咨询与建议

限定检索结果

文献类型

  • 435 篇 期刊文献
  • 217 篇 会议

馆藏范围

  • 652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 95 篇 网络空间安全
    • 91 篇 计算机科学与技术...
    • 47 篇 仪器科学与技术
    • 42 篇 控制科学与工程
    • 41 篇 信息与通信工程
    • 40 篇 机械工程
    • 36 篇 软件工程
    • 34 篇 电子科学与技术(可...
    • 22 篇 地质资源与地质工...
    • 20 篇 测绘科学与技术
    • 19 篇 光学工程
    • 18 篇 环境科学与工程(可...
    • 17 篇 材料科学与工程(可...
    • 16 篇 农业工程
    • 14 篇 化学工程与技术
    • 13 篇 电气工程
  • 222 篇 理学
    • 72 篇 数学
    • 30 篇 生物学
    • 23 篇 物理学
    • 22 篇 大气科学
    • 21 篇 系统科学
    • 15 篇 生态学
    • 14 篇 地理学
    • 14 篇 地球物理学
  • 71 篇 农学
    • 32 篇 农业资源与环境
    • 14 篇 作物学
  • 52 篇 管理学
    • 37 篇 管理科学与工程(可...
  • 33 篇 军事学
    • 33 篇 军队指挥学
  • 28 篇 医学
    • 16 篇 临床医学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 法学
  • 5 篇 教育学
  • 5 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 9 篇 cryptography
  • 9 篇 网络安全
  • 9 篇 quantum
  • 8 篇 of
  • 7 篇 密码学
  • 7 篇 model
  • 6 篇 and
  • 6 篇 sharing
  • 6 篇 authentication
  • 6 篇 计算机网络
  • 6 篇 信息安全
  • 5 篇 remote sensing
  • 5 篇 gis
  • 5 篇 function
  • 5 篇 密码协议
  • 5 篇 security
  • 5 篇 secret
  • 5 篇 provable securit...
  • 4 篇 数字签名
  • 4 篇 bent函数

机构

  • 32 篇 中国科学院大学
  • 22 篇 中国科学院研究生...
  • 13 篇 中国科技大学
  • 12 篇 graduate univers...
  • 10 篇 state key labora...
  • 10 篇 中国科学技术大学
  • 9 篇 中国科学院地理科...
  • 9 篇 南京信息工程大学
  • 9 篇 北京邮电大学
  • 8 篇 state key labora...
  • 8 篇 清华大学
  • 7 篇 college of compu...
  • 6 篇 中国科学院研究生...
  • 6 篇 中国科学院软件研...
  • 5 篇 信息安全国家重点...
  • 5 篇 成都信息工程大学
  • 5 篇 school of scienc...
  • 5 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 中国科学院生态环...

作者

  • 64 篇 china
  • 18 篇 吕述望
  • 18 篇 beijing
  • 12 篇 冯登国
  • 9 篇 chinese academy ...
  • 8 篇 杨义先
  • 6 篇 卿斯汉
  • 5 篇 shanghai
  • 5 篇 beijing universi...
  • 5 篇 黄清麟
  • 4 篇 刘振华
  • 4 篇 beijing jiaotong...
  • 4 篇 钮心忻
  • 3 篇 2 graduate unive...
  • 3 篇 高星
  • 3 篇 王汝传
  • 3 篇 zhengzhou
  • 3 篇 左英男
  • 3 篇 3 school of scie...
  • 3 篇 hefei

语言

  • 448 篇 英文
  • 204 篇 中文
检索条件"作者=2.State Key Laboratory of Information Security, graduate university of the Chinese Academy of Sciences, beijing 100049, china"
652 条 记 录,以下是91-100 订阅
排序:
Polar differential power attacks and evaluation
收藏 引用
Science china(information sciences) 2012年 第7期55卷 1588-1604页
作者: TANG Ming 1 ,QIU ZhenLong 1 ,GAO Si 1,2 ,YI Mu 3 ,LIU ShuBo 1 ,ZHANG HuanGuo 1 & JIN YingZhen 1 1 School of Computer Science,Wuhan university,Wuhan 430072,china 2.state key laboratory of information security,Institute of Software,chinese academy of sciences,beijing 100190,china 3 Centre for Computer and information security Research School of Computer Science and Software Engineering university of Wollongong,Wollongong,NSW 2522,Australia School of Computer Science Wuhan University Wuhan China state key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing China Centre for Computer and information security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system *** existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implem... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Topography and functional information of plasma membrane
收藏 引用
Science china(Life sciences) 2008年 第2期51卷 95-103页
作者: SUN DeLan1, CHEN JianMin1, SONG YanMei1, ZHU ChuanFeng2, PAN GeBo2 & WAN LiJun2 1 key laboratory of Photosynthesis and Environmental Molecular Physiology, Institute of Botany, chinese academy of sciences, beijing 100093, china 2 Institute of Chemistry, chinese academy of sciences, beijing 100080, china key laboratory of Photosynthesis and Environmental Molecular Physiology Institute of Botany Chinese Academy of Sciences Beijing China Institute of Chemistry Chinese Academy of Sciences Beijing China
By using atomic force microscope (AFM), the topography and function of the plasmalemma surface of the isolated protoplasts from winter wheat mesophyll cells were observed, and compared with dead protoplasts induced by... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Algebraic Attack on Filter-Combiner Model keystream Generators
收藏 引用
Wuhan university Journal of Natural sciences 2005年 第1期10卷 259-262页
作者: WUZhi-ping YEDing-feng MAWei-ju statekeylaboratoryofinformationsecuritygraduateSchoolofchineseacademyofsciences Beijing100039China
Algebraic attack was applied to attack Filter-Combintr model keystreamgenerators. We proposed the technique of function composition to improve the model, and the improvedmodel can resist the algebraic attack. A new cr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Spatial pattern of land cover change in china's semiarid environment
收藏 引用
Journal of Arid Land 2009年 第1期1卷 16-25页
作者: BaoLin LI1 and QiMing ZHOU2 1 state key laboratory of Environment and Resources information System, Institute of Geographical sciences and Resources Research, chinese academy of sciences, beijing 100101, china 2 Department of Geography, Hong Kong Baptist university, Kowloon Tong, Hong Kong, china state key laboratory of Environment and Resources information System Institute of Geographical Sciences and Resources Research Chinese Academy of Sciences Beijing 100101 China Department of Geography Hong Kong Baptist University Kowloon Tong Hong Kong
This study seeks a routine to quantify spatial pattern of land cover changes in semiarid environment of china based on post-classification comparison method. The method consists of three major steps: (1) the image cla... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
Science china(information sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1information security Center, state key laboratory of Networking and Switching Technology, beijing university of Posts and Telecommunications, beijing 100876, china 2key laboratory of Network and information Attack and Defence Technology of MOE, beijing university of Posts and Telecommunications, beijing 100876, china 3National Engineering laboratory for Disaster Backup and Recovery, beijing university of Posts and Telecommunications, beijing 100876, china information security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China key laboratory of Network and information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A particle-based method for granular flow simulation
收藏 引用
Science china(information sciences) 2012年 第5期55卷 1062-1072页
作者: CHANG YuanZhang 1,BAO Kai 2,3,ZHU Jian 1 & WU EnHua 1,2 1 Department of Computer and information Science,university of Macau,Macao,china 2.state key laboratory of Computer Science,Institute of Software,chinese academy of sciences,beijing 100190,china 3 Division of Mathematical and Computer sciences & Engineering,KAUST,Thuwal,Saudi Arabia Department of Computer and information Science University of Macau Macao China state key laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Division of Mathematical and Computer sciences & Engineering KAUST Thuwal Saudi Arabia
We present a new particle-based method for granular flow *** the method,a new elastic stress term,which is derived from a modified form of the Hooke's law,is included in the momentum governing equation to handle the f... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threat and management strategies of potentially invasive insects in china
收藏 引用
Science china(Life sciences) 2009年 第10期52卷 903-910页
作者: ZHANG RunZhi1, ZHANG YaPing2 & JIANG YouXu3 1 state key laboratory of Integrated Management of Pest Insects and Rodents in Agriculture, Institute of Zoology, chinese academy of sciences, beijing 100101, china 2 Kunming Institute of Zoology, chinese academy of sciences, Yunnan, 650223, china 3 The Research Institute of Forest Ecology, Environment and Protection, The chinese academy of Forestry, beijing 100091, china state key laboratory of Integrated Management of Pest Insects and Rodents in Agriculture Institute of Zoology Chinese Academy of Sciences Beijing China Kunming Institute of Zoology Chinese Academy of Sciences Yunnan China The Research Institute of Forest Ecology Environment and Protection The Chinese Academy of Forestry Beijing China
The Global Invasive Species Database, GISD, comprises 27 species of the most significant invasive alien insects in the world (through November, 2005), 6 of which are originally native to china, 11 are established in C... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states
收藏 引用
chinese Physics B 2015年 第5期24卷 231-238页
作者: 徐淑奖 陈秀波 王连海 钮心忻 杨义先 Shandong Provincial key laboratory of Computer Networks Shandong Computer Science Center (National Supercomputer Center in Jinan) information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications state key laboratory of information security Institute of Information Engineering Chinese Academy of Sciences
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Capability description and discovery of Internetware entity
收藏 引用
Science china(information sciences) 2010年 第4期53卷 685-703页
作者: WANG PuWei1*, JIN Zhi2,3* & LIU HongYan4 1key laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education, Renmin university of china, beijing 100872, china 2key laboratory of High Confidence Software Technologies of the Ministry of Education, Peking university, beijing 100871, china 3academy of Mathematics and System sciences, chinese academy of sciences, beijing 100190, china 4Department of Management Science and Engineering, Tsinghua university, beijing 100084, china key laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China Beijing China key laboratory of High Confidence Software Technologies of the Ministry of Education Peking University Beijing China academy of Mathematics and System sciences Chinese Academy of Sciences Beijing China Department of Management Science and Engineering Tsinghua University Beijing China
Internetware can be formed through aggregation of Internetware entities bottom-up to satisfy the user's requirements. In the process, capability description of Internetware entity plays an important role. This paper p... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Differential Hydrological Grey Model (DHGM) with self-memory function and its application to flood forecasting
收藏 引用
Science china(Technological sciences) 2009年 第4期52卷 1039-1049页
作者: CHEN XiangDong1, XIA Jun1,2 & XU Qian3 1 key laboratory of Water Cycle and Related Land Surface Processes, Institute of Geographic sciences and Natural Resources Research, chinese academy of sciences, beijing 100101, china 2.state key laboratory of Water Resources and Hydropower Engineering Science, Wuhan university, Wuhan 430072, china 3 School of Hydrology and Water Resources, Hohai university, Nanjing 210098, china key laboratory of Water Cycle and Related Land Surface Processes Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing China state key laboratory of Water Resources and Hydropower Engineering Science Wuhan University Wuhan China School of Hydrology and Water Resources Hohai University Nanjing China
This paper addresses a problem of flood forecasting with the self-memory function. Considering flood forecasting’s uncertainty and updating demand, a hybrid hydrological model, namely Differential Hy- drological Grey... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论