咨询与建议

限定检索结果

文献类型

  • 403 篇 期刊文献
  • 113 篇 会议

馆藏范围

  • 516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 285 篇 工学
    • 44 篇 计算机科学与技术...
    • 44 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 32 篇 仪器科学与技术
    • 30 篇 材料科学与工程(可...
    • 28 篇 控制科学与工程
    • 23 篇 机械工程
    • 22 篇 测绘科学与技术
    • 21 篇 水利工程
    • 20 篇 地质资源与地质工...
    • 20 篇 环境科学与工程(可...
    • 19 篇 光学工程
    • 19 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 化学工程与技术
    • 16 篇 农业工程
  • 204 篇 理学
    • 47 篇 数学
    • 40 篇 生物学
    • 24 篇 大气科学
    • 21 篇 物理学
    • 16 篇 生态学
    • 14 篇 地球物理学
    • 13 篇 化学
    • 12 篇 地理学
    • 12 篇 地质学
  • 85 篇 农学
    • 36 篇 农业资源与环境
    • 18 篇 作物学
  • 31 篇 管理学
    • 21 篇 管理科学与工程(可...
  • 25 篇 医学
    • 16 篇 临床医学
  • 17 篇 军事学
    • 17 篇 军队指挥学
  • 7 篇 经济学
  • 3 篇 法学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 8 篇 and
  • 8 篇 quantum
  • 7 篇 cryptography
  • 7 篇 网络安全
  • 6 篇 中国
  • 6 篇 of
  • 5 篇 model
  • 5 篇 remote sensing
  • 5 篇 function
  • 5 篇 sharing
  • 5 篇 remote
  • 5 篇 development
  • 5 篇 secret
  • 4 篇 communication
  • 4 篇 information
  • 4 篇 threshold
  • 4 篇 stream cipher
  • 4 篇 计算机网络
  • 4 篇 provable securit...
  • 3 篇 optimization

机构

  • 32 篇 中国科学院大学
  • 16 篇 中国科学院研究生...
  • 8 篇 中国科学院地理科...
  • 8 篇 南京信息工程大学
  • 6 篇 中国科学院软件研...
  • 5 篇 shanghai
  • 5 篇 中国科学院研究生...
  • 5 篇 武汉大学
  • 4 篇 中国科学院山西煤...
  • 4 篇 中国科学院生态环...
  • 4 篇 山东科技大学
  • 4 篇 中国科学院信息安...
  • 4 篇 中国科学院地理科...
  • 4 篇 chinese acad sci...
  • 3 篇 中国科学院地球化...
  • 3 篇 中国科学院地质与...
  • 3 篇 state key labora...
  • 3 篇 中国科学院遥感与...
  • 3 篇 state key labora...
  • 3 篇 中科院研究生院信...

作者

  • 20 篇 china
  • 11 篇 chinese academy ...
  • 7 篇 冯登国
  • 6 篇 卿斯汉
  • 5 篇 beijing
  • 3 篇 2 graduate unive...
  • 3 篇 张碧江
  • 3 篇 高星
  • 3 篇 张济宇
  • 3 篇 3 school of scie...
  • 3 篇 张锴
  • 3 篇 王伟
  • 3 篇 查欣洁
  • 3 篇 xiang zhou
  • 3 篇 杨磊
  • 3 篇 xudong ma
  • 3 篇 yujie chen
  • 3 篇 吕述望
  • 3 篇 longxiang su
  • 3 篇 周永彬

语言

  • 345 篇 英文
  • 171 篇 中文
检索条件"作者=2.State Key Laboratory of Information Security, Graduate university of Chinese Academy of sciences, {12. 100049, china"
516 条 记 录,以下是31-40 订阅
排序:
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2,WEN QiaoYan3 & ZHANG Xing4,5 1 College of Computer Science and Technology,Beijing university of Technology,Beijing 100022,china 2.state key laboratory of information security (graduate university of the chinese academy of sciences),Beijing 100049,china 3 School of Science,Beijing university of Posts and Telecommunications,Beijing 100876,china 4 Institute of Electronic Technology,{12. Engineering university,Zhengzhou 450004,china 5 Trusted Computing laboratory,Beijing university of Technology,Beijing 100022,china College of Computer Science Technology Beijing University of Technology Beijing 100022 China state key laboratory of information security [graduate university of the chinese academy of sciences] Beijing 100049 China School of Science Beijing University of Posts Telecommunications Beijing 100876 China Institute of Electronic Technology Information Engineering University Zhengzhou 450004 China Trusted Computing laboratory Beijing University of Technology Beijing 100022 China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A construction of hyperbent functions with polynomial trace form
收藏 引用
Science china Mathematics 2011年 第10期54卷 2229-2234页
作者: CAO XiWang1,2,3,& HU Lei3 1Department of Mathematics,Nanjing university of Aeronautics and Astronautics,Nanjing 210016,china 2LMIB of Ministry of Education,Beijing university of Aeronautics and Astronautics,Beijing 100191,china 3state key laboratory of information security,graduate School of chinese academy of {12.,Beijing 100049,china 1. Department of Mathematics Nanjing University of Aeronautics and Astronautics Nanjing 210016 China2. LMIB of Ministry of Education Beijing University of Aeronautics and Astronautics Beijing 100191 China3. State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100049 China
This paper presents a construction of infinite classes of binary and p-ary hyperbent functions of polynomial trace form,based on finding a zero of a Kloosterman sum.
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A revision of Elaeagnus L. (Elaeagnaceae) in china's mainland
收藏 引用
Journal of Systematics and Evolution 2010年 第5期48卷 356-390页
作者: 1,2 Miao SUN 1Qi LIN 1(state key laboratory of Systematic and Evolutionary Botany,Institute of Botany,chinese academy of sciences,Beijing 100093,china) 2(graduate university of chinese academy of sciences,Beijing {12.,china)
A revision of Elaeagnus *** china’s mainland is provided based on field observations and herbarium ***-two morphological characters are selected and coded,then the matrix is prepared following cluster *** characters ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Modeling of Hillslope Runoff and Soil Erosion at Rainfall Events Using Cellular Automata Approach
收藏 引用
Pedosphere 2009年 第6期19卷 711-718页
作者: MA Ting ZHOU Cheng-Hu CAI Qiang-Guo state key laboratory of Resources and Environmental information System Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing 100101 (China) graduate university of the chinese academy of sciences Beijing 100049 (China)
A novel quantitative cellular automata (CA) model that simulates and predicts hillslope runoff and soil erosion caused by rainfall events was developed by integrating the local interaction rules and the hillslope surf... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Weight hierarchies of linear codes satisfying the Near-Chain condition
收藏 引用
Progress in Natural Science:Materials International 2005年 第9期15卷 784-792页
作者: LIU Zihui1** and CHEN Wende2(1. School of Mathematical sciences, Peking university, Beijing 100871, china 2. laboratory of Systems and Control and key state laboratory of information security, Institute of Systems Science, academy of Mathematics and Systems Science, chinese academy of sciences, Beijing 100080, china) School of Mathematical sciences Peking University Beijing 100871 China. laboratory of Systems and Control and key state laboratory of information security Institute of Systems Science Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing 100080 China
The weight hierarchies of a linear [n,k;q] code C satisfying the Near-Chain condition are studied, almost all the weight hierarchies of such code are determined.
来源: 同方期刊数据库 同方期刊数据库 评论
Accountable authority key policy attribute-based encryption
收藏 引用
Science china(information sciences) 2012年 第7期55卷 1631-1638页
作者: WANG YongTao 1,2 ,CHEN KeFei 1,3 ,LONG Yu 1,4 & LIU ZhaoHui 2 1 Department of Computer Science and Engineering,Shanghai Jiao Tong university,Shanghai 200240,china 2 china information Technology security Evaluation Center,Beijing 100085,china 3 Shanghai key laboratory of Scalable Computing and Systems,Shanghai Jiao Tong university,Shanghai,200240,china 4 state key laboratory of information security,graduate School of chinese academy of sciences,100039,china 1. Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China2. China Information Technology Security Evaluation Center Beijing 100085 China3. Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China4. State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100039 China
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable authori... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A property-based attestation protocol for TCM
收藏 引用
Science china(information sciences) 2010年 第3期53卷 454-464页
作者: FENG DengGuo1,2 & QIN Yu1,2 1state key laboratory of information security, Institute of Software, chinese academy of Science, Beijing 100190, china 2National Engineering Research Center of information security, Beijing 100190, china 1. state key laboratory of information security Institute of Software Chinese Academy of Science Beijing 100190 China2. National Engineering Research Center of Information Security Beijing 100190 China
This paper presents a property attestation protocol for the security chip TCM (trusted cryptographic module) via analyzing the problems of the current property attestation, which is built on the property attestation m... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research progress in terahertz quantum cascade lasers
收藏 引用
Science china(information sciences) 2012年 第1期55卷 16-26页
作者: CAO JunCheng key laboratory of Terahertz Solid-state Technology,Shanghai Institute of Microsystem and information Technology,chinese academy of sciences,Shanghai 200050,china 1. key laboratory of Terahertz Solid-state Technology Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai 200050 China
The terahertz(THz)quantum cascade laser(QCL)is a coherent THz source based on intersubband transitions of unipolar *** semiconductor lasers,THz QCLs are solid-state,electrically pumped,tunable,and can be easily *** pa... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
New application methods for word-oriented cryptographic primitives
收藏 引用
Science china(information sciences) 2012年 第9期55卷 2149-2160页
作者: YANG Yang 1,2,ZENG Guang 1,2,JIN ChengHui 1 & QU YunYing 1 1 Zhengzhou information Science and Technology Institute,Zhengzhou 450002,china 2.state key laboratory of information security,Institute of Software,chinese academy of sciences,Beijing 100190,china 1. Zhengzhou information Science and Technology Institute Zhengzhou 450002 China2. State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Modern software oriented symmetric ciphers have become a key feature in utilizing word-oriented cryptographic *** the output sequence,in the order of its generation,of a word-oriented cryptographic primitive in the sa... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Remote sensing based shrub above-ground biomass and carbon storage mapping in Mu Us desert,china
收藏 引用
Science china(Technological sciences) 2010年 第S1期53卷 176-183页
作者: XU Min 1,2,CAO ChunXiang 1,TONG QingXi 1,LI ZengYuan 3,ZHANG Hao 1,HE QiSheng 1,2,GAO MengXu 1,2,ZHAO Jian 1,2,ZHENG Sheng 1,2,CHEN Wei 1,2 & ZHENG LanFen 1 1state key laboratory of Remote Sensing Science,Jointly Sponsored by the Institute of Remote Sensing Applications of chinese academy of sciences and Beijing Normal university,Beijing 100101,china 2 graduate School of the chinese academy of sciences,Beijing {12.,china 3 Research Institute of Forest Resources and information Techniques,chinese academy of Forestry,Beijing 10009,china 1. state key laboratory of Remote Sensing Science Jointly Sponsored by the Institute of Remote Sensing Applications of Chinese Academy of Sciences and Beijing Normal University Beijing 100101 China 2. graduate School of the chinese academy of sciences Beijing 100049 China 3. Research Institute of Forest Resources and information Techniques Chinese Academy of Forestry Beijing 10009 China
The estimation of above-ground biomass(AGB) and carbon storage is very important for arid and semi-arid ***-1A/B satellite data combined with field measurement data was used for the estimation of shrub AGB and carbon ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论