportional and integral controller for active queue management routers to support TCP flows
Design and analysis of a self-tuning proportional and integr...
收藏 引用
INFOCOM 2006: 25th IEEE International Conference on Computer communications
作者: Xiong, Naixue Défago, Xavier Jia, Xiaohua Yan, G. He, Yanxiang School of Information Science Japan Advanced Institute of Science and Technology State Key Lab. of Software Engineering Computer School Wuhan University School of Information Science Japan Advanced Institute of Science and Technology 1-1 Asahidai Nomi Ishikawa 923-1292 Japan Kowloon Hong Kong IEEE IEEE Communication Society Department of Computer Science Wuhan University City University of Hong Kong Kowloon Hong Kong School of Computer Science and Technology Wuhan University of Science and Technology China SMIEEE
Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and delay. The de facto standard, the Random Early Detection (RE... 详细信息
来源: 评论
Access control Model for P2P File-Sharing Systems Based on Trust and Recommendation
Access Control Model for P2P File-Sharing Systems Based on T...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Guang-xue Yue Guang-xue Yue Fei Yu Fei Yu Yi-jun Chen Yi-jun Chen Rong-hui Wu Rong-hui Wu Ji-yao An Ji-yao An Ren-fa Li Ren-fa Li College of Information Engineering JiaXing University JiaXing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China School of Computer & Communication Hunan University Changsha China
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,...
来源: 评论
Multi-homed VPN architecture based on extended SOCKS+TLS protocols
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2005年 第3期10 E卷 250-255页
作者: Zhang, Bao-Liang Hu, Han-Ping Chen, Xiang State Education Ministry Key Lab. of Image Information and Intelligent Control Inst. of Pattern Recognition and Artificial Intelligence Huazhong Univ. of Science and Technology Wuhan 430074 China
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system, in which the security-demanded transmissio... 详细信息
来源: 评论
A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2005年 第3期10卷 250-255页
作者: 张宝良 胡汉平 陈翔 State Education Ministry Key Lab. of Image Information & Intelligent Control In st. of Pattern Recognition & Artificial Intelligence Huazhong Univ. of Science & Technology Wuhan 430074 China
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio... 详细信息
来源: 评论