咨询与建议

限定检索结果

文献类型

  • 1,069 篇 会议
  • 1,001 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,072 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,372 篇 工学
    • 902 篇 计算机科学与技术...
    • 694 篇 软件工程
    • 440 篇 信息与通信工程
    • 197 篇 电子科学与技术(可...
    • 182 篇 电气工程
    • 139 篇 控制科学与工程
    • 92 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 77 篇 机械工程
    • 73 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 36 篇 土木工程
    • 36 篇 交通运输工程
    • 35 篇 航空宇航科学与技...
  • 609 篇 理学
    • 386 篇 数学
    • 137 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 365 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 36 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 164 篇 school of comput...
  • 160 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 71 篇 state key labora...
  • 62 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 school of inform...
  • 31 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 29 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,814 篇 英文
  • 150 篇 其他
  • 111 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2072 条 记 录,以下是1981-1990 订阅
排序:
Decision support system of variable rate irrigation based on mathematical model and GIS
收藏 引用
IFIP Advances in information and Communication Technology 2008年 259卷 1011-1019页
作者: Zhou, Jianjun Liu, Gang Li, Su Wang, Xiu Zhang, Man Key Laboratory of Modern Precision Agriculture System Integration Research China Agricultural University Beijing100083 China Computer College Beijing Technology and Business University Beijing100037 China National Engineering Research Center for Information Technology in Agriculture Beijing100089 China
Owing to the difference of soil water in the farm, a system of variable rate irrigation was developed with Visual C++ and MapObjects that can save water as well as can improve economy benefit. Soil water content can b... 详细信息
来源: 评论
keying material based key pre-distribution scheme
Keying material based key pre-distribution scheme
收藏 引用
IEEE International Conference on Intelligence and Security Informatics, ISI
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University South Korea
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo... 详细信息
来源: 评论
Action-Based Access Control Modelt
收藏 引用
电子学报(英文版) 2008年 第3期17卷 396-401页
作者: LI Fenghua WANG Wei MA Jianfeng Sang JaeMoon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an 710071 China) Graduate School Beijing Electronic Science and Technology Institute Beijing 100070 China) Mobile Network Security Technology Research Center Kyungpook National UniversitySankyuk-dong~ Buk-ku~ Daeyu 702-701~ KoreaI
来源: 评论
Secure mediated certificateless signature scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2007年 第2期14卷 75-78页
作者: YANG Chen MA Wen-ping WANG Xin-mei Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in... 详细信息
来源: 评论
On the Joint Nonlinear Span of Multiple Binary Sequence
收藏 引用
电子学报(英文版) 2007年 第2期16卷 321-325页
作者: DONG Lihua HU Yupu The Key Laboratory of Computer Networks and Information Security the Ministry of Education Xidian University Xi'an 710071 China
Recent developments in stream ciphers show strong interests in word-based (or vectorized) stream ciphers. The theory of such stream ciphers required the study of the complexity of multisequences. In this paper the pro... 详细信息
来源: 评论
Impossible differential cryptanalysis of advanced encryption standard
收藏 引用
Science in China(Series F) 2007年 第3期50卷 342-350页
作者: CHEN Jie HU YuPu ZHANG YueYu Key Laboratory of Computer Networks & Information Security Ministry of Education Xidian UniversityXi'an 710071 China
Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible differential relations. This paper concentrates on the impossible differential cryptanalysis ... 详细信息
来源: 评论
Short Group Signatures Without Random Oracles
收藏 引用
Journal of computer Science & Technology 2007年 第6期22卷 805-821页
作者: 秦波 伍前红 Willy Susilo 穆怡 王育民 姜正涛 National Key Laboratory of Integrated Service Networks Xidian University Center for Information Security Research School of Information Technology and Computer Science University of WollongongNSWAustralia School of Computer Science and Technology Beihang University
We propose short group signature (GS) schemes which are provably secure without random oracles. Our basic scheme is about 14 times shorter than the Boyen-Waters GS scheme at Eurocrypt 2006, and 42% shorter than the ... 详细信息
来源: 评论
Improved Impossible Differential Cryptanalysis of AES-128
收藏 引用
电子学报(英文版) 2007年 第1期16卷 187-189页
作者: WEI Yongzhuang HU Yupu Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China .Guilin University of Electronic Technology Guilin 541004 China
Recently, several impossible differential attacks on the Advanced encryption standard (AES) were presented. The previous work is extended by presenting a new impossible differential attack on the AES-128 (with 128 bit... 详细信息
来源: 评论
Perfect forward secrecy of authentication and key exchange protocols in three versions of WAPI
收藏 引用
information Technology Journal 2007年 第7期6卷 1108-1113页
作者: Cao, Chun-Jie Yang, Chao Li, Xing-Hua Guo, Yuan-Bo Ma, Jian-Feng Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Institute of Electronic Technology Information Engineering University of PLA Zhengzhou 450004 China
Wireless Local Area networks (WLAN) are now being widely deployed for many applications, but security remains one of the most critical challenges yet to be fully addressed. Recently, a basic solution to this problem n... 详细信息
来源: 评论
A New Link-Based Hamiltonian Cycle Protection in Survivable WDM Optical networks
A New Link-Based Hamiltonian Cycle Protection in Survivable ...
收藏 引用
4th Advanced International Conference on Telecommunications (AICT 2008)
作者: Lei Guo Xingwei Wang Xuetao Wei Ting Yang Weigang Hou Tengfei Wu College of Information Science and Engineering Northeastern University Shenyang China Key Laboratory of Broadband Optical Fiber Transmission and Communication Networks University of Electronic Science and Technology Chengdu China Department of Computer Science and Engineering University of California Riverside CA USA
In this paper, we propose a new Link-Based Hamiltonian Cycle Protection (LBHCP) scheme for tolerating the single-link failure in WDM optical networks. From theoretical analysis and simulation results, we can clearly s... 详细信息
来源: 评论