咨询与建议

限定检索结果

文献类型

  • 1,770 篇 期刊文献
  • 1,519 篇 会议
  • 1 册 图书

馆藏范围

  • 3,290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,137 篇 工学
    • 1,051 篇 计算机科学与技术...
    • 819 篇 软件工程
    • 428 篇 信息与通信工程
    • 377 篇 电子科学与技术(可...
    • 355 篇 电气工程
    • 255 篇 控制科学与工程
    • 170 篇 化学工程与技术
    • 159 篇 机械工程
    • 146 篇 材料科学与工程(可...
    • 143 篇 仪器科学与技术
    • 125 篇 光学工程
    • 125 篇 生物工程
    • 120 篇 网络空间安全
    • 109 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 63 篇 安全科学与工程
    • 57 篇 建筑学
    • 55 篇 生物医学工程(可授...
  • 1,281 篇 理学
    • 488 篇 数学
    • 473 篇 物理学
    • 164 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 150 篇 大气科学
    • 142 篇 化学
    • 92 篇 系统科学
  • 400 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 82 篇 法学
  • 78 篇 医学
    • 56 篇 临床医学
  • 58 篇 农学
  • 54 篇 军事学
  • 38 篇 经济学
  • 7 篇 艺术学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 35 篇 optimization
  • 35 篇 computational mo...
  • 33 篇 quantum cryptogr...
  • 32 篇 protocols
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 26 篇 machine learning
  • 24 篇 data mining
  • 23 篇 predictive model...

机构

  • 173 篇 state key labora...
  • 150 篇 national key lab...
  • 117 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 69 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 32 篇 shandong provinc...
  • 31 篇 science and tech...
  • 28 篇 state key labora...
  • 28 篇 key laboratory o...
  • 26 篇 beijing institut...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 30 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 26 篇 ai bo
  • 24 篇 wang wei
  • 23 篇 zhao jinjing
  • 22 篇 li yang
  • 19 篇 xiaochun cao
  • 19 篇 xiu-bo chen
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xiaohui kuang
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 li jin
  • 17 篇 yang yang
  • 17 篇 gang xu

语言

  • 3,024 篇 英文
  • 154 篇 中文
  • 109 篇 其他
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3290 条 记 录,以下是3121-3130 订阅
排序:
Erratum: Arbitrated quantum signature of classical messages against collective amplitude damping noise (Opt. Commun. 283 (2010) 3198–3201)
收藏 引用
Optics Communications 2010年 第19期283卷 3830-3830页
作者: Yu-Guang Yang Qiao-Yan Wen College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
We discover an error in the quantum circuit in Fig. 2 in the original paper [ Y.G. Yang, Q.Y. Wen. Opt. Commun. 283 (2010) 3198–3201 ]. Corrected results are obtained and presented in this paper.
来源: 评论
Democratic Group Signatures with Threshold Traceability
收藏 引用
Journal of Shanghai Jiaotong university(science) 2009年 第1期14卷 98-101页
作者: 李祥学 钱海峰 李建华 School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Lab of Information Security Graduate School of Chinese Academy of SciencesBeijing 100039China State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an 710071China Computer Science and Technology Department East China Normal UniversityShanghai 200241China
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a... 详细信息
来源: 评论
Removing local irregularities of triangular meshes with highlight line models
收藏 引用
science in China(Series F) 2009年 第3期52卷 418-430页
作者: YONG JunHai DENG BaiLin CHENG FuHua WANG Bin WU Kun GU HeJin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Department of Computer Science University of Kentucky Lexington KY 40506-0046 USA Key Laboratory for Information System Security Ministry of Education of China Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China jianaxi Academy of Sciences. Nanchang 330029. China
The highlight line model is a powerful tool in assessing the quality of a surface. It increases the flexibility of an interactive design environment. In this paper, a method to generate a highlight line model on an ar... 详细信息
来源: 评论
A novel secure terminal system based on trusted hardware: U-key
A novel secure terminal system based on trusted hardware: U-...
收藏 引用
作者: Liu, Wei-Peng Hu, Jun Zhang, Xing State Key Laboratory of Information Security Graduate School of Chinese Academy Science Beijing 100039 China PLA Electronic Technology Institute of Information Engineering University Zhengzhou 450052 China
With the development of attack technique, new security problems have become more and more popular, traditional security means such as: firewall, IDS and so on expose to be limited, there is a basic consensus that solv... 详细信息
来源: 评论
Ideal perfect multilevel threshold secret sharing scheme
Ideal perfect multilevel threshold secret sharing scheme
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Lin, Changlu Harn, Lein Ye, Dingfeng Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences China Key Laboratory of Communication and Information System Beijing Jiaotong University Beijing Municipal Commission of Education China Department of Computer Science Electrical Engineering University of Missouri-Kansas City United States
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
GMW sequences over Galois rings and their linear complexities
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2009年 第2期4卷 141-144页
作者: Nigang SUN Lei HU Department of Computer Science and Engineering East China University of Science and TechnologyShanghai 200237China State Key Laboratory of Information Security Graduate University of Chinese Academy of SciencesBeijing 100049China
A new family of GMW sequences over an arbitrary Galois ring was defined by using the trace functions and *** generalizes the concept of GMW sequences over finite *** the Fourier representation,we derived an estimate o... 详细信息
来源: 评论
Region of interest automatic extraction for color image based on mathematical morphology
Region of interest automatic extraction for color image base...
收藏 引用
IEEE 9th International Conference on Computer and information technology, CIT 2009
作者: Zhang, Xiao-Hong Zhu, Yuan-Yuan Fan, Zhong-Kui School of Information Engineering Jiangxi University of Science and Technology Ganzhou China Information Security Center State Key Laboratory of Networking and Switching Beijing University Posts and Telecommunication Beijing 100876 China
Combined with human visual characteristics and morphological watershed algorithm, a novel image processing method was proposed for automatic region of interest (ROI) extraction. The color image would be converted into... 详细信息
来源: 评论
Algebraic attack to SMS4 and the comparison with AES
Algebraic attack to SMS4 and the comparison with AES
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Ji, Wen Hu, Lei Ou, Haiwen Beijing Electronic Science and Technology Institute Beijing 100070 China State Key Laboratory of Information Security Graduate University Chinese Academy of Sciences Beijing 100049 China
SMS4 is a 128-bit block cipher, which is used in the WAPI standard in China. This paper examines algebraic attacks on SMS4 over two different fields, that is, GF(2) and GF(28), respectively. With regards to this, we f... 详细信息
来源: 评论
Recognition and forecast of severe weather evolution with radar and satellite information
Recognition and forecast of severe weather evolution with ra...
收藏 引用
MIPPR 2009 - Remote Sensing and GIS Data Processing and Other Applications: 6th International Symposium on Multispectral Image Processing and Pattern Recognition
作者: Wei, Ming Niu, Ben Xia, Wangping Zhan, Yating State Key Laboratory of Severe Weather Chinese Academy of Meteorological Sciences Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Earth System Remote Sensing Institute Nanjing University of Information Science and Technology Nanjing 210044 China
This work is the case study based on the remote sensing data about squall line in Shanghai at July 12 2004, focus on the analysis on Doppler radar echo products, satellite image, surface and sounding data, automatic w... 详细信息
来源: 评论
Research on model of trust degrees for PKI
Research on model of trust degrees for PKI
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Zhang, Mingde Zheng, Xuefeng Yang, Wensheng Lv, Shuwang Zhang, Qingguo School of Information Engineering University of Science and Technology Beijing Beijing China Beijing Itownet Cyber Tech. Ltd. Beijing China State Key Laboratory of Information Security Beijing China University of Science and Technology Beijing Beijing China
In order to improve the accuracy of trust evaluation of subscribers (or key holders) from relying parties' point of view, a new model of trust degrees for PKI is proposed. By analyzing the security risks during th... 详细信息
来源: 评论