咨询与建议

限定检索结果

文献类型

  • 96 篇 期刊文献
  • 38 篇 会议

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 123 篇 工学
    • 38 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 仪器科学与技术
    • 19 篇 网络空间安全
    • 14 篇 软件工程
    • 10 篇 机械工程
    • 9 篇 光学工程
    • 7 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 交通运输工程
  • 24 篇 理学
    • 17 篇 物理学
    • 6 篇 数学
    • 2 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 统计学(可授理学、...
  • 20 篇 管理学
    • 20 篇 管理科学与工程(可...
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 9 篇 quantum
  • 5 篇 sharing
  • 4 篇 cryptography
  • 4 篇 threshold
  • 4 篇 secret
  • 2 篇 asn.1
  • 2 篇 single
  • 2 篇 xml
  • 2 篇 communication
  • 2 篇 模型
  • 2 篇 channel estimati...
  • 2 篇 load-balancing a...
  • 2 篇 state
  • 2 篇 signature
  • 2 篇 direct
  • 2 篇 system
  • 2 篇 authentication
  • 2 篇 heterogeneous cl...
  • 2 篇 移动代理
  • 2 篇 security

机构

  • 19 篇 北京邮电大学
  • 6 篇 telecommunicatio...
  • 5 篇 beijing universi...
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 china
  • 4 篇 beijing 100876
  • 3 篇 [a]state key lab...
  • 3 篇 [a] state key la...
  • 3 篇 switching techno...
  • 2 篇 南京邮电学院
  • 2 篇 重庆邮电大学
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 NOT FOUND
  • 2 篇 NOT FOUND
  • 2 篇 college of compu...
  • 2 篇 state key lab of...
  • 2 篇 college of compu...
  • 1 篇 china mobile inf...

作者

  • 13 篇 china
  • 9 篇 beijing
  • 8 篇 杨义先
  • 7 篇 beijing universi...
  • 4 篇 钮心忻
  • 3 篇 苏森
  • 3 篇 廖建新
  • 3 篇 3 school of scie...
  • 3 篇 马兆丰
  • 3 篇 王励成
  • 3 篇 beijing 100876
  • 2 篇 胡正名
  • 2 篇 3 state key labo...
  • 2 篇 王汝传
  • 2 篇 4 state key labo...
  • 2 篇 陈俊亮
  • 2 篇 yang yuguang1 2 ...
  • 2 篇 余重秀
  • 2 篇 苑金辉
  • 2 篇 桑新柱

语言

  • 106 篇 英文
  • 28 篇 中文
检索条件"作者=2 state Key Laboratory of networking and switching technology,beijing university of posts and tele-communications,beijing 100876,china"
134 条 记 录,以下是11-20 订阅
排序:
On the construction of multi-output Boolean functions with optimal algebraic immunity
收藏 引用
Science china(Information Sciences) 2012年 第7期55卷 1617-1623页
作者: ZHANG Jie 1,2 ,SONG ShouChao 1 ,DU Jiao 2,3 & WEN QiaoYan 2 1 School of Science,beijing university of posts and telecommunications,beijing 100876,china 2 state key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing 100876,china 3 Department of Mathematics,Xinxiang university,Xinxiang 453003,china 1. School of Science Beijing University of Posts and Telecommunications Beijing 100876 China2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China3. Department of Mathematics Xinxiang University Xinxiang 453003 China
In this paper,we show a construction of multi-output Boolean functions with optimal algebraic ***,the relationship between the algebraic immunity of a multi-output Boolean function and those of its component functions... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Detecting feature interactions in Web services with model checking techniques
收藏 引用
The Journal of china Universities of posts and telecommunications 2007年 第3期14卷 108-112页
作者: ZHANG Jian-yin,YANG Fang-chun,SU Sen state key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing 100876,china [a]state key laboratory of networking and switching technology beijing university of posts and telecommunications beijing 100876 china
As a platform-independent software system,a Web service is designed to offer interoperability among diverse and heterogeneous *** the introduction of service composition in the Web service creation,various message int... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
Science china(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1Information Security Center, state key laboratory of networking and switching technology, beijing university of posts and telecommunications, beijing 100876, china 2key laboratory of Network and Information Attack and Defence technology of MOE, beijing university of posts and telecommunications, beijing 100876, china 3National Engineering laboratory for Disaster Backup and Recovery, beijing university of posts and telecommunications, beijing 100876, china 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An efficient quantum secret sharing protocol with orthogonal product states
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2007年 第3期50卷 331-338页
作者: YANG YuGuang1,2, WEN QiaoYan3 & ZHU FuChen4 1 School of Computer, beijing university of technology, beijing 100022, china 2 state key laboratory of Information Security, Graduate university of Chinese Academy of Sciences, beijing 100022, china 3 School of Science, beijing university of posts and telecommunications, beijing 100876, china 4 National key laboratory for Modern communications, Chengdu 610041, china 1. School of Computer Beijing University of Technology Beijing 100022 China 2. state key laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100022 China 3. School of Science Beijing University of Posts and Telecommunications Beijing 100876 China 4. National key laboratory for Modern communications Chengdu 610041 China
An efficient quantum secret sharing protocol with orthogonal product states in the 33 Hilbert space is presented. The particles in the orthogonal product states form two particle sequences. One sequence is sent to B... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quasi-secure quantum dialogue using single photons
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2007年 第5期50卷 558-562页
作者: YANG YuGuang1,2 & WEN QiaoYan31 College of Computer Science and technology, beijing university of technology, beijing 100022, china 2 state key laboratory of Information Security, Graduate university of the Chinese Academy of Sciences, beijing 100049, china 3 School of Science, beijing university of posts and telecommunications, beijing 100876, china College of Computer Science technology Beijing University of Technology Beijing 100022 China state key laboratory of Information Security Graduate University of the Chinese Academy of Sciences Beijing 100049 China School of Science Beijing University of Posts telecommunications Beijing 100876 China
A quasi-secure quantum dialogue protocol using single photons was proposed. Different from the previous entanglement-based protocols, the present protocol uses batches of single photons which run back and forth betwee... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secure direct communication without entanglement
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第2期51卷 176-183页
作者: YANG YuGuang1,3 & WEN QiaoYan2 1 College of Computer Science and technology, beijing university of technology, beijing 100022, china 2 School of Science, beijing university of posts and telecommunications, beijing 100876, china 3 state key laboratory of Information Security (Graduate School of Chinese Academy of Sciences), beijing 100049, china 1. College of Computer Science and technology Beijing University of Technology Beijing 100022 China 3. state key laboratory of Information Security (Graduate School of Chinese Academy of Sciences) Beijing 100049 China 2. School of Science Beijing University of Posts and Telecommunications Beijing 100876 China
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Generalized quantum state sharing of the arbitrary two particles state
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2010年 第11期53卷 2064-2068页
作者: WANG Chuan 1,2,ZHANG Yong 1,2 & JIN GuangSheng 1,2 1 School of Science,beijing university of posts and telecommunications,beijing 100876,china 2 key laboratory of Optical Communication and Lightwave Technologies,beijing university of posts and telecommunications,beijing 100876,china 1. School of Science Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Optical Communication and Lightwave Technologies Beijing University of Posts and Telecommunications Beijing 100876 China
This paper has proposed a generalized quantum state sharing protocol of an arbitrary two-particle state using non-maximally GHZ states and generalized Bell state *** sender Alice performs two-particle generalized Bell... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Decoding algorithms for shortened-extended turbo product codes in WiMAX systems
收藏 引用
Science in china(Series F) 2009年 第12期52卷 2415-2423页
作者: XU ChangLong1,3,4, YANG Wei1,2 & YE WeiChen4 1 state key laboratory of networking and switching technology, beijing university of posts and telecommunications, beijing 100044, china 2 state key laboratory of Rail Traffic Control and Safety, beijing Jiaotong university, beijing 100044, china 3 National Mobile communications Research laboratory, Southeast university, Nanjing 210096, china 4 Intel Corporation, beijing Kerry Center, Guanghua Road 1, beijing 100020, china state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100044 China state key laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China National Mobile communications Research laboratory Southeast University Nanjing 210096 China Intel Corporation Beijing Kerry Center Guanghua Road 1 Beijing 100020 China
The component codes of turbo product codes in WiMAX systems are extended Hamming codes and single parity check codes as well as their shortened forms, In this paper, three novel iterative decoding algorithms based on ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cross layer scheduling for real-time traffic in multiuser MIMO-OFDMA systems
收藏 引用
The Journal of china Universities of posts and telecommunications 2009年 第3期16卷 24-29页
作者: SUN Qiao-yun,TIAN Hui,DONG Kun,ZHANG Ping key laboratory of Universal Wireless communications,Ministry of Education,beijing university of posts and telecommunications,beijing 100876,china [a]key laboratory of Universal Wireless communications Ministry of Education beijing university of posts and telecommunications beijing 100876 china
A novel cross layer scheduling algorithm is proposed for real-time (RT) traffic in multiuser downlink multiple-input multiple-output orthogonal frequency division multiple access (MIMO-OFDMA) wireless systems. The... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Sensor-Service Collaboration Approach for Target Tracking in Wireless Camera Networks
收藏 引用
china communications 2017年 第7期14卷 44-56页
作者: Shuai Zhao Le Yu state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications china Mobile Information Security Center
Mobile target tracking is a necessary function of some emerging application domains, such as virtual reality, smart home and intelligent healthcare. However, existing portable devices for target tracking are resource ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论