咨询与建议

限定检索结果

文献类型

  • 998 篇 期刊文献
  • 497 篇 会议

馆藏范围

  • 1,495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,154 篇 工学
    • 358 篇 计算机科学与技术...
    • 225 篇 网络空间安全
    • 195 篇 软件工程
    • 172 篇 控制科学与工程
    • 140 篇 机械工程
    • 139 篇 仪器科学与技术
    • 129 篇 信息与通信工程
    • 89 篇 电子科学与技术(可...
    • 52 篇 电气工程
    • 37 篇 光学工程
    • 32 篇 交通运输工程
    • 29 篇 地质资源与地质工...
    • 28 篇 农业工程
    • 23 篇 测绘科学与技术
    • 20 篇 公安技术
    • 19 篇 航空宇航科学与技...
  • 281 篇 理学
    • 96 篇 系统科学
    • 88 篇 数学
    • 37 篇 物理学
    • 23 篇 地理学
    • 17 篇 生物学
  • 278 篇 管理学
    • 200 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 29 篇 公共管理
    • 19 篇 图书情报与档案管...
  • 95 篇 教育学
    • 74 篇 教育学
    • 17 篇 体育学
  • 48 篇 经济学
    • 46 篇 应用经济学
  • 40 篇 军事学
    • 40 篇 军队指挥学
  • 37 篇 农学
  • 33 篇 医学
  • 27 篇 法学
  • 23 篇 艺术学
    • 22 篇 设计学(可授艺术学...
  • 6 篇 文学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 34 篇 网络安全
  • 30 篇 信息安全
  • 21 篇 计算机网络
  • 17 篇 information secu...
  • 15 篇 internet
  • 15 篇 防火墙
  • 13 篇 设计
  • 13 篇 gis
  • 12 篇 security
  • 12 篇 数据库
  • 11 篇 安全性
  • 11 篇 电子商务
  • 11 篇 cryptography
  • 11 篇 入侵检测
  • 10 篇 xml
  • 10 篇 高校
  • 10 篇 quantum
  • 9 篇 地理信息系统
  • 9 篇 数字签名
  • 9 篇 访问控制

机构

  • 33 篇 西安电子科技大学
  • 28 篇 上海交通大学
  • 16 篇 东南大学
  • 15 篇 武汉大学
  • 12 篇 电子科技大学
  • 11 篇 华中科技大学
  • 11 篇 同济大学
  • 11 篇 南京大学
  • 11 篇 天津大学
  • 10 篇 山东大学
  • 9 篇 首都师范大学
  • 9 篇 清华大学
  • 9 篇 四川大学
  • 8 篇 重庆大学
  • 8 篇 华南理工大学
  • 8 篇 南京信息工程大学
  • 8 篇 西北工业大学
  • 8 篇 北京邮电大学
  • 7 篇 武汉理工大学
  • 7 篇 华东师范大学

作者

  • 111 篇 china
  • 18 篇 ministry of educ...
  • 13 篇 beijing
  • 10 篇 china)
  • 9 篇 p.r.china
  • 9 篇 马建峰
  • 6 篇 hangzhou
  • 6 篇 tianjin universi...
  • 6 篇 杨义先
  • 5 篇 方滨兴
  • 5 篇 beijing 100083
  • 5 篇 beijing universi...
  • 5 篇 顾冠群
  • 5 篇 方勇
  • 5 篇 jilin university
  • 5 篇 china agricultur...
  • 5 篇 guangzhou 510642
  • 4 篇 王汝传
  • 4 篇 p. r. china
  • 4 篇 张健

语言

  • 768 篇 英文
  • 727 篇 中文
检索条件"作者=2Key Laboratory for Information System Security, Ministry of Education of china, beijing 100084, china"
1495 条 记 录,以下是1-10 订阅
排序:
Competent predicate abstraction in model checking
收藏 引用
Science china(information Sciences) 2011年 第2期54卷 258-267页
作者: LI Li1,2,3, SONG XiaoYu4, GU Ming2,3 & LUO XiangYu2,3 1Department of Computer Science & Technology, Tsinghua University, beijing 100084, china 2key laboratory for information system security, ministry of education of china, beijing 100084, china 3School of Software, Tsinghua University, beijing 100084, china 4Department of ECE, Portland State University, Portland, Oregon 97207, USA Department of Computer Science & Technology Tsinghua University Beijing China key laboratory for information system security Ministry of Education of China Beijing China School of Software Tsinghua University Beijing China Department of ECE Portland State University Portland USA
The paper presents a new approach to computing the abstract state and a maximum weight heuristic method for finding the shortest counter-example in verification of imperative programs. The strategy is incorporated in ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A scheme to implement the Deutsch-Josza algorithm on a superconducting charge-qubit quantum computer
收藏 引用
Progress in Natural Science:Materials International 2006年 第6期16卷 594-599页
作者: HUO Wenyi and LONG Guilu (key laboratory for Quantum information and Measurements, and Department of Physics, Tsinghua University, beijing 100084, china key laboratory for Atomic and Molecular NanoSciences, Tsinghua University, beijing 100084, china) key laboratory for Quantum information and Measurements Department of Physics Tsinghua University Bejjing 100084 China key laboratory for Atomic and Molecular NanoSciences Tsinghua University Bejing 100084 China
We have studied the implementation of the Deutsch-Josza quantum algorithm in a superconducting charge-qubit quantum computer. Different from previous studies, we have used the inductance coupled system of You et al. T... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Capability description and discovery of Internetware entity
收藏 引用
Science china(information Sciences) 2010年 第4期53卷 685-703页
作者: WANG PuWei1*, JIN Zhi2,3* & LIU HongYan4 1key laboratory of Data Engineering and Knowledge Engineering of the ministry of education, Renmin University of china, beijing 100872, china 2key laboratory of High Confidence Software Technologies of the ministry of education, Peking University, beijing 100871, china 3Academy of Mathematics and system Sciences, Chinese Academy of Sciences, beijing 100190, china 4Department of Management Science and Engineering, Tsinghua University, beijing 100084, china key laboratory of Data Engineering and Knowledge Engineering of the ministry of education Renmin University of China Beijing China key laboratory of High Confidence Software Technologies of the ministry of education Peking University Beijing China Academy of Mathematics and system Sciences Chinese Academy of Sciences Beijing China Department of Management Science and Engineering Tsinghua University Beijing China
Internetware can be formed through aggregation of Internetware entities bottom-up to satisfy the user's requirements. In the process, capability description of Internetware entity plays an important role. This paper p... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research on applying physical chaos generator to spacecraft information security
收藏 引用
Science china(Technological Sciences) 2009年 第5期52卷 1463-1470页
作者: ZHAO HePing State key laboratory of information security,Graduate University of Chinese Academy of Sciences,beijing 100049,china china Academy of Space Technology,beijing 100094,china State key laboratory of information security Graduate University of Chinese Academy of Sciences Beijing China china Academy of Space Technology Beijing China
The effectiveness of a short-length message extension method based on physical chaos generator was analyzed and the entropy of the extended message was calculated in this *** analysis demon-strated that with the menti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 557-566页
作者: SUN YinXia & LI Hui key laboratory of Computer Networks and information security, ministry of education, Xidian University, Xi’an 710071, china key laboratory of Computer Networks and information security Ministry of Education Xidian University Xi’an China
The primitive signcryption provides authenticity and privacy simultaneously. In this paper, we present efficient signcryption schemes between the traditional public key cryptosystem (TPKC) and the identity based crypt... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Multiparty quantum secret sharing of classical and quantum messages
收藏 引用
Progress in Natural Science:Materials International 2007年 第1期17卷 26-31页
作者: CHEN Pan, DENG Fuguo and LONG Guilu ( key laboratory for Quantum information and Measurements, and Department of Physics, Tsinghua University, beijing 100084, china key laboratory of Beam Technology and Material Modification, MOE, Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, beijing Normal University, beijing 100875, china beijing Radiation Center, beijing 100875, china key laboratory for Atomic and Molecular Nano-Sciences, Tsinghua University, beijing 100084, china) key laboratory for Quantum information and Measurements Department of Physics Tsinghua University Beijing 100084 China key laboratory of Beam Technology and Material Modification Beijing Normal University Beijing 100875 China Institute of Low Energy Nuclear Physics Department of Material Science and Engineering Beijing Normal University Beijing 100875 China beijing Radiation Center Beijing 100875 China key laboratory for Atomic and Molecular Nano-Sciences Tsinghua University Beijing 100084 China
A scheme for multiparty quantum secret sharing of classical and quantum messages is proposed by using entanglement swapping. This scheme can distribute not only the classical information but also the quantum informati... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An approach to determining the local boundaries of voltage stability region with wind farms in power injection space
收藏 引用
Science china(Technological Sciences) 2010年 第12期53卷 3232-3240页
作者: MU YunFei & JIA HongJie key laboratory of Power system Simulation and Control of ministry of education, Tianjin University, Tianjin 300072, china key laboratory of Power system Simulation and Control of ministry of education Tianjin University Tianjin China
A new approach to determining the local boundaries of voltage stability region in power injection space (IVSR) for power system with wind farms is presented. It can be used for power system voltage stability analysis ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Measuring-basis-encrypted six-state quantum key distribution scheme
收藏 引用
Progress in Natural Science:Materials International 2006年 第1期16卷 84-89页
作者: CHEN Pan1, DENG Fuguo1, WANG Pingxiao1 and LONG Guilu1,2 (key laboratory for Quantum information and Measurements and Department of Physics, Tsinghua University, beijing 100084, china 2. key laboratory for Atomic and Molecular NanoSciences, Tsinghua University, beijing 100084, china) key laboratory for Quantum information and Measurements Department of Physics Tsinghua University Beijing 100084 China key laboratory for Atomic and Molecular NanoSciences Tsinghua University Beijing 100084 China
A six-state quantum key distribution scheme with measuring-basis encryption technique, which is based on the six-state protocol and the MBE protocol, is proposed. In this modified six-state quantum key distribution pr... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Design theory and method of multivariate hash function
收藏 引用
Science china(information Sciences) 2010年 第10期53卷 1977-1987页
作者: WANG HouZhen 1,2 , ZHANG HuanGuo 1 , WU QianHong 1 , ZHANG Yu 1 , LI ChunLei 1 & ZHANG XinYu 1 1 The key laboratory of Aerospace information security and Trusted Computing, ministry of education, School of Computer, Wuhan University, Wuhan 430072, china 2 key laboratory of Mathematics Mechanization, beijing 100080, china The key laboratory of Aerospace information security and Trusted Computing Ministry of Education School of Computer Wuhan University Wuhan China key laboratory of Mathematics Mechanization Beijing China
This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the curren... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quick image-processing method of UAV without control points data in earthquake disaster area
收藏 引用
中国有色金属学会会刊:英文版 2011年 第S3期21卷 523-528页
作者: LI Chang-chun1, ZHANG Guang-sheng1, LEI Tian-jie2, 3, GONG A-du2, 3 1. School of Surveying & Land information Engineering, Henan Polytechnic University, Jiaozuo 454000, china 2. key laboratory of Environmental Change and Natural Disaster, ministry of education, beijing Normal University, beijing 100875, china 3. ministry of Civil Affairs/ministry of education of china Academy of Disaster Reduction and Emergency Management, beijing Normal University, beijing 100875, china School of Surveying & Land information Engineering Henan Polytechnic University Jiaozuo 454000 China key laboratory of Environmental Change and Natural Disaster Ministry of Education Beijing Normal University Beijing 100875 China ministry of Civil Affairs/ministry of education of china Academy of Disaster Reduction and Emergency Management Beijing Normal University Beijing 100875 China
The methods of unmanned aerial vehicles images splicing rapidly and rectifying without control points data, only using auxiliary data recorded by unmanned aerial vehicle (UAV) system, were researched. Two algorithms w... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论