咨询与建议

限定检索结果

文献类型

  • 1,770 篇 期刊文献
  • 1,519 篇 会议
  • 1 册 图书

馆藏范围

  • 3,290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,137 篇 工学
    • 1,051 篇 计算机科学与技术...
    • 819 篇 软件工程
    • 428 篇 信息与通信工程
    • 377 篇 电子科学与技术(可...
    • 355 篇 电气工程
    • 255 篇 控制科学与工程
    • 170 篇 化学工程与技术
    • 159 篇 机械工程
    • 146 篇 材料科学与工程(可...
    • 143 篇 仪器科学与技术
    • 125 篇 光学工程
    • 125 篇 生物工程
    • 120 篇 网络空间安全
    • 109 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 63 篇 安全科学与工程
    • 57 篇 建筑学
    • 55 篇 生物医学工程(可授...
  • 1,281 篇 理学
    • 488 篇 数学
    • 473 篇 物理学
    • 164 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 150 篇 大气科学
    • 142 篇 化学
    • 92 篇 系统科学
  • 400 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 82 篇 法学
  • 78 篇 医学
    • 56 篇 临床医学
  • 58 篇 农学
  • 54 篇 军事学
  • 38 篇 经济学
  • 7 篇 艺术学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 35 篇 optimization
  • 35 篇 computational mo...
  • 33 篇 quantum cryptogr...
  • 32 篇 protocols
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 26 篇 machine learning
  • 24 篇 data mining
  • 23 篇 predictive model...

机构

  • 173 篇 state key labora...
  • 150 篇 national key lab...
  • 117 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 69 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 32 篇 shandong provinc...
  • 31 篇 science and tech...
  • 28 篇 state key labora...
  • 28 篇 key laboratory o...
  • 26 篇 beijing institut...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 30 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 26 篇 ai bo
  • 24 篇 wang wei
  • 23 篇 zhao jinjing
  • 22 篇 li yang
  • 19 篇 xiaochun cao
  • 19 篇 xiu-bo chen
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xiaohui kuang
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 li jin
  • 17 篇 yang yang
  • 17 篇 gang xu

语言

  • 3,024 篇 英文
  • 154 篇 中文
  • 109 篇 其他
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3290 条 记 录,以下是3181-3190 订阅
排序:
A Provable Secure ID-Based Explicit Authenticated key Agreement Protocol Without Random Oracles
收藏 引用
Journal of Computer science & technology 2008年 第5期23卷 832-842页
作者: 田海博 Willy Susilo 明洋 王育民 School of Information Science and Technology Sun Yat-Sen University Guangdong Key Laboratory of Information Security Technology Centre for Computer and Information Security Research (CCISR) School of Computer Science and Software Engineering University of Wollongong School of Information Engineering Chang'an University State Key Laboratory on ISN Xidian University
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmatio... 详细信息
来源: 评论
Multi-proxy quantum group signature scheme with threshold shared verification
收藏 引用
Chinese Physics B 2008年 第2期17卷 415-418页
作者: 杨宇光 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy... 详细信息
来源: 评论
Circular threshold quantum secret sharing
收藏 引用
Chinese Physics B 2008年 第2期17卷 419-423页
作者: 杨宇光 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security(Graduate School of Chinese Academy of Sciences) School of Science Beijing University of Posts and Telecommunications
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n... 详细信息
来源: 评论
New method for interactive TCP traffic replay based on balance-checking between transmitted and received packets
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第4期32卷 835-846页
作者: Chu, Wei-Bo Cai, Zhong-Min Guan, Xiao-Hong Chen, Ming-Xu MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China State Key Laboratory for Manufacturing Systems Xi'an Jiaotong University Xi'an 710049 China Tsinghua National Laboratory for Information Science and Technology Department of Automation Tsinghua University Beijing 100084 China
Interactive network traffic replay is the newest method for testing and evaluation of network devices such as Firewalls, IPSes, routers, switches, etc. Currently state-checking method is used for interactive TCP traff... 详细信息
来源: 评论
Design of high-speed network intrusion detection system architecture
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of technology 2009年 第SUPPL. 1期41卷 198-200页
作者: Yao, Wen-Bin Wang, Cong Liu, Jian-Yi Si, Yan-Fang Yang, Yi-Xian National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology Harbin Engineering University Harbin 150001 China
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow par... 详细信息
来源: 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
science China(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer science and technology,Beijing University of technology,Beijing 100124,China 2 state key laboratory of Integrated Services Network,Xidian University,Xi’an 710071,China 3 state key laboratory of information security (Graduate University of Chinese Academy of sciences),Beijing 100049,China 4 state key laboratory of Networking and Switching technology,Beijing University of Posts and Tele-communications,Beijing 100876,China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 评论
Quantum threshold group signature
收藏 引用
science China(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer science and technology, Beijing University of technology, Beijing 100124, China 2 state key laboratory of Integrated Services Network, Xidian University, Xi’an 710071, China 3 state key laboratory of information security (Graduate University of Chinese Academy of sciences), Beijing 100049, China 4 state key laboratory of Networking and Switching technology, Beijing University of Posts and Tele-communications, Beijing 100876, China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 评论
ID-based authentication scheme combined with identity-based encryption with fingerprint hashing
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2008年 第4期15卷 75-80,120页
作者: JIANG Wei-qiang HUANG Zheng-quan YANG Yi-xian TIAN Jie LI Liang Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Complex Systems and Intelligence Science Institute of Automation Chinese Academy of Sciences Beijing 100080 China
Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols h... 详细信息
来源: 评论
Anonymous authentication protocol for multi-services in wireless environments
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2008年 第4期15卷 69-74页
作者: JIANG Nan WANG Jian College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Beijing 100876 China
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this pro... 详细信息
来源: 评论
Effect of applied DC voltages and temperatures on space charge behaviour of multi-layer oil-paper insulation
收藏 引用
Journal of Physics: Conference Series 2009年 第1期183卷
作者: Chao Tang G Chen M Fu Rui-jin Liao The State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University China School of Electronics and Computer Science University of Southampton UK AVERA T&D Technology Centre Stafford UK
In this paper, space charge in a multi-layer oil-paper insulation system was investigated using the pulsed electroacoustic (PEA) technique. A series of measurements had been carried following subjection of the insulat...
来源: 评论