咨询与建议

限定检索结果

文献类型

  • 6,606 篇 期刊文献
  • 2,147 篇 会议

馆藏范围

  • 8,753 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,506 篇 工学
    • 1,807 篇 计算机科学与技术...
    • 967 篇 网络空间安全
    • 917 篇 软件工程
    • 780 篇 信息与通信工程
    • 753 篇 机械工程
    • 752 篇 仪器科学与技术
    • 718 篇 控制科学与工程
    • 662 篇 电子科学与技术(可...
    • 279 篇 材料科学与工程(可...
    • 272 篇 地质资源与地质工...
    • 264 篇 光学工程
    • 225 篇 测绘科学与技术
    • 222 篇 电气工程
    • 168 篇 水利工程
    • 149 篇 化学工程与技术
    • 146 篇 航空宇航科学与技...
    • 140 篇 交通运输工程
  • 1,802 篇 理学
    • 435 篇 数学
    • 300 篇 物理学
    • 295 篇 系统科学
    • 230 篇 生物学
    • 139 篇 大气科学
  • 1,456 篇 管理学
    • 1,066 篇 管理科学与工程(可...
    • 155 篇 公共管理
    • 138 篇 工商管理
  • 509 篇 农学
    • 180 篇 农业资源与环境
    • 146 篇 作物学
  • 320 篇 医学
    • 149 篇 临床医学
  • 289 篇 经济学
    • 269 篇 应用经济学
  • 235 篇 军事学
    • 222 篇 军队指挥学
  • 155 篇 教育学
  • 150 篇 法学
  • 135 篇 艺术学
  • 47 篇 文学
  • 9 篇 哲学
  • 7 篇 历史学

主题

  • 94 篇 网络安全
  • 84 篇 internet
  • 70 篇 设计
  • 56 篇 数字签名
  • 52 篇 安全性
  • 52 篇 计算机网络
  • 48 篇 电子商务
  • 48 篇 信息安全
  • 41 篇 地理信息系统
  • 38 篇 中国
  • 37 篇 gis
  • 35 篇 密码学
  • 35 篇 model
  • 34 篇 xml
  • 29 篇 信息系统
  • 25 篇 genetic algorith...
  • 25 篇 访问控制
  • 24 篇 simulation
  • 24 篇 入侵检测系统
  • 24 篇 加密

机构

  • 138 篇 武汉大学
  • 136 篇 上海交通大学
  • 110 篇 西安电子科技大学
  • 77 篇 南京大学
  • 72 篇 中国科学院大学
  • 70 篇 天津大学
  • 70 篇 四川大学
  • 69 篇 清华大学
  • 65 篇 北京邮电大学
  • 62 篇 华中科技大学
  • 60 篇 山东大学
  • 57 篇 东南大学
  • 56 篇 南京信息工程大学
  • 55 篇 同济大学
  • 54 篇 武汉理工大学
  • 52 篇 浙江大学
  • 51 篇 西安交通大学
  • 51 篇 中南大学
  • 49 篇 哈尔滨工业大学
  • 48 篇 电子科技大学

作者

  • 452 篇 china
  • 49 篇 p.r.china
  • 30 篇 ministry of educ...
  • 23 篇 beijing
  • 22 篇 china)
  • 20 篇 shanghai
  • 19 篇 杨义先
  • 18 篇 吕述望
  • 17 篇 zhejiang univers...
  • 17 篇 hangzhou
  • 16 篇 谢立
  • 15 篇 beijing 100044
  • 14 篇 王汝传
  • 14 篇 冯登国
  • 14 篇 beijing jiaotong...
  • 13 篇 p. r. china
  • 13 篇 hubei
  • 13 篇 王伟
  • 13 篇 顾冠群
  • 12 篇 胡正名

语言

  • 4,759 篇 中文
  • 3,994 篇 英文
检索条件"作者=2State Key laboratory of information Security, beij.ng 100039, china"
8753 条 记 录,以下是21-30 订阅
排序:
Analysis of a kind of quantum cryptographic schemes based on secret sharing
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2009年 第9期52卷 1313-1316页
作者: ZHAng XingLan1 & JI DongYao2 1 College of Computer Science and Technology, beij.ng University of Technology, beij.ng 100124, china 2 state key laboratory of information security, Graduate University of Chinese Academy of Sciences, beij.ng 100049, china College of Computer Science and Technology Beijing University of Technology Beijing 100124 China state key laboratory of information security Graduate University of Chinese Academy of Sciences Beijing 100049 China
Recently, Yang et al. proposed a kind of quantum cryptographic schemes based on secret sharing. The main idea is drawn from the case, where any n participants who share a secret K can co-operate as K does. This proces... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Paillier's trapdoor function hides Θ(n) bits
收藏 引用
Science china(information Sciences) 2011年 第9期54卷 1827-1836页
作者: SU Dong & Lü KeWei state key laboratory of information security,Graduate University of Chinese Academy of Sciences,beij.ng 100049,china 1. state key laboratory of information security Graduate University of Chinese Academy of Sciences Beijing 100049 China
In this paper,we re-examine the bit security of Paillier’s trapdoor *** show that given a random w=gcyN mod N2 ∈ZN2* the most significant bit of its class c is a hard-core predicate,under a standard assumption that ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CMQV+:An authenticated key exchange protocol from CMQV
收藏 引用
Science china(information Sciences) 2012年 第7期55卷 1666-1674页
作者: LI Hui 1,2 & WU ChuanKun 1 1 state key laboratory of information security,Institute of Software,Chinese Academy of Sciences,beij.ng 100190,china 2 Graduate University of Chinese Academy of Sciences,beij.ng 100049,china 1. state key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing 100190 China2. Graduate University of Chinese Academy of Sciences Beijing 100049 China
Ustaoglu presents a secure and efficient key exchange protocol named CMQV,based on the design rationales of HMQV and *** with the latter two protocols,on one hand,CMQV achieves high performance of HMQV,and on the othe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A two-round honest-verifier zero-knowledge protocol
收藏 引用
Science china(information Sciences) 2010年 第5期53卷 954-963页
作者: LIU HanWu 1,2 & LIN DongDai 1 1 The state key laboratory of information security, Institute of Software, Chinese Academy of Sciences, beij.ng 100190, china 2 Graduate University of the Chinese Academy of Sciences, beij.ng 100049, china 1. The state key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing 100190 China2. Graduate University of the Chinese Academy of Sciences Beijing 100049 China
Since the concept of zero-knowledge protocols was introduced, it has attracted a lot of attention and in turn showed significant effect on the development of cryptography, complexity theory and other areas. The round ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Calculation of maximum ground movement and deformation caused by mining
收藏 引用
中国有色金属学会会刊:英文版 2011年 第S3期21卷 562-569页
作者: LI Pei-xian1, 2, TAN Zhi-xiang1, 2, DEng Ka-zhong1, 2 1. key laboratory for Land Environment and Disaster Monitoring of state Bureau of Surveying and Mapping, china University of Mining and Technology, Xuzhou 221116, china 2. Jiangsu key laboratory of Resources and Environmental information Engineering, china University of Mining and Technology, Xuzhou 221116, china [a] key laboratory for Land Environment and Disaster Monitoring of state Bureau of Surveying and Mapping China University of Mining and Technology Xuzhou 221116 China [b] Jiangsu key laboratory of Resources and Environmental information Engineering China University of Mining and Technology Xuzhou 221116 China
In order to know the maximum mining ground deformation of arbitrary surface point, directions of the maximum surface tilt, curvature,horizontal displacement and horizontal deformation caused by multi-working faces wer... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure multi-party computation protocol for sequencing problem
收藏 引用
Science china(information Sciences) 2011年 第8期54卷 1654-1662页
作者: TAng ChunMing 1,2,SHI GuiHua 1 & YAO ZhengAn 3 1 School of Mathematics and information Science,Guangzhou University,Guangzhou 510006, china 2state key laboratory of information security, Institute of Software Science,Chinese Academy of Sciences,beij.ng 100080,china 3 School of Mathematics and Computational Science,Sun Yat-Sen University,Guangzhou 510275,china 1. School of Mathematics and information Science Guangzhou University Guangzhou 510006 China2. State Key Laboratory of Information Security Institute of Software Science Chinese Academy of Sciences Beijing 100080 China3. School of Mathematics and Computational Science Sun Yat-Sen University Guangzhou 510275 China
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific *** the present study,we make use of a secret sharing sche... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new one-bit diFFerence collision attack on HAVAL-128
收藏 引用
Science china(information Sciences) 2012年 第11期55卷 2521-2529页
作者: ZHAng WenYing1,2,3,LI YanYan1 & WU Lei1 1School of information Science and Engineering,Shandong Normal University,Jinan 250014,china 2state key Lab of information security,Institute of information Engineering,Chinese Academy of Sciences,beij.ng 100093,china 3Shandong Provincial key laboratory for Novel Distributed Computer Software Technology,Jinan 250014,china 1. School of information Science and Engineering Shandong Normal University Jinan 250014 China2. State Key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China3. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
New application methods for word-oriented cryptographic primitives
收藏 引用
Science china(information Sciences) 2012年 第9期55卷 2149-2160页
作者: YAng Yang 1,2,ZEng Guang 1,2,JIN ChengHui 1 & QU YunYing 1 1 Zhengzhou information Science and Technology Institute,Zhengzhou 450002,china 2 state key laboratory of information security,Institute of Software,Chinese Academy of Sciences,beij.ng 100190,china 1. Zhengzhou information Science and Technology Institute Zhengzhou 450002 China2. State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Modern software oriented symmetric ciphers have become a key feature in utilizing word-oriented cryptographic *** the output sequence,in the order of its generation,of a word-oriented cryptographic primitive in the sa... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new relative radiometric consistency processing method for change detection based on wavelet transform and a low-pass filter
收藏 引用
Science china(Technological Sciences) 2010年 第S1期53卷 7-14页
作者: SUN KaiMin1,SUI HaiGang1,2,LI DeRen1 & XU Chuan1,2 1 state key laboratory of information Engineering in Surveying,Mapping and Remote Sensing,Wuhan University,Wuhan 430079,china 2 state key laboratory of Subtropical Building Science,South china University of Technology,Guangzhou 510640,china 1. state key laboratory of information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan 430079 China 2. state key laboratory of Subtropical Building Science South China University of Technology Guangzhou 510640 China
The research purpose of this paper is to show the limitations of the existing radiometric normalization approaches and their disadvantages in change detection of artificial objects by comparing the existing approaches... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SOME RESULTS ON GENERALIZED DIFFERENCE SETS
收藏 引用
Journal of Systems Science & Complexity 2008年 第1期21卷 76-84页
作者: Xiwang CAO School of Mathematical Science, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, china state key Lab. of information security, beij.ng 100049, china. School of Mathematical Science Nanjing University of Aeronautics Astronautics Nanjing 210016 China state key Lab. of information security Beijing 100049 China
Sequences with ideal correlation functions have important applications in communications such as CDMA, FDMA, etc. It has been shown that difference sets can be used to construct such sequences. The author extends Pott... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论