咨询与建议

限定检索结果

文献类型

  • 97 篇 期刊文献
  • 16 篇 会议

馆藏范围

  • 113 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 32 篇 计算机科学与技术...
    • 32 篇 网络空间安全
    • 12 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 信息与通信工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 机械工程
    • 5 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 2 篇 地质资源与地质工...
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
    • 1 篇 船舶与海洋工程
  • 32 篇 理学
    • 22 篇 数学
    • 2 篇 物理学
    • 2 篇 地理学
    • 2 篇 生物学
    • 2 篇 系统科学
    • 2 篇 生态学
  • 12 篇 管理学
    • 10 篇 管理科学与工程(可...
  • 7 篇 军事学
    • 7 篇 军队指挥学
  • 6 篇 农学
    • 2 篇 作物学
    • 2 篇 农业资源与环境
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学

主题

  • 4 篇 cryptography
  • 4 篇 网络安全
  • 4 篇 provable securit...
  • 3 篇 公钥基础设施
  • 2 篇 计算机安全
  • 2 篇 mechanism
  • 2 篇 漏洞挖掘
  • 2 篇 quasi-period.
  • 2 篇 dynamic
  • 2 篇 密码学
  • 2 篇 system security
  • 2 篇 malicious code
  • 2 篇 分类法
  • 2 篇 privilege flow m...
  • 2 篇 secret sharing
  • 2 篇 认证字典
  • 2 篇 中间件
  • 2 篇 可靠性
  • 2 篇 模糊测试
  • 2 篇 defense

机构

  • 8 篇 中国科学院软件研...
  • 7 篇 中国科学院大学
  • 5 篇 中国科学院研究生...
  • 3 篇 中国科学院软件研...
  • 3 篇 1. state key lab...
  • 3 篇 中国科学院信息安...
  • 3 篇 中国科学院信息工...
  • 2 篇 中国科学院计算技...
  • 2 篇 中国科学院地理科...
  • 2 篇 中国科学院研究生...
  • 2 篇 湖南信息技术职业...
  • 2 篇 中国科学院物联网...
  • 2 篇 网络安全防护技术...
  • 2 篇 中国科学院信息工...
  • 2 篇 中科院信息安全技...
  • 2 篇 南京理工大学
  • 2 篇 1. state key lab...
  • 2 篇 云南民族大学
  • 2 篇 中山大学
  • 2 篇 北京电子科技学院

作者

  • 5 篇 卿斯汉
  • 3 篇 2 graduate unive...
  • 3 篇 冯登国
  • 3 篇 蒋建春
  • 3 篇 刘雪飞
  • 3 篇 龚晓锐
  • 3 篇 周永彬
  • 3 篇 马恒太
  • 3 篇 china
  • 3 篇 文伟平
  • 2 篇 史忠植
  • 2 篇 霍玮
  • 2 篇 2state key labor...
  • 2 篇 张秉权
  • 2 篇 state key labora...
  • 2 篇 2. beijing zhong...
  • 2 篇 3. graduate scho...
  • 2 篇 邹维
  • 2 篇 刘宝旭
  • 2 篇 吴伯桥

语言

  • 66 篇 英文
  • 47 篇 中文
检索条件"作者=2. Institute of Software of Chinese Academy of Sciences /{3. key Laboratory of Information security, beijing 100080, china"
113 条 记 录,以下是31-40 订阅
排序:
A prototype auto-human support system for spatial analysis
收藏 引用
Progress in Natural Science:Materials International 2006年 第9期16卷 954-966页
作者: LI Lianfa and WANG Jinfeng (State key laboratory of Resources & Environmental {2. System, {3. of Geographical sciences & Natural Resources Research, chinese academy of sciences, beijing 100101, china) [a]State key laboratory of Resources & Environmental {2. System Institute of Geographical Sciences & Natural Resources Research Chinese Academy Sciences Beijing China
Spatial analysis is a multidisciplinary field that involves multiple influential factors, variation and uncertainty, and modeling of geospatial data is a complex procedure affected by spatial context, mechanism and as... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Polar differential power attacks and evaluation
收藏 引用
Science china(information {2.) 2012年 第7期55卷 1588-1604页
作者: TANG Ming 1 ,QIU ZhenLong 1 ,GAO Si 1,2.,YI Mu 3.,LIU ShuBo 1 ,ZHANG HuanGuo 1 & JIN YingZhen 1 1 School of Computer Science,Wuhan University,Wuhan 43.072.china 2.State key {2. of information security,institute of software,chinese academy of sciences,{13. 100190,china 3.Centre for Computer and information security Research School of Computer Science and software Engineering University of Wollongong,Wollongong,NSW 2.2.,Australia 1. School of Computer Science Wuhan University Wuhan 430072 China2. State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China3. Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system *** existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implem... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A particle-based method for granular flow simulation
收藏 引用
Science china(information {2.) 2012年 第5期55卷 1062-1072页
作者: CHANG YuanZhang 1,BAO Kai 2.3.ZHU Jian 1 & WU EnHua 1,2.1 Department of Computer and information Science,University of Macau,Macao,{3. 2.State {2. laboratory of Computer Science,institute of software,chinese academy of sciences,beijing 100190,{3. 3.Division of Mathematical and Computer sciences & Engineering,KAUST,Thuwal,Saudi Arabia 1. Department of Computer and information Science University of Macau Macao China2. State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China3. Division of Mathematical and Computer Sciences & Engineering KAUST Thuwal Saudi Arabia
We present a new particle-based method for granular flow *** the method,a new elastic stress term,which is derived from a modified form of the Hooke's law,is included in the momentum governing equation to handle the f... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Nondegenerative ML-sequences over ring Z/(2.
收藏 引用
Science Bulletin 1999年 第17期 1557-1561页
作者: YANG Junhui and ZHAI Qibin institute of software , {2. {3. of sciences , beijing 100080, china State key laboratory of information security , beijing 100080, china
The so-called quasi-period of an ML-sequence has been introduced. It is noted that an ML-sequence may degenerate in the sense that it has the quasi-period shorter than its period, and the problem of constructing the n... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Scan chain design for shift power reduction in scan-based testing
收藏 引用
Science china(information {2.) 2011年 第4期54卷 767-777页
作者: LI Jia 1,HU Yu 2.& LI XiaoWei 2.1 The School of software,Tsinghua University,{3. 100084,{2. 2.The institute of Computing Technology,chinese academy of sciences,{3. 100190,{2. 1. The School of software Tsinghua University Beijing 100084 China2. The Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Test power of VLSI systems has become a challenging issue *** scan shift power dominates the average test power and restricts clock frequency of the shift phase,leading to excessive thermal accumulation and long test ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
QKD扩展BB84协议的Breidbart基窃听问题
收藏 引用
物理学报 2002年 第5期51卷 961-965页
作者: 杨理 吴令安 刘颂豪 中国科学院研究生院信息安全国家重点实验室 北京100039 中国科学院物理研究所 北京100080 华南师范大学量子电子学研究所 广州510631
给出了六态扩展BB84协议的Breidbart基窃听方案 ,分析并计算了各种截取 重发策略下的Alice Eve平均交互信息量和施行QKD标准纠错手续后的有效平均交互信息量 ,结果显示Breidbart基窃听 Breidbart基重发策略 (B B策略 )最为有效 .考虑到... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Studies and advances on joint source-channel encoding/decoding techniques in flow media communications
收藏 引用
Science china(information {2.) 2010年 第1期53卷 1-17页
作者: TU GuoFang1, LIU JianJun1, ZHANG Can1,2. GAO ShaoShuai3.& LI ShiDong4 1School of information Science and Engineering, Graduate University of chinese {2. of sciences, beijing 100049, china 2.tate key laboratory of information security, Graduate University of chinese {2. of sciences, beijing 100049, china 3.ational institute of Standards and Technology, Gaithersburg, MD 2.899, USA, 4Department of Mathematics, San Francisco State University, San Francisco, CA 9413.0} USA 1. School of information Science and Engineering Graduate University of Chinese Academy of Sciences Beijing 100049 China2. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China3. National Institute of Standards and Technology Gaithersburg MD 20899 USA4. Department of Mathematics San Francisco State University San Francisco CA 94132 USA
Joint source-channel coding/decoding (JSCC/JSCD) techniques in flow media communications have become a state-of-the-art and one of the challenging research subjects in the spatial communication area. They have great a... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A generalized mean shift tracking algorithm
收藏 引用
Science china(information {2.) 2011年 第11期54卷 2373-2385页
作者: CHEN JianJun 1,4,ZHANG SuoFei 1,AN GuoCheng 2.& WU ZhenYang 1,3. School of information Science and Engineering,Southeast University,Nanjing 2.0096,{3. 2.Intelligence Engineering Lab,{2. of software chinese academy of sciences,beijing 100190,{3. 3.key {13. of Underwater Acoustic Signal Processing of Ministry of Education,Southeast University,Nanjing 2.0096,{3. 4 Nanjing Research {2. of Electronic Technology,Nanjing 2.0013.{3. 1. School of information Science and Engineering Southeast University Nanjing 210096 China4. Nanjing Research Institute of Electronic Technology Nanjing 210013 China2. Intelligence Engineering Lab Institute of Software Chinese Academy of Sciences Beijing 100190 China3. Key Laboratory of Underwater Acoustic Signal Processing of Ministry of Education Southeast University Nanjing 210096 China
CAMSHIFT algorithm and Comaniciu/Meer algorithm are two fundamental frameworks of mean shift procedure for video target *** paper generalizes the two well-known mean shift tracking algorithms,originally due to Bradski... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Robust Threshold Guillou-Quisquater Signature Scheme
Robust Threshold Guillou-Quisquater Signature Scheme
收藏 引用
The 1st chinese Conference on Trusted Computing and information {2.
作者: WANG Hong. ZHANG Zhen-feng, FENG Deng-guo State key laboratory of {2. {3. (Graduate School of chinese academy of sciences), beijing 10003., china State key laboratory of {2. {3. ({13. of software of chinese academy of sciences), beijing 100080, china
<正> The deficiencies of the first threshold Guillou-Quisquater signature scheme presented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng are analysised at first, and then a new threshold Guillou-Quisquater signat... 详细信息
来源: cnki会议 评论
PROOF OF CHABAUD AND VAUDENAY'S ALMOST BENT FUNCTIONS CONJECTURE
收藏 引用
Journal of Electronics(china) 1999年 第4期16卷 380-381页
作者: Feng Dengguo Wang Haibin(State key laboratory of {2. {3., Graduate School of USTC, beijing 10003.) (institute of software of chinese Academes of sciences, beijing 100080)
This paper proves that the conjecture of Chabaud and Vandenay(Proc. Euro-crypt’94) is right.
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论