咨询与建议

限定检索结果

文献类型

  • 1,305 篇 期刊文献
  • 519 篇 会议

馆藏范围

  • 1,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,362 篇 工学
    • 483 篇 计算机科学与技术...
    • 380 篇 网络空间安全
    • 198 篇 软件工程
    • 131 篇 仪器科学与技术
    • 121 篇 机械工程
    • 121 篇 信息与通信工程
    • 90 篇 电子科学与技术(可...
    • 86 篇 控制科学与工程
    • 37 篇 地质资源与地质工...
    • 36 篇 电气工程
    • 32 篇 公安技术
    • 31 篇 交通运输工程
    • 29 篇 石油与天然气工程
    • 29 篇 航空宇航科学与技...
    • 28 篇 环境科学与工程(可...
    • 26 篇 水利工程
    • 26 篇 测绘科学与技术
    • 26 篇 农业工程
  • 393 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 56 篇 工商管理
    • 39 篇 公共管理
    • 34 篇 图书情报与档案管...
  • 248 篇 理学
    • 102 篇 数学
    • 31 篇 物理学
    • 29 篇 系统科学
    • 26 篇 生态学
  • 94 篇 经济学
    • 87 篇 应用经济学
  • 68 篇 军事学
    • 65 篇 军队指挥学
  • 62 篇 教育学
    • 54 篇 教育学
  • 60 篇 农学
    • 26 篇 农业资源与环境
  • 44 篇 医学
  • 42 篇 法学
  • 27 篇 艺术学
  • 10 篇 文学
  • 1 篇 哲学

主题

  • 62 篇 网络安全
  • 46 篇 信息安全
  • 32 篇 evaluation
  • 20 篇 安全
  • 20 篇 计算机网络
  • 18 篇 ahp
  • 18 篇 入侵检测
  • 18 篇 information secu...
  • 18 篇 数据库
  • 17 篇 security
  • 16 篇 gis
  • 16 篇 防火墙
  • 14 篇 安全性
  • 14 篇 电子商务
  • 14 篇 访问控制
  • 13 篇 数字签名
  • 13 篇 网络
  • 13 篇 层次分析法
  • 12 篇 internet
  • 12 篇 信息系统

机构

  • 34 篇 南京信息工程大学
  • 25 篇 武汉理工大学
  • 23 篇 哈尔滨工业大学
  • 22 篇 华中科技大学
  • 22 篇 上海交通大学
  • 21 篇 中国科学技术大学
  • 16 篇 武汉大学
  • 15 篇 清华大学
  • 15 篇 西安电子科技大学
  • 15 篇 电子科技大学
  • 14 篇 四川大学
  • 13 篇 华南理工大学
  • 13 篇 太原理工大学
  • 12 篇 北京邮电大学
  • 11 篇 国防科技大学
  • 11 篇 中国科学院大学
  • 11 篇 中国电子科技集团...
  • 10 篇 北京交通大学
  • 10 篇 天津大学
  • 10 篇 中国矿业大学

作者

  • 162 篇 china
  • 19 篇 beijing
  • 11 篇 p.r.china
  • 8 篇 方滨兴
  • 8 篇 china)
  • 8 篇 吕述望
  • 8 篇 杨义先
  • 7 篇 胡铭曾
  • 6 篇 shanghai
  • 6 篇 wuhan
  • 5 篇 张建伟
  • 5 篇 钟诚
  • 4 篇 王汝传
  • 4 篇 zhengzhou
  • 4 篇 nanjing
  • 4 篇 孙锬锋
  • 4 篇 李明
  • 4 篇 hangzhou
  • 4 篇 p. r. china
  • 4 篇 冯登国

语言

  • 1,052 篇 中文
  • 772 篇 英文
检索条件"作者=2 China information Technology security Evaluation center,beijing 100085,China"
1824 条 记 录,以下是51-60 订阅
排序:
SQUARE attack on block ciphers with low algebraic degree
收藏 引用
Science china(information Sciences) 2010年 第10期53卷 1988-1995页
作者: SUN Bing 1 , LI RuiLin 1 , QU LongJiang 1,3 & LI Chao 1,2,3 1 Science College of National University of Defense technology, Changsha 410073, china 2 State Key Laboratory of information security, Graduate University of Chinese Academy of Sciences, beijing 100049, china 3 National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, china 1. Science College of National University of Defense technology Changsha 410073 China3. National Mobile Communications Research Laboratory Southeast University Nanjing 210096 China2. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China
By using an algebraic method, the mathematical foundation of SQUARE attack is studied in this paper. We point out that a SQUARE distinguisher exists if and only if the degree of the polynomial function between n-bit i... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Building a next generation Internet with source address validation architecture
收藏 引用
Science in china(Series F) 2008年 第11期51卷 1681-1691页
作者: WU JianPing1,3,REN Gang1,3 & LI Xing2,3 1 Department of Computer Science,Tsinghua University,beijing 100084,china 2 Department of Electronic Engineering,Tsinghua University,beijing 100084,china 3 Tsinghua National Laboratory for information Science and technology(TNList) ,beijing 100084,china Department of Computer Science Tsinghua University Beijing 100084 China Department of Electronic Engineering Tsinghua University Beijing 100084 China Tsinghua National Laboratory for information Science and technology (TNList) Beijing 100084 China
The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most *** causes serious security, management and accounting problems. Based ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Combining Digital Watermarks with Two-Color Bitmap Image
收藏 引用
The Journal of china Universities of Posts and Telecommunications 2000年 第Z1期 31-35页
作者: SAAD A Amer, YANG Yi-xian (information security center, beijing University of Posts and Telecommunications, beijing 100876, P.R. china)
A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn’t add any thing to the digital media, but combines the watermark... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
information content security on the Internet:the control model and its evaluation
收藏 引用
Science china(information Sciences) 2010年 第1期53卷 30-49页
作者: FANG BinXing1, GUO YunChuan2,3 & ZHOU Yuan4 1School of Computer, beijing University of Posts and Telecommunications, beijing 100029, china 2Institute of Computing technology, Chinese Academy of Sciences, beijing 100190, china 3Graduate University of Chinese Academy of Sciences, beijing 100049, china 4National Computer Network Emergency Response Technical Team/Coordination center of china, beijing 100029, china 1. School of Computer Beijing University of Posts and Telecommunications Beijing 100029 China2. Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China3. Graduate University of Chinese Academy of Sciences Beijing 100049 China4. National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China
Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Corslet: A shared storage system keeping your data private
收藏 引用
Science china(information Sciences) 2011年 第6期54卷 1119-1128页
作者: XUE Wei 1,2 , SHU JiWu 1,2 , LIU Yang 1 & XUE Mao 1 1 Department of Computer Science and technology, Tsinghua University, beijing 100084, china 2 Tsinghua National Laboratory for information Science and technology, Tsinghua University, 1. Department of Computer Science and technology Tsinghua University Beijing 100084 China2. Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing 100084 China
With the exponential growth of digital data, it is becoming more and more popular to store data in shared distributed storage systems inside the same organization. In such shared distributed storage systems, an ordina... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Monaural voiced speech segregation based on elaborate harmonic grouping strategies
收藏 引用
Science china(information Sciences) 2011年 第12期54卷 2491-2500页
作者: LIU WenJu 1 , ZHANG XueLiang 1 , JIANG Wei 1 , LI Peng 2 & XU Bo 2 1 National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, beijing 100190, china 2 Digital Media Content technology Research center, Institute of Automation, Chinese Academy of Sciences, beijing 100190, china 1. National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing 100190 China2. Digital Media Content Technology Research Center Institute of Automation Chinese Academy of Sciences Beijing 100190 China
In this paper, an enhanced algorithm based on several elaborate harmonic grouping strategies for monaural voiced speech segregation is proposed. Main achievements of the proposed algorithm lie in three aspects. Firstl... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Experimental investigation of MIMO relay channels statistics and capacity based on wideband outdoor measurements at 2.35 GHz
收藏 引用
Science china(information Sciences) 2011年 第9期54卷 1945-1956页
作者: NIE Xin 1,2,ZHANG JianHua 1,2,LIU ZeMin 1 & ZHANG Ping 1,2 1 Key Laboratory of Universal Wireless Communications,Ministry of Education beijing University of Posts and Telecommunications,beijing 100876,china 2 Wireless technology Innovation Institute,beijing University of Posts and Telecommunications,beijing 100876,china 1. Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China2. Wireless Technology Innovation Institute Beijing University of Posts and Telecommunications Beijing 100876 China
Relay,which serves to enhance the performance of future communication networks,is one of the most promising techniques for IMT-Advanced *** potential performance improvement of relay is investigated in this *** invest... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Influence of Yb^(3+) concentration on the upconversion luminescence of oxyfluoride material doped with Er^(3+)
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2010年 第2期53卷 310-314页
作者: ZHAO SuLing1,XU Zheng1,WANG LiHui2 & S. Wageh3 1 Institute of Optoelectronic technology,Key Laboratory of Luminescence and Optical information (beijing Jiaotong University),Ministry of Education,beijing 100044,china 2 Department of Physics,Chinese People’s Public security University,beijing 100038,china 3 Physics & Engineering Mathematics Department Faculty of Electronic Engineering Menufiya University,Menouf 32952,Egypt 1. Institute of Optoelectronic technology Key Laboratory of Luminescence and Optical Information (Beijing Jiaotong University) Ministry of Education Beijing 100044 China2. Department of Physics Chinese People’s Public Security University Beijing 100038 China3. Physics & Engineering Mathematics Department Faculty of Electronic Engineering Menufiya University Menouf 32952 Egypt
In this paper,a new upconversion luminescent material co-doped with Erbium and Ytterbium is reported. The upconversion luminescence transition routes and related properties are studied. The results show that the absor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A more efficient accountable authority IBE scheme under the DL assumption
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 581-592页
作者: XU Peng, CUI GuoHua, FU Cai & TANG XueMing Laboratory of information security, College of Computer Science, Huazhong University of Science and technology, Wuhan 430074, china 1. Laboratory of information security College of Computer Science Huazhong University of Science and Technology Wuhan 430074 China
In 2007, Goyal introduced a new and creative approach, called accountable authority identity-based encryption (referred to as A-IBE), to reduce the degree of trust that must be placed in the private-key generator (PKG... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Model of Current Threshold for Perception in Testing Electrical Safety Performance
收藏 引用
Transactions of Tianjin University 2010年 第1期16卷 11-16页
作者: 王晓飞 张朝晖 李东 刘国忠 赵旭 School of information Engineering University of Science and Technology Beijing School of Electro-Optical Engineering Beijing Information Science and Technology University Department of Neurology The 306th Hospital of PLA
A generalized mathematical model of human body current threshold for perception was established and the current flowing through human body could be arbitrary cyclical *** relationship between human body current thresh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论