咨询与建议

限定检索结果

文献类型

  • 166 篇 期刊文献
  • 37 篇 会议

馆藏范围

  • 203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 151 篇 工学
    • 65 篇 计算机科学与技术...
    • 61 篇 网络空间安全
    • 21 篇 软件工程
    • 18 篇 信息与通信工程
    • 16 篇 仪器科学与技术
    • 12 篇 机械工程
    • 11 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 4 篇 地质资源与地质工...
    • 3 篇 测绘科学与技术
    • 2 篇 光学工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 53 篇 理学
    • 36 篇 数学
    • 11 篇 物理学
    • 3 篇 地理学
    • 2 篇 系统科学
    • 1 篇 化学
    • 1 篇 生物学
  • 18 篇 军事学
    • 18 篇 军队指挥学
  • 18 篇 管理学
    • 16 篇 管理科学与工程(可...
  • 3 篇 哲学
    • 3 篇 哲学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 10 篇 cryptography
  • 8 篇 quantum
  • 7 篇 网络安全
  • 6 篇 信息安全
  • 5 篇 sharing
  • 5 篇 密码协议
  • 5 篇 secret
  • 5 篇 provable securit...
  • 4 篇 threshold
  • 4 篇 计算机网络
  • 4 篇 security
  • 3 篇 communication
  • 3 篇 密码学
  • 3 篇 signature
  • 3 篇 direct
  • 3 篇 authentication
  • 3 篇 block cipher
  • 3 篇 分组密码算法
  • 3 篇 identity
  • 3 篇 离散对数

机构

  • 12 篇 中国科学院研究生...
  • 9 篇 中国科技大学
  • 7 篇 中国科学技术大学
  • 6 篇 南京大学
  • 3 篇 南京邮电学院
  • 3 篇 信息安全国家重点...
  • 3 篇 中国科学院软件研...
  • 3 篇 state key labora...
  • 3 篇 中山大学
  • 3 篇 中国科学院软件研...
  • 3 篇 1. state key lab...
  • 3 篇 北京邮电大学
  • 3 篇 state key labora...
  • 3 篇 college of compu...
  • 2 篇 state key labora...
  • 2 篇 软件新技术国家重...
  • 2 篇 telecommunicatio...
  • 2 篇 1. state key lab...
  • 2 篇 state key labora...
  • 2 篇 网络安全防护技术...

作者

  • 12 篇 吕述望
  • 10 篇 china
  • 8 篇 冯登国
  • 5 篇 谢立
  • 4 篇 beijing universi...
  • 4 篇 茅兵
  • 4 篇 beijing
  • 3 篇 2 graduate unive...
  • 3 篇 王汝传
  • 3 篇 左英男
  • 3 篇 3 school of scie...
  • 3 篇 刘振华
  • 3 篇 刘宝旭
  • 3 篇 许剑卓
  • 3 篇 杨义先
  • 2 篇 3 state key labo...
  • 2 篇 4 state key labo...
  • 2 篇 孙开翠
  • 2 篇 yongxiang gu
  • 2 篇 朱明富

语言

  • 131 篇 英文
  • 72 篇 中文
检索条件"作者=2 state key laboratory of information security,institute of software Science,chinese academy of sciences,beijing 100049,china"
203 条 记 录,以下是71-80 订阅
排序:
Optimized statistical analysis of software trustworthiness attributes
收藏 引用
science china(information sciences) 2012年 第11期55卷 2508-2520页
作者: ZHANG Xiao1,LI Wei2,ZHENG ZhiMing1,2 & GUO BingHui1 1key laboratory of Mathematics,Informatics and Behavioral Semantics,Ministry of Education,Beihang University,beijing 100191,china 2state key laboratory of software Development Environment,Beihang University,beijing 100191,china 1. key laboratory of Mathematics Informatics and Behavioral Semantics Ministry of Education Beihang University Beijing 100191 China2. State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China
software trustworthiness has become one of the key restrictions for software service quality and the development of the software ***,trustworthiness attributes interlace structured and dynamical coupling relations,whi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Sensor-Service Collaboration Approach for Target Tracking in Wireless Camera Networks
收藏 引用
china Communications 2017年 第7期14卷 44-56页
作者: Shuai Zhao Le Yu state key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications china Mobile information security Center
Mobile target tracking is a necessary function of some emerging application domains, such as virtual reality, smart home and intelligent healthcare. However, existing portable devices for target tracking are resource ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Privilege Flow Oriented Intrusion Detection Based on Hidden Semi-Markov Model
Privilege Flow Oriented Intrusion Detection Based on Hidden ...
收藏 引用
The 1st chinese Conference on Trusted Computing and information security
作者: ZHONG An-ming, JIA Chun-fu College of information Technology and sciences. Nankai University. Tianjin 300071 .china state key laboratory of information security, institute of software of chinese academy of science, beijing 100039,china
<正> A privilege flow oriented intrusion detection method based on HSMM ( Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection I... 详细信息
来源: cnki会议 评论
GIS and ANN model for landslide susceptibility mapping
收藏 引用
Journal of Geographical sciences 2001年 第3期11卷 374-381页
作者: XU Zeng-wang (state key laboratory of Resources and Environment information System, institute of Geographic sciences and Natural Resources Research, CAS, beijing 100101, china) state key laboratory of Resources and Environment information System Institute of Geographic Sciences and Natural Resources Research CAS
Landslide hazard is as the probability of occurrence of a potentially damaging landslide phenomenon within specified period of time and within a given area. The susceptibility map provides the relative spatial probabi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Novel encryption model for multimedia data
收藏 引用
Journal of Systems Engineering and Electronics 2009年 第5期20卷 1081-1085页
作者: Ye Dengpan~(1,2) & Lian Shiguo~3 1.The key laboratory of Aerospace information security and Trust Computing,Ministry of Education,Wuhan 430072,P.R.china 2.School of Computer science,Wuhan Univ.,Wuhan 430072,P.R.china 3.France Telecom R&D beijing,beijing 100080,P.R.china The key laboratory of Aerospace information security and Trust Computing Ministry of Education Wuhan 430072 P. R. China School of Computer Science Wuhan Univ. Wuhan 430072 P. R. China France Telecom R&D beijing Beijing 100080 P. R. China
A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. An... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A heuristic algorithm for cube packing with time schedule
收藏 引用
science china(information sciences) 2010年 第1期53卷 18-29页
作者: LI Wei1, HUANG WenQi2, JIANG DongChen1 & LIU XiangLong1 1state key laboratory of software Development Environment, Beihang University, beijing 100191, china 2School of Computer science and Technology, Huazhong University of science and Technology, Wuhan 430074, china 1. state key laboratory of software Development Environment Beihang University Beijing 100191 China2. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Packing problem has been proved to be an NP-hard problem. Many algorithms such as simulation annealing algorithm, genetic algorithm and other heuristic algorithms have been proposed to solve twodimensional and three-d... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Measuring-basis-encrypted six-state quantum key distribution scheme
收藏 引用
Progress in Natural science:Materials International 2006年 第1期16卷 84-89页
作者: CHEN Pan1, DENG Fuguo1, WANG Pingxiao1 and LONG Guilu1,2 (key laboratory for Quantum information and Measurements and Department of Physics, Tsinghua University, beijing 100084, china 2. key laboratory for Atomic and Molecular Nanosciences, Tsinghua University, beijing 100084, china) [a]Department of Physics Tsinghua University Key Laboratory for Quantum Information and Measurements Beijing China [b]Tsinghua University Key Laboratory for Atomic and Molecular NanoSciences Beijing China
A six-state quantum key distribution scheme with measuring-basis encryption technique, which is based on the six-state protocol and the MBE protocol, is proposed. In this modified six-state quantum key distribution pr... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Digital earth, Virtual Reality and urban seismic disaster simulation
收藏 引用
Journal of Geographical sciences 2000年 第2期10卷 119-128页
作者: HE Jian-bang, HU Zhi-yong, YE Ze-tian, LI Hui-guo, WANG Jin-feng (state key laboratory of Resources & Environment information Systems, chinese academy of sciences, beijing 100101, china)
US Vice President Al Gore's vision of Digital Earth applies us with prospects for brand-new ways of solving problems the earth is facing such as seismic disaster. ms paper first briefly introduces the concept of Digi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Study and Perspective of Mobile Agent security
收藏 引用
The Journal of china Universities of Posts and Telecommunications 2004年 第4期11卷 48-53页
作者: MU Honga~1 WANG Ru-chuan~(1,2) WANG Hai-yan~11.Department of Computer science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R.china 2.state key laboratory of information security(Graduate School of chinese Aeademy of sciences),beijing 100039,P.R.china Department of Computer science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003
security is an important issue for the widespread deployment of applications based on software agent *** is generally agreed that without the proper countermeasures in place,use of agent-based applications will be ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Construction of Resilient Functions
Construction of Resilient Functions
收藏 引用
The 1st chinese Conference on Trusted Computing and information security
作者: ZHANG Jie, WEN Qiao-yan School of science, beijing University of Posts and Telecommunications , beijing 100876, china state key laboratory of information security, chinese academy of sciences, beijing 100039, china
<正> Based on the relationship between nonlinearity and resiliency of a multi-output function, we present a methodfor constructing nonintersecting linear codes from packing design. Through these linear codes, we obt... 详细信息
来源: cnki会议 评论