咨询与建议

限定检索结果

文献类型

  • 258 篇 期刊文献
  • 181 篇 会议

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 317 篇 工学
    • 144 篇 网络空间安全
    • 126 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 30 篇 信息与通信工程
    • 28 篇 仪器科学与技术
    • 21 篇 电子科学与技术(可...
    • 20 篇 控制科学与工程
    • 18 篇 机械工程
    • 9 篇 公安技术
    • 7 篇 光学工程
    • 7 篇 电气工程
    • 7 篇 航空宇航科学与技...
    • 6 篇 农业工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 测绘科学与技术
    • 4 篇 地质资源与地质工...
  • 93 篇 理学
    • 61 篇 数学
    • 16 篇 物理学
    • 5 篇 地理学
    • 5 篇 生态学
    • 4 篇 系统科学
  • 58 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 7 篇 公共管理
  • 33 篇 军事学
    • 33 篇 军队指挥学
  • 18 篇 法学
    • 11 篇 公安学
  • 15 篇 医学
    • 7 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 12 篇 农学
    • 9 篇 农业资源与环境
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 艺术学
    • 6 篇 设计学(可授艺术学...
  • 2 篇 教育学
  • 1 篇 哲学

主题

  • 12 篇 信息安全
  • 11 篇 cryptography
  • 11 篇 网络安全
  • 8 篇 计算机网络
  • 8 篇 quantum
  • 7 篇 information secu...
  • 6 篇 intrusion detect...
  • 6 篇 security
  • 6 篇 proxy signature
  • 5 篇 gis
  • 5 篇 sharing
  • 5 篇 secret sharing
  • 5 篇 authentication
  • 5 篇 cryptanalysis
  • 5 篇 secret
  • 5 篇 provable securit...
  • 4 篇 threshold crypto...
  • 4 篇 数字签名
  • 4 篇 密码学
  • 4 篇 access control

机构

  • 16 篇 中国科学院研究生...
  • 12 篇 中国科学院大学
  • 11 篇 中国人民公安大学
  • 10 篇 state key labora...
  • 8 篇 state key labora...
  • 7 篇 college of compu...
  • 6 篇 中国科学院计算技...
  • 6 篇 中国科学院研究生...
  • 6 篇 中国科学院软件研...
  • 6 篇 graduate univers...
  • 5 篇 武警工程大学
  • 5 篇 网络与信息安全武...
  • 5 篇 中国科学院信息安...
  • 5 篇 中国科学院信息工...
  • 4 篇 中国科学院物联网...
  • 4 篇 中科院信息安全技...
  • 4 篇 中山大学
  • 4 篇 school of scienc...
  • 4 篇 state key labora...
  • 3 篇 南京邮电学院

作者

  • 44 篇 china
  • 11 篇 beijing
  • 10 篇 卿斯汉
  • 8 篇 冯登国
  • 5 篇 shanghai
  • 5 篇 杨晓元
  • 4 篇 蒋建春
  • 3 篇 2 graduate unive...
  • 3 篇 李聪
  • 3 篇 王汝传
  • 3 篇 zhengzhou
  • 3 篇 3 school of scie...
  • 3 篇 hefei
  • 3 篇 beijing universi...
  • 3 篇 xidian universit...
  • 3 篇 wuhan
  • 3 篇 刘雪飞
  • 3 篇 龚晓锐
  • 3 篇 吕述望
  • 3 篇 xi’an

语言

  • 262 篇 英文
  • 177 篇 中文
检索条件"作者=2.tate {2. {3. of Information Security,Graduate University of chinese academy of sciences,{3. 100049,China"
439 条 记 录,以下是371-380 订阅
排序:
Turbo-Based DNW Algorithm for Compressed Video in VLC Domain
Turbo-Based DNW Algorithm for Compressed Video in VLC Domain
收藏 引用
The 1st chinese Conference on Trusted Computing and information {2.
作者: LING He-fei, LU Zheng-ding, ZOU Fu-hao College of Computer Science and Technology, Huazhong university of Science and Technology, Wuhan 43.074, Hubei, china
<正> In order to improve the robustness of the differential number watermarking (DNW) algorithm proposed by us before, we proposed turbo-based DNW (T-DNW) in which the turbo code was employed in the DNW algorith... 详细信息
来源: cnki会议 评论
Implementation and Performance Evaluation of IPSec VPN Based on Netfilter
Implementation and Performance Evaluation of IPSec VPN Based...
收藏 引用
The 1st chinese Conference on Trusted Computing and information {2.
作者: ZHAO Da-yuan, JIANG Yi-xin, LIN Chuang. LI Yan-xi Department of Science and Technology. Tsinghua university, Beijing 100084,china
<正> We mainly explore two problems when combining IPSec module into TCP/IP stack by porting the famous IPSec software (FreeS/WAN ) into a security gateway. One is how to implement the IPSec module based on Netfil... 详细信息
来源: cnki会议 评论
An Effficient Threshold Blind Signature from Weil Pairing
An Effficient Threshold Blind Signature from Weil Pairing
收藏 引用
The 1st chinese Conference on Trusted Computing and information {2.
作者: CHENG Xiang-guo, XU Wei-dong, WANG Xin-mei National Key Laboratory of Integrated Services Network, Xidian university, Xi''an 710071, Shaanxi,china
<正> Threshold blind signature is playing an importantrole in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshol... 详细信息
来源: cnki会议 评论
An In-Depth Study of Complex Power System Dynamic Behavior Characteristics for chinese UHV Power Grid security
收藏 引用
Electricity 2009年 第2期20卷 45-51页
作者: Ding Daoqi State Grid information & Telecommunication Co.,Ltd.Zhao Fang State Grid information & Lelecommunication Co.Ltd
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 2.st century power grid are discussed. The... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
论高校思想政治教育在社会主义意识形态建设中的作用
收藏 引用
黑龙江高教研究 2018年 第4期36卷 143-146页
作者: 刘甜甜 邓福庆 黑龙江大学 黑龙江哈尔滨150080 东北林业大学 黑龙江哈尔滨150040
意识形态是上层建筑的重要组成部分,代表一定阶级、群体的利益,在维护政权稳定、维系社会安定方面发挥重要作用。思想政治教育本身不是意识形态但与意识形态关系密切,二者在本质上具有一致性、在内容上具有交互性、在作用上具有同一性... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Preface
Preface
收藏 引用
The 1st chinese Conference on Trusted Computing and information {2.
作者: ZHANG Huan-guo General Chair of the CTCIS''04 Professor and the Associate Dean of School of Computer, Wuhan university Associate Director of Fault-tolerant Computing Committee of china Computer Federation Council Member of the china Cryptography Association October, {3.04
<正> information security is crucial to the national security, stability and the development of economy, we must make sure that the information security must is guaranteed in china. Trusted computing is a new techno...
来源: cnki会议 评论
Polynomial Analysis of DH Secrete Key and Bit security
Polynomial Analysis of DH Secrete Key and Bit Security
收藏 引用
The 1st chinese Conference on Trusted Computing and information {2.
作者: JIANG Zheng-tao. XU Wen-li, WANG Yu-min National Key Laboratory of Integrated Service Networks Xidian university, Xi''an 710071, Shaanxi, china
<正> In this paper, we lower the upper bound of the number of solutions of oracle transformation polynomial F(x) over GF(q). So one can also recover all the secrete keys with fewer calls. We use our generalized ... 详细信息
来源: cnki会议 评论
Access Request Trustworthiness in Weighted Access Control Framework
Access Request Trustworthiness in Weighted Access Control Fr...
收藏 引用
The 1st chinese Conference on Trusted Computing and information {2.
作者: WANG Lun-wei. LIAO Xiang-ke. WANG Huai-min School of Computer Science, National university of Defense Technology , Changsha 410073. Hunan, china
<正> Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model fo... 详细信息
来源: cnki会议 评论
A Method of Audio-Video Synchronization in Network Monitoring System
A Method of Audio-Video Synchronization in Network Monitorin...
收藏 引用
2.11 IEEE International Conference on information Theory and information {2.(ICITIS 2.11)
作者: Lihua Fang Limin Meng Sijun Luo Zhejiang Provincial Key Lab of Opt. Commun. Tech. Zhejiang university of Tech. Hangzhou china
Real-time streaming media transmission has been used widely in the network monitoring system, and audio- video synchronization is a key issue. Since the use of RTP protocol in data transmission, the synchronization pr... 详细信息
来源: cnki会议 评论
Efficient ldentity Based Signcryption Scheme with Public Verifiability and Forward security
Efficient ldentity Based Signcryption Scheme with Public Ver...
收藏 引用
The 1st chinese Conference on Trusted Computing and information {2.
作者: LEI Fei-yu, CHEN Wen, CHEN Ke-fei,MA Chang-she Department of Computer Science and Engineering. Shanghai Jiaotong university, Shanghai 2.003.,china
<正> In this paper, we point out that Libert and Quisquater’s signeryption scheme cannot provide public *** we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic cur... 详细信息
来源: cnki会议 评论