咨询与建议

限定检索结果

文献类型

  • 767 篇 期刊文献
  • 208 篇 会议

馆藏范围

  • 975 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 759 篇 工学
    • 300 篇 计算机科学与技术...
    • 288 篇 网络空间安全
    • 98 篇 软件工程
    • 94 篇 信息与通信工程
    • 63 篇 仪器科学与技术
    • 57 篇 电子科学与技术(可...
    • 56 篇 机械工程
    • 40 篇 控制科学与工程
    • 19 篇 光学工程
    • 18 篇 电气工程
    • 13 篇 水利工程
    • 11 篇 农业工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 测绘科学与技术
    • 9 篇 地质资源与地质工...
    • 9 篇 交通运输工程
    • 8 篇 公安技术
  • 198 篇 理学
    • 117 篇 数学
    • 35 篇 物理学
    • 17 篇 系统科学
    • 9 篇 生态学
    • 7 篇 生物学
  • 140 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 12 篇 公共管理
  • 75 篇 军事学
    • 75 篇 军队指挥学
  • 31 篇 农学
    • 14 篇 农业资源与环境
    • 8 篇 作物学
  • 16 篇 医学
  • 15 篇 经济学
    • 14 篇 应用经济学
  • 13 篇 教育学
    • 9 篇 教育学
  • 12 篇 艺术学
    • 11 篇 设计学(可授艺术学...
  • 10 篇 法学
  • 1 篇 哲学
  • 1 篇 文学

主题

  • 39 篇 网络安全
  • 32 篇 信息安全
  • 24 篇 数字签名
  • 22 篇 密码学
  • 18 篇 cryptography
  • 18 篇 计算机网络
  • 15 篇 安全性
  • 15 篇 internet
  • 13 篇 quantum
  • 12 篇 安全
  • 12 篇 information secu...
  • 11 篇 security
  • 10 篇 密钥管理
  • 10 篇 入侵检测
  • 9 篇 secret
  • 9 篇 provable securit...
  • 8 篇 认证
  • 8 篇 sharing
  • 8 篇 椭圆曲线
  • 8 篇 数据库

机构

  • 46 篇 西安电子科技大学
  • 23 篇 中国科学院研究生...
  • 18 篇 北京邮电大学
  • 17 篇 中山大学
  • 16 篇 武汉大学
  • 15 篇 信息工程大学
  • 15 篇 中国科技大学
  • 14 篇 上海交通大学
  • 13 篇 中国科学技术大学
  • 12 篇 哈尔滨工业大学
  • 11 篇 山东大学
  • 11 篇 广东工业大学
  • 10 篇 华南师范大学
  • 10 篇 武警工程学院
  • 9 篇 南京大学
  • 8 篇 华中科技大学
  • 8 篇 华南理工大学
  • 7 篇 东南大学
  • 7 篇 电子科技大学
  • 6 篇 中国科学院大学

作者

  • 58 篇 china
  • 20 篇 吕述望
  • 13 篇 杨晓元
  • 13 篇 杨义先
  • 12 篇 冯登国
  • 12 篇 beijing
  • 9 篇 马建峰
  • 7 篇 方滨兴
  • 7 篇 胡铭曾
  • 7 篇 王育民
  • 7 篇 肖国镇
  • 7 篇 胡予濮
  • 6 篇 钮心忻
  • 5 篇 shanghai
  • 5 篇 王汝传
  • 5 篇 刘振华
  • 5 篇 谢立
  • 5 篇 云晓春
  • 5 篇 张焕国
  • 4 篇 孙锬锋

语言

  • 563 篇 中文
  • 412 篇 英文
检索条件"作者=2.Guangdong Key Laboratory of information Security Technology, guangzhou 5102.5,{4."
975 条 记 录,以下是41-50 订阅
排序:
A two-round honest-verifier zero-knowledge protocol
收藏 引用
Science China(information Sciences) 2010年 第5期53卷 954-963页
作者: LIU HanWu 1,2 & LIN DongDai 1 1 The State key laboratory of information security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China 2 Graduate University of the Chinese Academy of Sciences, Beijing 10004., China 1. The State key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing 100190 China2. Graduate University of the Chinese Academy of Sciences Beijing 100049 China
Since the concept of zero-knowledge protocols was introduced, it has attracted a lot of attention and in turn showed significant effect on the development of cryptography, complexity theory and other areas. The round ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Design theory and method of multivariate hash function
收藏 引用
Science China(information Sciences) 2010年 第10期53卷 1977-1987页
作者: WANG HouZhen 1,2 , ZHANG HuanGuo 1 , WU QianHong 1 , ZHANG Yu 1 , LI ChunLei 1 & ZHANG XinYu 1 1 The key laboratory of Aerospace information security and Trusted Computing, Ministry of Education, School of Computer, Wuhan University, Wuhan 4.0072, China 2 key laboratory of Mathematics Mechanization, Beijing 100080, China 1. The key laboratory of Aerospace information security and Trusted Computing Ministry of Education School of Computer Wuhan University Wuhan 430072 China2. Key Laboratory of Mathematics Mechanization Beijing 100080 China
This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the curren... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Paillier's trapdoor function hides Θ(n) bits
收藏 引用
Science China(information Sciences) 2011年 第9期54卷 1827-1836页
作者: SU Dong & Lü KeWei State key laboratory of information security,Graduate University of Chinese Academy of Sciences,Beijing 10004.,China 1. State key laboratory of information security Graduate University of Chinese Academy of Sciences Beijing 100049 China
In this paper,we re-examine the bit security of Paillier’s trapdoor *** show that given a random w=gcyN mod N2 ∈ZN2* the most significant bit of its class c is a hard-core predicate,under a standard assumption that ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Conjugate adjoining problem in braid groups and new design of braid-based signatures
收藏 引用
Science China(information Sciences) 2010年 第3期53卷 524-536页
作者: WANG LiCheng1,2, WANG LiHua2, CAO ZhenFu3, YANG YiXian1 & NIU XinXin1 information security Center, State key laboratory of Networking and Switching {4., Beijing University of Posts and Telecommunications, Beijing 100876, China 2National Institute of information and Communications {4., Tokyo 184.8795, Japan 3Trusted Digital {4. laboratory, Shanghai Jiao Tong University, Shanghai 20024., China 1. information security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. National Institute of Information and Communications Technology Tokyo 184-8795 Japan3. Trusted Digital Technology Laboratory Shanghai Jiao Tong University Shanghai 200240 China
The development of quantum computation casts serious threats to the securities of most existing public-key cryptosystems. Braid-based cryptography is one of the alternatives that have potential advantages in resisting... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
On the number of rotation symmetric Boolean functions
收藏 引用
Science China(information Sciences) 2010年 第3期53卷 537-545页
作者: FU ShaoJing1, LI Chao1,2 & QU LongJiang1,3 1Science College of National University of Defense technology, Changsha 4.0073, China 2State key laboratory of information {4., Beijing 100039, China 3National Mobile Communications Research laboratory, Southeast University, Nanjing 210096, China 1. Science College of National University of Defense technology Changsha 410073 China2. State Key Laboratory of Information Security Beijing 100039 China3. National Mobile Communications Research Laboratory Southeast University Nanjing 210096 China
Rotation symmetric Boolean functions (RSBFs) have been used as components of different cryptosystems. This class of functions are invariant under circular translation of indices. In this paper, we investigated balance... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Capability of evolutionary cryptosystems against differential cryptanalysis
收藏 引用
Science China(information Sciences) 2011年 第10期54卷 1991-2000页
作者: ZHANG HuanGuo 1,2 ,LI ChunLei 1,2 & TANG Ming 1,2 1 School of Computer,Wuhan University,Wuhan 4.0072,China 2 key laboratory of Aerospace information security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 4.0072,China 1. School of Computer Wuhan University Wuhan 430072 China2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education Wuhan University Wuhan 430072 China
The evolutionary cryptosystem is a new *** paper studies its security level resisting against differential *** is shown that the evolutionary cryptosystem possesses higher resistance than its initial fixed cryptosyste... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Evolutionary cryptography against multidimensional linear cryptanalysis
收藏 引用
Science China(information Sciences) 2011年 第12期54卷 2585-2597页
作者: ZHANG HuanGuo 1,2 , LI ChunLei 1,2 & TANG Ming 1,2 1 School of Computer, Wuhan University, Wuhan 4.0079, China 2 key laboratory of Aerospace information security and Trusted Computing of Ministry of Education of China, Wuhan University, Wuhan 4.0079, China 1. School of Computer Wuhan University Wuhan 430079 China2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education of China Wuhan University Wuhan 430079 China
The evolutionary cryptosystem is a new cryptosystem proposed by a Chinese researcher recently. This paper studies its security level resisting against multidimensional linear cryptanalysis in this paper. It is shown t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Competent predicate abstraction in model checking
收藏 引用
Science China(information Sciences) 2011年 第2期54卷 258-267页
作者: LI Li1,2,3, SONG XiaoYu4. GU Ming2,3 & LUO XiangYu2,3 1Department of Computer Science & technology, Tsinghua University, Beijing 100084. China 2key laboratory for information System {4., Ministry of Education of China, Beijing 100084. China 3School of Software, Tsinghua University, Beijing 100084. China 4.epartment of ECE, Portland State University, Portland, Oregon 97207, USA 1. Department of Computer Science & technology Tsinghua University Beijing 100084 China2. Key Laboratory for Information System Security Ministry of Education of China Beijing 100084 China3. School of Software Tsinghua University Beijing 100084 China4. Department of ECE Portland State University Portland Oregon 97207 USA
The paper presents a new approach to computing the abstract state and a maximum weight heuristic method for finding the shortest counter-example in verification of imperative programs. The strategy is incorporated in ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamic tree-based authenticated group key exchange protocol
收藏 引用
Science China(information Sciences) 2010年 第8期53卷 1591-1602页
作者: LI Hui 1,2 , WU ChuanKun 1 & TENG JiKai 1,2 1 State key laboratory of information security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China 2 Graduate University of Chinese Academy of Sciences, Beijing 10004., China 1. State key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing 100190 China2. Graduate University of Chinese Academy of Sciences Beijing 100049 China
Authenticated group key exchange protocols allow a group of users over a public network to establish a shared secret key for the subsequent cryptographic goals. In this paper, we extend BD-II scheme into a dynamic set... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Power functions with low uniformity on odd characteristic finite fields
收藏 引用
Science China Mathematics 2010年 第8期53卷 1931-1940页
作者: ZHA ZhengBang 1,3 & WANG XueLi 2 1 School of Mathematical Sciences,Luoyang Normal University,Luoyang 4.1022,China 2 School of Mathematical Sciences,South China Normal University,guangzhou 510631,China 3 State key laboratory of information {4.,Graduate University of Chinese Academy of Sciences,Beijing 10004.,China 1. School of Mathematical Sciences Luoyang Normal University Luoyang 471022 China3. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China2. School of Mathematical Sciences South China Normal University Guangzhou 510631 China
In this paper,we give some new low differential uniformity of some power functions defined on finite fields with odd *** corollaries of the uniformity,we obtain two families of almost perfect nonlinear functions in GF... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论