咨询与建议

限定检索结果

文献类型

  • 6,606 篇 期刊文献
  • 2,147 篇 会议

馆藏范围

  • 8,753 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,506 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 967 篇 网络空间安全
    • 917 篇 软件工程
    • 780 篇 信息与通信工程
    • 753 篇 机械工程
    • 752 篇 仪器科学与技术
    • 718 篇 控制科学与工程
    • 662 篇 电子科学与技术(可...
    • 279 篇 材料科学与工程(可...
    • 272 篇 地质资源与地质工...
    • 264 篇 光学工程
    • 225 篇 测绘科学与技术
    • 222 篇 电气工程
    • 168 篇 水利工程
    • 149 篇 化学工程与技术
    • 146 篇 航空宇航科学与技...
    • 140 篇 交通运输工程
  • 1,802 篇 理学
    • 435 篇 数学
    • 300 篇 物理学
    • 295 篇 系统科学
    • 230 篇 生物学
    • 139 篇 大气科学
  • 1,456 篇 管理学
    • 1,066 篇 管理科学与工程(可...
    • 155 篇 公共管理
    • 138 篇 工商管理
  • 509 篇 农学
    • 180 篇 农业资源与环境
    • 146 篇 作物学
  • 320 篇 医学
    • 149 篇 临床医学
  • 289 篇 经济学
    • 269 篇 应用经济学
  • 235 篇 军事学
    • 222 篇 军队指挥学
  • 155 篇 教育学
  • 150 篇 法学
  • 135 篇 艺术学
  • 47 篇 文学
  • 9 篇 哲学
  • 7 篇 历史学

主题

  • 94 篇 网络安全
  • 84 篇 internet
  • 70 篇 设计
  • 56 篇 数字签名
  • 52 篇 安全性
  • 52 篇 计算机网络
  • 48 篇 电子商务
  • 48 篇 信息安全
  • 41 篇 地理信息系统
  • 38 篇 中国
  • 37 篇 gis
  • 35 篇 密码学
  • 35 篇 model
  • 34 篇 xml
  • 29 篇 信息系统
  • 25 篇 genetic algorith...
  • 25 篇 访问控制
  • 24 篇 simulation
  • 24 篇 入侵检测系统
  • 24 篇 加密

机构

  • 138 篇 武汉大学
  • 136 篇 上海交通大学
  • 110 篇 西安电子科技大学
  • 77 篇 南京大学
  • 72 篇 中国科学院大学
  • 70 篇 天津大学
  • 70 篇 四川大学
  • 69 篇 清华大学
  • 65 篇 北京邮电大学
  • 62 篇 华中科技大学
  • 60 篇 山东大学
  • 57 篇 东南大学
  • 56 篇 南京信息工程大学
  • 55 篇 同济大学
  • 54 篇 武汉理工大学
  • 52 篇 浙江大学
  • 51 篇 西安交通大学
  • 51 篇 中南大学
  • 49 篇 哈尔滨工业大学
  • 48 篇 电子科技大学

作者

  • 452 篇 china
  • 49 篇 p.r.china
  • 30 篇 ministry of educ...
  • 23 篇 beijing
  • 22 篇 china)
  • 20 篇 shanghai
  • 19 篇 杨义先
  • 18 篇 吕述望
  • 17 篇 zhejiang univers...
  • 17 篇 hangzhou
  • 16 篇 谢立
  • 15 篇 beijing 100044
  • 14 篇 王汝传
  • 14 篇 冯登国
  • 14 篇 beijing jiaotong...
  • 13 篇 p. r. china
  • 13 篇 hubei
  • 13 篇 王伟
  • 13 篇 顾冠群
  • 12 篇 胡正名

语言

  • 4,759 篇 中文
  • 3,994 篇 英文
检索条件"作者=2State Key laboratory of information Security, beij.ng 100039, china"
8753 条 记 录,以下是11-20 订阅
排序:
A property-based attestation protocol for TCM
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 454-464页
作者: FEng DengGuo1,2 & QIN Yu1,2 1state key laboratory of information security, Institute of Software, Chinese Academy of Science, beij.ng 100190, china 2National Engineering Research Center of information security, beij.ng 100190, china 1. state key laboratory of information security Institute of Software Chinese Academy of Science Beijing 100190 China2. National Engineering Research Center of Information Security Beijing 100190 China
This paper presents a property attestation protocol for the security chip TCM (trusted cryptographic module) via analyzing the problems of the current property attestation, which is built on the property attestation m... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A hybrid matching method for geospatial services in a composition-oriented environment
收藏 引用
Science china(Technological Sciences) 2010年 第S1期53卷 213-220页
作者: LUO An 1,2,WAng YanDong 1,2 & CHEN ShengHua 2 1 state key laboratory of Software Engineering,Wuhan University,Wuhan 430072,china 2 state key laboratory of information Engineering in Surveying,Mapping and Remote Sensing,Wuhan University,Wuhan 430079,china 1. state key laboratory of Software Engineering Wuhan University Wuhan 430072 China 2. state key laboratory of information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan 430079 China
With the development of Internet and GIS,large volumes of spatial data,powerful computing resources and many spatial data processing functions are published in the form of Web *** suitable geospatial services in the c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Nondegenerative ML-sequences over ring Z/(2~e)
收藏 引用
Chinese Science Bulletin 1999年 第17期44卷 1557-1561页
作者: YAng Junhui and ZHAI QibinInstitute of Software , Chinese Academy of Sciences , beij.ng 100080, china state key laboratory of information security , beij.ng 100080, china Chinese Acad Sci Inst Software Beijing 100080 Peoples R China state key Lab Informat Secur Beijing 100080 Peoples R China
The so-called quasi-period of an ML-sequence has been introduced. It is noted that an ML-sequence may degenerate in the sense that it has the quasi-period shorter than its period, and the problem of constructing the n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YAng YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and Technology, beij.ng University of Technology, beij.ng 100124, china 2 state key laboratory of Integrated Services Network, Xidian University, Xi’an 710071, china 3 state key laboratory of information security (Graduate University of Chinese Academy of Sciences), beij.ng 100049, china 4 state key laboratory of Networking and Switching Technology, beij.ng University of Posts and Tele-communications, beij.ng 100876, china College of Computer Science and Technology Beijing University of Technology Beijing 100124 China state key laboratory of Integrated Services Network Xidian University Xi’an 710071 China state key laboratory of information security Graduate University of Chinese Academy of Sciences Beijing 100049 China state key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Twisted Ate pairing on hyperelliptic curves and applications
收藏 引用
Science china(information Sciences) 2010年 第8期53卷 1528-1538页
作者: ZHAng FangGuo 1,2 1 School of information Science and Technology, Sun Yat-Sen University, Guangzhou 510275, china 2 Guangdong key laboratory of information security Technology, Guangzhou 510275, china 1. School of information Science and Technology Sun Yat-Sen University Guangzhou 510275 China2. Guangdong Key Laboratory of Information Security Technology Guangzhou 510275 China
In this paper we show that the twisted Ate pairing on elliptic curves can be generalized to hyperelliptic curves, and give a series of variations of the hyperelliptic Ate and twisted Ate pairings. Using the hyperellip... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Accountable authority key policy attribute-based encryption
收藏 引用
Science china(information Sciences) 2012年 第7期55卷 1631-1638页
作者: WAng YongTao 1,2 ,CHEN KeFei 1,3 ,LOng Yu 1,4 & LIU ZhaoHui 2 1 Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai 200240,china 2 china information Technology security Evaluation Center,beij.ng 100085,china 3 Shanghai key laboratory of Scalable Computing and Systems,Shanghai Jiao Tong University,Shanghai,200240,china 4 state key laboratory of information security,Graduate School of Chinese Academy of Sciences,100039,china 1. Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China2. China Information Technology Security Evaluation Center Beijing 100085 China3. Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China4. State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100039 China
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable authori... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YAng YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer Science and Technology,beij.ng University of Technology,beij.ng 100124,china 2 state key laboratory of Networking and Switching Technology,beij.ng University of Posts and Tele-communications,beij.ng 100876,china 3 state key laboratory of Integrated Services Network,Xidian University,Xi’an 710071,china 4 state key laboratory of information security(Graduate University of Chinese Academy of Sciences) ,beij.ng 100049,china 1. College of Computer Science and Technology Beijing University of Technology Beijing 100124 China 3. state key laboratory of Integrated Services Network Xidian University Xi’an 710071 China 4. state key laboratory of information security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China 2. state key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YAng YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and Technology,beij.ng University of Technology,beij.ng 100124,china 2 state key laboratory of Integrated Services Network,Xidian University,Xi’an 710071,china 3 state key laboratory of information security (Graduate University of Chinese Academy of Sciences),beij.ng 100049,china 4 state key laboratory of Networking and Switching Technology,beij.ng University of Posts and Tele-communications,beij.ng 100876,china College of Computer Science and Technology Beijing University of Technology Beijing 100124 China state key laboratory of Integrated Services Network Xidian University Xi’an 710071 China state key laboratory of information security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China state key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Semi-Supervised Classification based on Gaussian Mixture Model for remote imagery
收藏 引用
Science china(Technological Sciences) 2010年 第S1期53卷 85-90页
作者: XIOng Biao1,ZHAng XiaoJun1 & JIAng WanShou1,2 1 state key laboratory of information Engineering in Surveying,Mapping and Remote Sensing,Wuhan University,Wuhan 430079,china 2 state key laboratory of Remote Sensing Science,beij.ng,china 1. state key laboratory of information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan 430079 China2. State Key Laboratory of Remote Sensing Science Beijing China
Semi-Supervised Classification (SSC),which makes use of both labeled and unlabeled data to determine classification borders in feature space,has great advantages in extracting classification information from mass *** ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Extended multivariate public key cryptosystems with secure encryption function
收藏 引用
Science china(information Sciences) 2011年 第6期54卷 1161-1171页
作者: WAng HouZhen 1,2 , ZHAng Huanguo 1,2 , WAng ZhangYi 1,2 & TAng Ming 1,2 1 The key laboratory of Aerospace information security and Trusted Computing, Ministry of Education, School of Computer, Wuhan University, Wuhan 430079, china 2 state key laboratory of Software Engineering, Wuhan University, Wuhan 430072, china 1. The key laboratory of Aerospace information security and Trusted Computing Ministry of Education School of Computer Wuhan University Wuhan 430079 China2. State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational pow... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论