咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 2 篇 机械工程
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 2 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 ddos attack
  • 1 篇 denial of servic...
  • 1 篇 all-or-nothing t...
  • 1 篇 algorithms
  • 1 篇 secure network c...
  • 1 篇 probabilistic pa...
  • 1 篇 ip traceback
  • 1 篇 布尔函数
  • 1 篇 convolutional ne...
  • 1 篇 reflect attack
  • 1 篇 bent函数
  • 1 篇 cyber security
  • 1 篇 图像质量评价
  • 1 篇 人类视觉系统
  • 1 篇 negabent函数
  • 1 篇 主观评价
  • 1 篇 convolutional mu...
  • 1 篇 precomputation
  • 1 篇 数字水印
  • 1 篇 mason formula

机构

  • 2 篇 北京邮电大学
  • 1 篇 信息保障技术重点...
  • 1 篇 华北计算技术研究...
  • 1 篇 天津市国瑞数码安...
  • 1 篇 天柏宽带网络科技...

作者

  • 2 篇 beijing universi...
  • 2 篇 钮心忻
  • 2 篇 杨义先
  • 1 篇 3) 1national eng...
  • 1 篇 dong yan
  • 1 篇 beijing universi...
  • 1 篇 state key labora...
  • 1 篇 sen su
  • 1 篇 beijing universi...
  • 1 篇 jianfen peng~(1
  • 1 篇 2 key laboratory...
  • 1 篇 李忠献
  • 1 篇 3national engine...
  • 1 篇 蒋铭
  • 1 篇 fangchun yang st...
  • 1 篇 辛宇
  • 1 篇 马兆丰
  • 1 篇 yulong wang
  • 1 篇 任传伦
  • 1 篇 2key laboratory ...

语言

  • 5 篇 英文
  • 2 篇 中文
检索条件"作者=2key laboratory of Network and information Attack and Defence technology of MOE, beijing university of posts and telecommunications, beijing 100876, china"
7 条 记 录,以下是1-10 订阅
排序:
Secure network coding in the presence of eavesdroppers
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1information Security Center, State key laboratory of networking and Switching technology, beijing university of posts and telecommunications, beijing 100876, china 2key laboratory of network and information attack and defence technology of moe, beijing university of posts and telecommunications, beijing 100876, china 3National Engineering laboratory for Disaster Backup and Recovery, beijing university of posts and telecommunications, beijing 100876, china 1. information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
基于DWT和视觉加权的图像质量评价方法研究
收藏 引用
通信学报 2011年 第9期32卷 129-136页
作者: 蒋铭 马兆丰 辛宇 钮心忻 杨义先 北京邮电大学网络与交换技术国家重点实验室信息安全中心 北京邮电大学网络与信息攻防技术教育部重点实验室 天柏宽带网络科技(北京)有限公司
提出了一种新的基于小波变换和视觉加权的图像质量客观评价方法(WVWPSNR,wavelet and vision weighted peak signal noise ratio)。该方法将图像的DWT和HVS特性相结合,利用子图分解以及视觉加权处理实现图像质量的客观评价。对多幅分别... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Construction of Convolutional network Coding for Cyclic Multicast networks
Construction of Convolutional Network Coding for Cyclic Mult...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Qin Guo~(1,2,3),Mingxing Luo~(1,2,3),Lixiang Li~(1,2,3),Licheng Wang~(1,2,3),Yixian Yang~(1,2,3) 1 information Security Center,State key laboratory of networking and Switching technology, beijing university of posts and telecommunications,beijing 100876,china 2 key laboratory of network and information attack and defence technology of moe, beijing university of posts and telecommunications,beijing 100876,china 3 National Engineering laboratory for Disaster Backup and Recovery, beijing university of posts and telecommunications,beijing 100876,china.
<正>In this paper,we present a practical algorithm to construct the convolutional multicast network coding over any finite directed cyclic *** dual line graph of a directed cyclic graph is considered as a *** regard... 详细信息
来源: cnki会议 评论
关于Negabent函数的若干结论
收藏 引用
通信学报 2011年 第8期32卷 179-182页
作者: 任传伦 刘凤梅 李忠献 钮心忻 杨义先 北京邮电大学网络与交换技术国家重点实验室信息安全中心 北京邮电大学网络与信息攻防技术教育部重点实验室 华北计算技术研究所 信息保障技术重点实验室 天津市国瑞数码安全系统有限公司
利用二次不定方程的求解,研究了Negabent函数的判别和构造问题,给出了Negabent函数的一个直观判别条件和一种间接构造法,同时,证明了一类Maiorana-McFarland bent函数不是Negabent函数。
来源: 同方期刊数据库 同方期刊数据库 评论
CYCLIC REDUNDANCY CODE CHECK ALGORITHM BASED ON SMALL LOOKUP TABLE
CYCLIC REDUNDANCY CODE CHECK ALGORITHM BASED ON SMALL LOOKUP...
收藏 引用
2009 IEEE International Conference on Communication technology and Applications(ICCTA2009)
作者: Jianfen Peng~(1 2 3) Yajian Zhou~(1 2 3) Yixian Yang~(1 2 3) 1National Engineering laboratory for Disaster Backup and Recovery beijing university of posts and telecommunications 2information Security Center State key laboratory of networking and Switching technology beijing university of posts and telecommunications 3key laboratory of network and information attack & defence technology of moe beijing university of posts and telecommunications
<正>Real time and low occupation of memory must be satisfied in the error controlling of computer *** redundancy code Generation algorithm based on small lookup table(CRCGA) is presented in this paper,which is bas... 详细信息
来源: cnki会议 评论
A Novel IP Traceback Approach with Self-Adaptive Probabilistic Packet Marking
A Novel IP Traceback Approach with Self-Adaptive Probabilist...
收藏 引用
2011 IEEE International Conference on information Theory and information Security(ICITIS 2011)
作者: Dong Yan Yulong Wang Sen Su Fangchun Yang State key laboratory of networking and Switching technology beijing university of posts and telecommunications beijing china
IP traceback is an important step to defend the Internet against Denial of Service (DoS) *** packet marking is considered to be a promising approach to realize IP traceback with little *** this paper,we propose a no... 详细信息
来源: cnki会议 评论
DRDoS Threat Analysis Based on Magnification Factor and Diffusion Factor
DRDoS Threat Analysis Based on Magnification Factor and Diff...
收藏 引用
第一届中国高校通信类院系学术研讨会
作者: Li Ji Hu Ying Zheng Kangfeng Xiu Xinxin Yang Yixian information security center,State key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing 100876
<正>As a new kind of DDoS attack method,DRDoS (Distributed Reflect Denial of Service)is easy to launch, but difficult to trace back and *** this paper,the identical properties and possible scenes of DRDoS are disc... 详细信息
来源: cnki会议 评论