咨询与建议

限定检索结果

文献类型

  • 435 篇 期刊文献
  • 217 篇 会议

馆藏范围

  • 652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 95 篇 网络空间安全
    • 91 篇 计算机科学与技术...
    • 47 篇 仪器科学与技术
    • 42 篇 控制科学与工程
    • 41 篇 信息与通信工程
    • 40 篇 机械工程
    • 36 篇 软件工程
    • 34 篇 电子科学与技术(可...
    • 22 篇 地质资源与地质工...
    • 20 篇 测绘科学与技术
    • 19 篇 光学工程
    • 18 篇 环境科学与工程(可...
    • 17 篇 材料科学与工程(可...
    • 16 篇 农业工程
    • 14 篇 化学工程与技术
    • 13 篇 电气工程
  • 222 篇 理学
    • 72 篇 数学
    • 30 篇 生物学
    • 23 篇 物理学
    • 22 篇 大气科学
    • 21 篇 系统科学
    • 15 篇 生态学
    • 14 篇 地理学
    • 14 篇 地球物理学
  • 71 篇 农学
    • 32 篇 农业资源与环境
    • 14 篇 作物学
  • 52 篇 管理学
    • 37 篇 管理科学与工程(可...
  • 33 篇 军事学
    • 33 篇 军队指挥学
  • 28 篇 医学
    • 16 篇 临床医学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 法学
  • 5 篇 教育学
  • 5 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 9 篇 cryptography
  • 9 篇 网络安全
  • 9 篇 quantum
  • 8 篇 of
  • 7 篇 密码学
  • 7 篇 model
  • 6 篇 and
  • 6 篇 sharing
  • 6 篇 authentication
  • 6 篇 计算机网络
  • 6 篇 信息安全
  • 5 篇 remote sensing
  • 5 篇 gis
  • 5 篇 function
  • 5 篇 密码协议
  • 5 篇 security
  • 5 篇 secret
  • 5 篇 provable securit...
  • 4 篇 数字签名
  • 4 篇 bent函数

机构

  • 32 篇 中国科学院大学
  • 22 篇 中国科学院研究生...
  • 13 篇 中国科技大学
  • 12 篇 graduate univers...
  • 10 篇 state key labora...
  • 10 篇 中国科学技术大学
  • 9 篇 中国科学院地理科...
  • 9 篇 南京信息工程大学
  • 9 篇 北京邮电大学
  • 8 篇 state key labora...
  • 8 篇 清华大学
  • 7 篇 college of compu...
  • 6 篇 中国科学院研究生...
  • 6 篇 中国科学院软件研...
  • 5 篇 信息安全国家重点...
  • 5 篇 成都信息工程大学
  • 5 篇 school of scienc...
  • 5 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 中国科学院生态环...

作者

  • 64 篇 china
  • 18 篇 吕述望
  • 18 篇 beijing
  • 12 篇 冯登国
  • 9 篇 chinese academy ...
  • 8 篇 杨义先
  • 6 篇 卿斯汉
  • 5 篇 shanghai
  • 5 篇 beijing universi...
  • 5 篇 黄清麟
  • 4 篇 刘振华
  • 4 篇 beijing jiaotong...
  • 4 篇 钮心忻
  • 3 篇 2 graduate unive...
  • 3 篇 高星
  • 3 篇 王汝传
  • 3 篇 zhengzhou
  • 3 篇 左英男
  • 3 篇 3 school of scie...
  • 3 篇 hefei

语言

  • 448 篇 英文
  • 204 篇 中文
检索条件"作者=2.state key laboratory of information security, graduate university of chinese academy of sciences, beijing 100049, china"
652 条 记 录,以下是81-90 订阅
排序:
Another ID-Based Proxy Signature Scheme and Its Extension
收藏 引用
Wuhan university Journal of Natural sciences 2007年 第1期12卷 33-36页
作者: ZHANG Jianhong1,2 , ZOU Wei3 1. College of Science, North china university of Technology, beijing 100041,china 2. Institute of Software of chinese academy of sciences /state key laboratory of information security, beijing 100080, china 3. Institute of Computer Science and Technology, Peking university, beijing 100871, china College of Science North China University of Technology Beijing China state key laboratory of information security Institute of Software of Chinese Academy of Sciences Beijing China Institute of Computer Science and Technology Peking University Beijing China
So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is propo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Configural processing of different topologically structured figures:an ERP Study
收藏 引用
Science china(Life sciences) 2009年 第12期52卷 1198-1204页
作者: ZHANG JunJun1, ZHU WeiNa2,3,4, DING XiaoJun1, ZHOU ChangLe1, HU XinTian2,3 & MA YuanYe2,3· 1 Lab of Mind, Art and Computation, Xiamen university, Xiamen 361005, china 2 Kunming Institute of Zoology, chinese academy of sciences, Kunming 650223, china 3 state key laboratory of Brain and Cognitive Science, Institute of Biophysics, chinese academy of sciences, beijing 1001001, china 4 School of information Science, Yunnan university, Kunming 650223, china Lab of Mind Art and Computation Xiamen University Xiamen China Kunming Institute of Zoology Chinese Academy of Sciences Kunming China state key laboratory of Brain and Cognitive Science Institute of Biophysics Chinese Academy of Sciences Beijing China School of information Science Yunnan University Kunming China
According to Chen's theory, topological differences are perceived faster than feature differences in early visual perception. We hypothesized that topological perception is caused by the sensitivity in discriminating ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Toxicokinetics and the related metabolites in rainbow trout(Oncorhynchus mykiss) after exposure to decabromodiphenyl ether
收藏 引用
Science china Chemistry 2010年 第11期53卷 2379-2386页
作者: FENG ChengLian,XU YiPing,ZHA JinMiao,LUO Qian,SHAN XiaoQuan & WANG ZiJian state key laboratory of Environmental Aquatic Chemistry Research Center for Eco-Environmental sciences,chinese academy of sciences,beijing 100085,china state key laboratory of Environmental Aquatic Chemistry Research Center for Eco-Environmental sciences Chinese Academy of Sciences Beijing China
Decabromodiphenyl ether(BDE209) is poorly absorbed by mammals,and little information is available on the toxicokinetics of BDE209 and its metabolites in *** the present study,rainbow trout(Oncorhynchus mykiss) were ad... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Multiparty quantum secret sharing of classical and quantum messages
收藏 引用
Progress in Natural Science:Materials International 2007年 第1期17卷 26-31页
作者: CHEN Pan, DENG Fuguo and LONG Guilu ( key laboratory for Quantum information and Measurements, and Department of Physics, Tsinghua university, beijing 100084, china key laboratory of Beam Technology and Material Modification, MOE, Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, beijing Normal university, beijing 100875, china beijing Radiation Center, beijing 100875, china key laboratory for Atomic and Molecular Nano-sciences, Tsinghua university, beijing 100084, china) key laboratory for Quantum information and Measurements Department of Physics Tsinghua University Beijing 100084 China key laboratory of Beam Technology and Material Modification Beijing Normal University Beijing 100875 China Institute of Low Energy Nuclear Physics Department of Material Science and Engineering Beijing Normal University Beijing 100875 China beijing Radiation Center Beijing 100875 China key laboratory for Atomic and Molecular Nano-sciences Tsinghua University Beijing 100084 China
A scheme for multiparty quantum secret sharing of classical and quantum messages is proposed by using entanglement swapping. This scheme can distribute not only the classical information but also the quantum informati... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Salient region detection and segmentation for general object recognition and image understanding
收藏 引用
Science china(information sciences) 2011年 第12期54卷 2481-2490页
作者: HUANG TieJun 1 , TIAN YongHong 1 , LI Jia 2 & YU HaoNan 11 National Engineering laboratory for Video Technology, School of Electrical Engineering and Computer Science, Peking university, beijing 100871, china 2 key laboratory of Intelligent information Processing, Institute of Computing Technology, chinese academy of sciences, beijing 100190, china National Engineering laboratory for Video Technology School of Electrical Engineering and Computer Science Peking University Beijing China key laboratory of Intelligent information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
General object recognition and image understanding is recognized as a dramatic goal for computer vision and multimedia retrieval. In spite of the great efforts devoted in the last two decades, it still remains an open... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Topography and functional information of plasma membrane
收藏 引用
Science china(Life sciences) 2008年 第2期51卷 95-103页
作者: SUN DeLan1, CHEN JianMin1, SONG YanMei1, ZHU ChuanFeng2, PAN GeBo2 & WAN LiJun2 1 key laboratory of Photosynthesis and Environmental Molecular Physiology, Institute of Botany, chinese academy of sciences, beijing 100093, china 2 Institute of Chemistry, chinese academy of sciences, beijing 100080, china key laboratory of Photosynthesis and Environmental Molecular Physiology Institute of Botany Chinese Academy of Sciences Beijing China Institute of Chemistry Chinese Academy of Sciences Beijing China
By using atomic force microscope (AFM), the topography and function of the plasmalemma surface of the isolated protoplasts from winter wheat mesophyll cells were observed, and compared with dead protoplasts induced by... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
QKD扩展BB84协议的Breidbart基窃听问题
收藏 引用
物理学报 2002年 第5期51卷 961-965页
作者: 杨理 吴令安 刘颂豪 中国科学院研究生院信息安全国家重点实验室 北京100039 中国科学院物理研究所 北京100080 华南师范大学量子电子学研究所 广州510631
给出了六态扩展BB84协议的Breidbart基窃听方案 ,分析并计算了各种截取 重发策略下的Alice Eve平均交互信息量和施行QKD标准纠错手续后的有效平均交互信息量 ,结果显示Breidbart基窃听 Breidbart基重发策略 (B B策略 )最为有效 .考虑到... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A low-noise fully-differential CMOS preamplifier for neural recording applications
收藏 引用
Science china(information sciences) 2012年 第2期55卷 441-452页
作者: ZHANG Xu,PEI WeiHua,HUANG BeiJu,GUAN Ning & CHEN HongDa state key laboratory on Integrated Optoelectronics,Institute of Semiconductors,chinese academy of sciences,beijing 100083,china state key laboratory on Integrated Optoelectronics Institute of Semiconductors Chinese Academy of Sciences Beijing China
A fully-differential bandpass CMOS preamplifier for extracellular neural recording is presented in this *** capacitive-coupled and capacitive-feedback topology is *** describe the main noise sources of the proposed pr... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Spatial pattern of land cover change in china's semiarid environment
收藏 引用
Journal of Arid Land 2009年 第1期1卷 16-25页
作者: BaoLin LI1 and QiMing ZHOU2 1 state key laboratory of Environment and Resources information System, Institute of Geographical sciences and Resources Research, chinese academy of sciences, beijing 100101, china 2 Department of Geography, Hong Kong Baptist university, Kowloon Tong, Hong Kong, china state key laboratory of Environment and Resources information System Institute of Geographical Sciences and Resources Research Chinese Academy of Sciences Beijing 100101 China Department of Geography Hong Kong Baptist University Kowloon Tong Hong Kong
This study seeks a routine to quantify spatial pattern of land cover changes in semiarid environment of china based on post-classification comparison method. The method consists of three major steps: (1) the image cla... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Polar differential power attacks and evaluation
收藏 引用
Science china(information sciences) 2012年 第7期55卷 1588-1604页
作者: TANG Ming 1 ,QIU ZhenLong 1 ,GAO Si 1,2 ,YI Mu 3 ,LIU ShuBo 1 ,ZHANG HuanGuo 1 & JIN YingZhen 1 1 School of Computer Science,Wuhan university,Wuhan 430072,china 2.state key laboratory of information security,Institute of Software,chinese academy of sciences,beijing 100190,china 3 Centre for Computer and information security Research School of Computer Science and Software Engineering university of Wollongong,Wollongong,NSW 2522,Australia School of Computer Science Wuhan University Wuhan China state key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing China Centre for Computer and information security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system *** existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implem... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论