咨询与建议

限定检索结果

文献类型

  • 767 篇 期刊文献
  • 208 篇 会议

馆藏范围

  • 975 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 759 篇 工学
    • 300 篇 计算机科学与技术...
    • 288 篇 网络空间安全
    • 98 篇 软件工程
    • 94 篇 信息与通信工程
    • 63 篇 仪器科学与技术
    • 57 篇 电子科学与技术(可...
    • 56 篇 机械工程
    • 40 篇 控制科学与工程
    • 19 篇 光学工程
    • 18 篇 电气工程
    • 13 篇 水利工程
    • 11 篇 农业工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 测绘科学与技术
    • 9 篇 地质资源与地质工...
    • 9 篇 交通运输工程
    • 8 篇 公安技术
  • 198 篇 理学
    • 117 篇 数学
    • 35 篇 物理学
    • 17 篇 系统科学
    • 9 篇 生态学
    • 7 篇 生物学
  • 140 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 12 篇 公共管理
  • 75 篇 军事学
    • 75 篇 军队指挥学
  • 31 篇 农学
    • 14 篇 农业资源与环境
    • 8 篇 作物学
  • 16 篇 医学
  • 15 篇 经济学
    • 14 篇 应用经济学
  • 13 篇 教育学
    • 9 篇 教育学
  • 12 篇 艺术学
    • 11 篇 设计学(可授艺术学...
  • 10 篇 法学
  • 1 篇 哲学
  • 1 篇 文学

主题

  • 39 篇 网络安全
  • 32 篇 信息安全
  • 24 篇 数字签名
  • 22 篇 密码学
  • 18 篇 cryptography
  • 18 篇 计算机网络
  • 15 篇 安全性
  • 15 篇 internet
  • 13 篇 quantum
  • 12 篇 安全
  • 12 篇 information secu...
  • 11 篇 security
  • 10 篇 密钥管理
  • 10 篇 入侵检测
  • 9 篇 secret
  • 9 篇 provable securit...
  • 8 篇 认证
  • 8 篇 sharing
  • 8 篇 椭圆曲线
  • 8 篇 数据库

机构

  • 46 篇 西安电子科技大学
  • 23 篇 中国科学院研究生...
  • 18 篇 北京邮电大学
  • 17 篇 中山大学
  • 16 篇 武汉大学
  • 15 篇 信息工程大学
  • 15 篇 中国科技大学
  • 14 篇 上海交通大学
  • 13 篇 中国科学技术大学
  • 12 篇 哈尔滨工业大学
  • 11 篇 山东大学
  • 11 篇 广东工业大学
  • 10 篇 华南师范大学
  • 10 篇 武警工程学院
  • 9 篇 南京大学
  • 8 篇 华中科技大学
  • 8 篇 华南理工大学
  • 7 篇 东南大学
  • 7 篇 电子科技大学
  • 6 篇 中国科学院大学

作者

  • 58 篇 china
  • 20 篇 吕述望
  • 13 篇 杨晓元
  • 13 篇 杨义先
  • 12 篇 冯登国
  • 12 篇 beijing
  • 9 篇 马建峰
  • 7 篇 方滨兴
  • 7 篇 胡铭曾
  • 7 篇 王育民
  • 7 篇 肖国镇
  • 7 篇 胡予濮
  • 6 篇 钮心忻
  • 5 篇 shanghai
  • 5 篇 王汝传
  • 5 篇 刘振华
  • 5 篇 谢立
  • 5 篇 云晓春
  • 5 篇 张焕国
  • 4 篇 孙锬锋

语言

  • 563 篇 中文
  • 412 篇 英文
检索条件"作者=2.Guangdong Key Laboratory of information Security Technology, guangzhou 5102.5,{4."
975 条 记 录,以下是51-60 订阅
排序:
A new one-bit diFFerence collision attack on HAVAL-128
收藏 引用
Science China(information Sciences) 2012年 第11期55卷 2521-2529页
作者: ZHANG WenYing1,2,3,LI YanYan1 & WU Lei1 1School of information Science and Engineering,Shandong Normal University,Jinan 250014.China 2State key Lab of information security,Institute of information Engineering,Chinese Academy of Sciences,Beijing 100093,China 3Shandong Provincial key {4. for Novel Distributed Computer Software technology,Jinan 250014.China 1. School of information Science and Engineering Shandong Normal University Jinan 250014 China2. State Key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China3. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Nondegenerative ML-sequences over ring Z/(2~e)
收藏 引用
Chinese Science Bulletin 1999年 第17期44卷 1557-1561页
作者: YANG Junhui and ZHAI QibinInstitute of Software , Chinese Academy of Sciences , Beijing 100080, China State key laboratory of information security , Beijing 100080, China Chinese Acad Sci Inst Software Beijing 100080 Peoples R China State key Lab Informat Secur Beijing 100080 Peoples R China
The so-called quasi-period of an ML-sequence has been introduced. It is noted that an ML-sequence may degenerate in the sense that it has the quasi-period shorter than its period, and the problem of constructing the n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
On an attack on RSA with small CRT-exponents
收藏 引用
Science China(information Sciences) 2010年 第8期53卷 1511-1518页
作者: HAN LiDong 1,2 , WANG XiaoYun 3 & XU GuangWu 3,4.1 key laboratory of Cryptologic technology and information {4., Ministry of Education, Shandong University, Jinan 250100, China 2 School of Mathematics, Shandong University, Jinan 250100, China 3 Institute for Advanced Study, Tsinghua University, Beijing 100084. China 4.Department of Electrical Engineering and Computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53201, USA 1. key laboratory of Cryptologic technology and information {4. Ministry of Education Shandong University Jinan 250100 China2. School of Mathematics Shandong University Jinan 250100 China3. Institute for Advanced Study Tsinghua University Beijing 100084 China4. Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee Milwaukee WI 53201 USA
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A class of binary cyclic codes with five weights
收藏 引用
Science China Mathematics 2010年 第12期53卷 3279-3286页
作者: LI ChunLei 1 , ZENG XiangYong 1, & HU Lei 2 1 Faculty of Mathematics and Computer Science, Hubei University, Wuhan 4.0062, China 2 The State key laboratory of information security, Graduate School of Chinese Academy of Sciences, Beijing 10004., China 1. Faculty of Mathematics and Computer Science Hubei University Wuhan 430062 China2. The State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100049 China
In this paper, the dual code of the binary cyclic code of length 2 n-1 with three zeros α, α t 1 and α t 2 is proven to have five nonzero Hamming weights in the case that n 4.is even and t1 = 2 n/2 + 1, t2 = 2 n-1-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A gain-flatness optimization solution for feedback technology of wideband low noise amplifiers
收藏 引用
Journal of Zhejiang University-Science C(Computers and Electronics) 2011年 第7期12卷 608-613页
作者: Zhen-hua LI,Bang-hong GUO,Zheng-jun WEI ,Song-hao LIU,Nan CHENG,Jin-dong WANG,Jian-jun GUO,Long YAN (key laboratory of Photonic information technology of {4. Higher Education Institutes,SIPSE & LQIT,South China Normal University,{4. 510006,China) key laboratory of Photonic information technology of {4. Higher Education Institutes SIPSE & LQIT South China Normal University
The S parameter expression of high-frequency models of the high electron mobility transistors (HEMTs) with basic feedback structure,especially the transmission gain S 21,is presented and *** addition,an improved feedb... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
RING PROXY SIGNATURES
收藏 引用
Journal of Electronics(China) 2008年 第1期25卷 108-114页
作者: Wei Baodian Zhang Fangguo Chen Xiaofeng Department of Electronics and Communication Engineering Sun Yat-Sen University Guangzhou 510275 China Department of Computer Science Sun Yat-Sen University Guangzhou 510275 China guangdong.key laboratory of information {4. {4. Guangzhou 510275 China
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Active constraints selection based semi-supervised dimensionality in ensemble subspaces
收藏 引用
Journal of Systems Engineering and Electronics 2015年 第5期26卷 1088-1099页
作者: Jie Zeng Wei Nie Yong Zhang College of information Engineering Shenzhen University Modern Communication and information Processing key laboratory Shenzhen University ATR key laboratory of National Defense technology Shenzhen University
Semi-supervised dimensionality reduction(SSDR) has attracted an increasing amount of attention in this big-data *** algorithms have been developed with a small number of pairwise constraints to achieve performances co... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The band structures of BSb and B_xGa_(1-x)Sb alloys
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2009年 第6期52卷 843-847页
作者: XIONG DePing1, ZHOU ShouLi2, WANG Qi3, LUO Li1, HUANG YongQing3 & REN XiaoMin3 1 School of Physics and Optoelectronic Engineering, guangdong University of technology, guangzhou 510006, China 2 College of information Engineering, Zhejiang University of technology, Hangzhou 310032, China 3 key laboratory of Optical Communication and Lightwave Technologies Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China 1. School of Physics and Optoelectronic Engineering Guangdong University of Technology Guangzhou 510006 China 2. College of information Engineering Zhejiang University of Technology Hangzhou 310032 China 3. key laboratory of Optical Communication and Lightwave Technologies Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China
The band structures of BSb and BxGa1-xSb alloys are studied using first-principles calculations in the generalized gradient approximation. By SQS-8 supercells to model a random alloy, the direct transition energy-gap ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science China(information Sciences) 2012年 第4期55卷 911-920页
作者: WANG Chao 1,ZHANG HuanGuo 2,3 & LIU LiLi 4.1 key Lab of Specialty Fiber Optics and Optical Access Network,Ministry of Education,Shanghai University,Shanghai 200072,China 2 Computer School of Wuhan University,Wuhan 4.0072,China 3 key laboratory of Aerospace information {4. and Trusted Computing Ministry of Education,Wuhan 4.0072,China 4.Huawei Technologies CO.LTD.,Shanghai 201206,China 1. key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Shanghai 200072 China2. Computer School of Wuhan University Wuhan 430072 China3. Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 China4. Huawei Technologies CO. LTD. Shanghai 201206 China
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher security elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Round-optimal zero-knowledge proofs of knowledge for NP
收藏 引用
Science China(information Sciences) 2012年 第11期55卷 2473-2484页
作者: LI HongDa1,FENG DengGuo2,LI Bao1 & XUE HaiXia1 1State key Lab of information security,Graduate University of Chinese Academy of Sciences,Beijing 10004.,China 2State key Lab of information security,Institute of software of Chinese Academy of Sciences,Beijing 100080,China 1. State key Lab of information security Graduate University of Chinese Academy of Sciences Beijing 100049 China2. State Key Lab of Information Security Institute of software of Chinese Academy of Sciences Beijing 100080 China
It is well known that all the known black-box zero-knowledge proofs of knowledge for NP are *** there exit constant-round black-box zero-knowledge proofs of knowledge for all NP languages under certain standard assump... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论