咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 6 篇 网络空间安全
    • 5 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 1 篇 计算机安全
  • 1 篇 side channel att...
  • 1 篇 立体视觉法
  • 1 篇 移动agent
  • 1 篇 摄像机
  • 1 篇 opti- mum and lc...
  • 1 篇 图像监控
  • 1 篇 deterministic se...
  • 1 篇 identity delegat...
  • 1 篇 hybrid decoder
  • 1 篇 differential pow...
  • 1 篇 反射技术
  • 1 篇 wireless vehicle...
  • 1 篇 立体监控系统标定
  • 1 篇 数学模型
  • 1 篇 cryptography
  • 1 篇 hybrid embedding...
  • 1 篇 post-quantum cry...
  • 1 篇 network sensing ...
  • 1 篇 安全保障机制

机构

  • 1 篇 1. the key labor...
  • 1 篇 department of co...
  • 1 篇 苏州大学
  • 1 篇 苏州科技大学
  • 1 篇 苏州市公安局
  • 1 篇 1. school of com...
  • 1 篇 school of comput...
  • 1 篇 电子科技大学
  • 1 篇 武汉大学
  • 1 篇 department of so...
  • 1 篇 西安科技大学

作者

  • 1 篇 杨仕平
  • 1 篇 china 210044shig...
  • 1 篇 liang wei
  • 1 篇 2school of compu...
  • 1 篇 熊光泽
  • 1 篇 桑楠
  • 1 篇 吴新勇
  • 1 篇 ruan zhiqiang
  • 1 篇 3college of info...
  • 1 篇 china 210044
  • 1 篇 吴宏杰
  • 1 篇 jinwei wang jian...
  • 1 篇 丁志平
  • 1 篇 张春森
  • 1 篇 李铭华
  • 1 篇 潘和平
  • 1 篇 china 10080 leim...
  • 1 篇 li peng
  • 1 篇 2 state key labo...
  • 1 篇 戴大东

语言

  • 6 篇 英文
  • 3 篇 中文
检索条件"作者=3 Centre for Computer and Information Security Research School of Computer Science and Software Engineering university of wollongong,wollongong,nsw 2522,australia"
9 条 记 录,以下是1-10 订阅
排序:
Polar differential power attacks and evaluation
收藏 引用
science China(information sciences) 2012年 第7期55卷 1588-1604页
作者: TANG Ming 1 ,QIU ZhenLong 1 ,GAO Si 1,2 ,YI Mu 3 ,LIU ShuBo 1 ,ZHANG HuanGuo 1 & JIN YingZhen 1 1 school of computer science,Wuhan university,Wuhan 430072,China 2 State Key Laboratory of information security,Institute of software,Chinese Academy of sciences,Beijing 100190,China 3 centre for computer and information security research school of computer science and software engineering university of wollongong,wollongong,nsw 2522,australia 1. school of computer science Wuhan University Wuhan 430072 China2. State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China3. Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia
Side channel attacks (SCAs) on security software and hardware have become major concerns on computer and system *** existing SCAs generally require the knowledge of the corresponding cryptographic algorithm and implem... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Deterministic secure quantum communication without unitary operation based on high-dimensional entanglement swapping
收藏 引用
science China(information sciences) 2012年 第2期55卷 360-367页
作者: LIU ZhiHao1,CHEN HanWu1,LIU WenJie2,XU Juan1 & LI ZhiQiang3 1school of computer science and engineering,Southeast university,Nanjing 211189,China 2school of computer and software,Nanjing university of information science & Technology,Nanjing 210044,China 3College of information engineering,Yangzhou university,Yangzhou 225009,China 1. school of computer science and engineering Southeast University Nanjing 211189 China2. School of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China3. College of Information Engineering Yangzhou University Yangzhou 225009 China
By analysis of the basic properties of entanglement swapping of high-dimensional Bell states,a universal and general deterministic secure quantum communication(DSQC)protocol is proposed,in which unitary operation is n... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles
收藏 引用
China Communications 2016年 第2期13卷 121-129页
作者: LIANG Wei RUAN Zhiqiang TANG Mingdong LI Peng Department of software engineering Xiamen University of TechnologyXiamenFujian361024China Department of computer science Minjiang UniversityFuzhouFujian 350108China school of computer science and engineering Hunan University of Science and TechnologyXiangtan 411201China
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of ***,other performance requirements such as life cycle of nodes,stability and security are not set as prima... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Extended multivariate public key cryptosystems with secure encryption function
收藏 引用
science China(information sciences) 2011年 第6期54卷 1161-1171页
作者: WANG HouZhen 1,2 , ZHANG HuanGuo 1,2 , WANG ZhangYi 1,2 & TANG Ming 1,2 1 The Key Laboratory of Aerospace information security and Trusted Computing, Ministry of Education, school of computer, Wuhan university, Wuhan 430079, China 2 State Key Laboratory of software engineering, Wuhan university, Wuhan 430072, China 1. The Key Laboratory of Aerospace information security and Trusted Computing Ministry of Education School of Computer Wuhan University Wuhan 430079 China2. State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational pow... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Hybrid Multiplicative Watermarking and Its Decoders
Hybrid Multiplicative Watermarking and Its Decoders
收藏 引用
第三届多媒体信息网络与安全国际会议
作者: Jinwei Wang Jiangsu engineering Center of Network Monitoring school of computer and software Nanjing university of information science and Technology Nanjing China 210044Shiguo Lian France Telecom research and Development (Orange Labs) Beijing Beijing China 10080 Leiming Yan and Yuxiang Wang school of computer and software Nanjing university of information science and Technology Nanjing China 210044
With the rapid development and the richer content of the Internet, the copyright protection of the works should be further developed. The watermarking has become a possible solution. In this paper, firstly, a novel hy... 详细信息
来源: cnki会议 评论
The Authentication and Identity Delegation about Mobile Agent System based on Trusted Computing Platform
The Authentication and Identity Delegation about Mobile Agen...
收藏 引用
2010 3rd IEEE International Conference on computer science and information Technology—ICCSIT 2010
作者: Zhidong Shen International school of software State Key Laboratory of software engineering Wuhan university Wuhan China 430079 Xiaoping Wu school of computer Wuhan university Wuhan China 430079
In the mobile agent system, the authentication and identity delegation of mobile agents are the important security problem. This paper focuses on the issues faced by a relying party when deciding to trust a CA and the... 详细信息
来源: cnki会议 评论
基于量测的立体监控系统标定
收藏 引用
计算机工程与应用 2003年 第4期39卷 18-21页
作者: 张春森 潘和平 武汉大学遥感信息学院数字智能研究中心 西安科技大学测量系 西安710000
图像监控已广泛地应用于银行保安、交通管理及工业生产等领域,其所采取的工作方式多为被动式的,毫无智能定量可言。作者尝试将能对被摄物体进行定量处理的摄影测量引入图像监控中,进行必要时的立体量测。该文提出采用摄影测量方法对此... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
基于多级关键度的高可信安全关键系统
收藏 引用
系统工程与电子技术 2004年 第2期26卷 277-282页
作者: 杨仕平 桑楠 吴新勇 熊光泽 电子科技大学计算机科学与工程学院 四川成都610054
为增强安全关键系统的可信性,在分析高可信保障机制现状的基础上,提出了一种集成式的高可信保障体系结构。为防止不同关键度子系统间的有害干扰,在分析信息安全领域内多级安全保障机制的基础上,研究了不同关键度子系统相互作用时应遵守... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
基于移动Agent的停车诱导云平台的研究与应用
收藏 引用
计算机应用与软件 2018年 第7期35卷 142-147页
作者: 戴大东 吴宏杰 陆悠 李铭华 丁志平 苏州科技大学电子与信息工程学院 江苏苏州215009 苏州大学江苏省计算机信息处理技术重点实验室 江苏苏州215006 苏州市公安局 江苏苏州215006
现实的多停车场资源统一诱导系统中,由于停车硬件厂商、归属、开放时间、收费标准都难以统一,导致系统中停车资源异构、智能计算能力弱、第三方接入困难、安全级别较低等问题。针对这些问题,提出一种基于移动Agent的停车诱导云平台,利用... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论