咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 5 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 2 篇 机械工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 信息与通信工程
    • 1 篇 地质资源与地质工...
    • 1 篇 矿业工程
    • 1 篇 交通运输工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 地球物理学

主题

  • 1 篇 data stream clus...
  • 1 篇 reconstruction
  • 1 篇 homomorphic encr...
  • 1 篇 height
  • 1 篇 equivalent
  • 1 篇 all-or-nothing t...
  • 1 篇 algorithms
  • 1 篇 pda终端
  • 1 篇 智能电网
  • 1 篇 energy comparing
  • 1 篇 secure network c...
  • 1 篇 可信计算
  • 1 篇 纹理特征
  • 1 篇 traffic identifi...
  • 1 篇 geohazard
  • 1 篇 认证协议
  • 1 篇 digital rights m...
  • 1 篇 desktop virtuali...
  • 1 篇 convolutional ne...
  • 1 篇 密钥管理

机构

  • 1 篇 national enginee...
  • 1 篇 国网湖北省电力有...
  • 1 篇 college of infor...
  • 1 篇 state key labora...
  • 1 篇 信息网络安全公安...
  • 1 篇 national enginee...
  • 1 篇 NOT FOUND
  • 1 篇 information secu...
  • 1 篇 NOT FOUND
  • 1 篇 NOT FOUND
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 北京邮电大学
  • 1 篇 school of comput...
  • 1 篇 information secu...
  • 1 篇 武汉大学

作者

  • 2 篇 beijing universi...
  • 1 篇 xiao da
  • 1 篇 china 3 beijing ...
  • 1 篇 张维纬
  • 1 篇 3) 1national eng...
  • 1 篇 cheng mingzhi
  • 1 篇 beijing universi...
  • 1 篇 state key labora...
  • 1 篇 liu bohuai
  • 1 篇 zhengming hu 1 1...
  • 1 篇 2. jiangsu key l...
  • 1 篇 张茹
  • 1 篇 xiao lim in
  • 1 篇 beijing universi...
  • 1 篇 jianfen peng~(1
  • 1 篇 zhu mingfa
  • 1 篇 2 key laboratory...
  • 1 篇 3national engine...
  • 1 篇 yang xin 1
  • 1 篇 huang qinlong

语言

  • 6 篇 英文
  • 5 篇 中文
检索条件"作者=2.3. {3. engineering Laboratory for disaster backup and recovery"
11 条 记 录,以下是1-10 订阅
排序:
Secure network coding in the presence of eavesdroppers
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2.3. YANG YiXian1,2.3. WANG LiCheng1,2.3.& NIU XinXin1,2.3.1Information Security Center, State Key laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China 2Key laboratory of Network and Information Attack and Defence Technology of MOE, Beijing University of Posts and Telecommunications, Beijing 100876, China 3.ational engineering laboratory for disaster backup and recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Subsidence control and farmland conservation by solid backfilling mining technology
收藏 引用
中国有色金属学会会刊:英文版 2011年 第S3期21卷 665-669页
作者: GUO Guang-li1, 2, FENG Wen-kai3. ZHA Jian-feng1, 2, 3. LIU Yuan-xu1, 2, WANG Qiang1, 2 1. Key laboratory for Land Environment and disaster Monitoring of the State Bureau of Surveying and Mapping, China University of Mining and Technology, Xuzhou 221116, China 2. Jiangsu Key laboratory of Resources and Environmental Information {3., China University of Mining and Technology, Xuzhou 221116, China 3. State Key laboratory of Geohazard Prevention and Geoenvironment Protection, Chengdu University of Technology, Chengdu 610059, China [a] Key laboratory for Land Environment and disaster Monitoring of the State Bureau of Surveying and Mapping China University of Mining and Technology Xuzhou 221116 China [b] Jiangsu Key laboratory of Resources and Environmental Information engineering China University of Mining and Technology Xuzhou 221116 China [c] State Key laboratory of Geohazard Prevention and Geoenvironment Protection Chengdu University of Technology Chengdu 610059 China
Solid backfilling mining technology, which decreases the height of fissure zone and caving zone, and alleviates the subsidence, is a new technology for farmland conservation. Based on the situation analysis of farmlan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing
收藏 引用
China Communications 2014年 第4期11卷 50-63页
作者: HUANG Qinlong Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China National engineering laboratory for disaster {3. and recovery Beijing University of Posts and Telecommunications Beijing 100876 China
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption ***,these schemes suffer from inefficiency and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
CYCLIC REDUNDANCY CODE CHECK ALGORITHM BASED ON SMALL LOOKUP TABLE
CYCLIC REDUNDANCY CODE CHECK ALGORITHM BASED ON SMALL LOOKUP...
收藏 引用
2009 IEEE International Conference on Communication Technology and Applications(ICCTA2009)
作者: Jianfen Peng~(1 2.3. Yajian Zhou~(1 2.3. Yixian Yang~(1 2.3. 1National {3. laboratory for disaster backup and recovery Beijing University of Posts and Telecommunications 2Information Security Center State Key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications 3.ey laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications
<正>Real time and low occupation of memory must be satisfied in the error controlling of computer *** redundancy code Generation algorithm based on small lookup table(CRCGA) is presented in this paper,which is bas... 详细信息
来源: cnki会议 评论
Construction of Convolutional Network Coding for Cyclic Multicast Networks
Construction of Convolutional Network Coding for Cyclic Mult...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Qin Guo~(1,2.3.,Mingxing Luo~(1,2.3.,Lixiang Li~(1,2.3.,Licheng Wang~(1,2.3.,Yixian Yang~(1,2.3. 1 Information Security Center,State Key laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications,Beijing 100876,China 2 Key laboratory of Network and Information Attack and Defence Technology of MOE, Beijing University of Posts and Telecommunications,Beijing 100876,China 3.National engineering laboratory for disaster backup and recovery, Beijing University of Posts and Telecommunications,Beijing 100876,China.
<正>In this paper,we present a practical algorithm to construct the convolutional multicast network coding over any finite directed cyclic *** dual line graph of a directed cyclic graph is considered as a *** regard... 详细信息
来源: cnki会议 评论
DYNAMIC ONLINE TRAFFIC IDENTIFICATION SCHEME BASED ON DATA STREAM CLUSTERING ALGORITHM
DYNAMIC ONLINE TRAFFIC IDENTIFICATION SCHEME BASED ON DATA S...
收藏 引用
2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
作者: Dan Li 1 2.3.Xiaobo Xu 1 2 Yang Xin 1 2 Zhengming Hu 1 1 Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China 2 National engineering laboratory for {3. backup and recovery Beijing 100876 China 3.Beijing Safe-Code Technology Co.Ltd. Beijing 100876 China
Although researches on network traffic identification have already got some achievements, but most of them are not suitable for online traffic classification by considered the dynamic feature of *** this paper,we prop... 详细信息
来源: cnki会议 评论
基于纹理特征的H.264/AVC顽健视频水印算法
收藏 引用
通信学报 2012年 第3期33卷 82-89页
作者: 张维纬 张茹 刘建毅 钮心忻 杨义先 北京邮电大学信息安全中心 北京100876 北京邮电大学灾备技术国家工程实验室 北京100876 信息网络安全公安部重点实验室(公安部第三研究所) 上海201204
在分析现有视频水印算法的基础上,结合H.264压缩编码标准的特性,提出了一种新的基于纹理特征的视频顽健水印算法。算法先对当前帧4×4块进行整数离散余弦变换,判断其是否是纹理块,再采用能量差的方式自适应选择系数嵌入水印。实验结果表... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Audio Zero-Watermark Scheme Based on Energy Comparing
收藏 引用
China Communications 2014年 第7期11卷 110-116页
作者: YANG Yu LEI Min CHENG Mingzhi LIU Bohuai LIN Guoyuan XIAO Da Information Security Center Beijing University of Posts and Telecommunications Beijing China College of Information engineering Beijing Institute of Graphic Communication Beijing China National engineering laboratory for disaster {3. and recovery Beijing China School of Computer Science and Technology China University of Mining and Technology China
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of ***,there is little research on audio *** paper proposes an audio zero-watermark scheme base... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Geo-engineering Lessons Learned from the 2008 Wenchuan Earthquake in Sichuan and Their Significance to Reconstruction
收藏 引用
Journal of Mountain Science 2011年 第2期8卷 176-189页
作者: HUANG Runqiu State Key laboratory of Geohazard Prevention and Geoenvironment Protection Chengdu University of Technology Chengdu 610059 Sichuan China
The 2008 Wenchuan earthquake in Sichuan of China was the result of quake-triggering along an active several hundred-kilometer-long fault. The subsequent landslides and debris flow geohazards are dominating factors in ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Content Addressable Storage Optimization for Desktop Virtualization Based disaster backup Storage System
收藏 引用
China Communications 2012年 第7期9卷 1-13页
作者: Ruan Li Xiao Lim in Zhu Mingfa State Key laboratory of Software Development Environment Beijing 100191 P. R. China School of Computer Science and engineering Beihang University Beijing 100191 P. R. China
This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by em... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论