咨询与建议

限定检索结果

文献类型

  • 711 篇 期刊文献
  • 320 篇 会议

馆藏范围

  • 1,031 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 835 篇 工学
    • 309 篇 计算机科学与技术...
    • 222 篇 信息与通信工程
    • 183 篇 电气工程
    • 157 篇 网络空间安全
    • 117 篇 材料科学与工程(可...
    • 115 篇 电子科学与技术(可...
    • 94 篇 机械工程
    • 93 篇 仪器科学与技术
    • 91 篇 控制科学与工程
    • 64 篇 地质资源与地质工...
    • 64 篇 软件工程
    • 53 篇 测绘科学与技术
    • 49 篇 环境科学与工程(可...
    • 47 篇 水利工程
    • 42 篇 航空宇航科学与技...
    • 39 篇 化学工程与技术
    • 35 篇 光学工程
    • 34 篇 动力工程及工程热...
  • 408 篇 理学
    • 101 篇 数学
    • 98 篇 物理学
    • 71 篇 天文学
    • 63 篇 生物学
    • 54 篇 地球物理学
    • 44 篇 化学
    • 43 篇 地质学
    • 34 篇 生态学
    • 32 篇 系统科学
  • 102 篇 管理学
    • 68 篇 管理科学与工程(可...
  • 91 篇 农学
    • 46 篇 农业资源与环境
  • 54 篇 军事学
    • 53 篇 军队指挥学
  • 30 篇 医学
  • 14 篇 经济学
  • 14 篇 法学
  • 10 篇 艺术学
  • 5 篇 教育学
  • 3 篇 哲学
  • 3 篇 文学

主题

  • 14 篇 cryptography
  • 13 篇 quantum
  • 11 篇 model
  • 11 篇 信息安全
  • 10 篇 of
  • 8 篇 中国
  • 8 篇 gis
  • 8 篇 sharing
  • 8 篇 网络安全
  • 7 篇 simulation
  • 7 篇 remote sensing
  • 7 篇 authentication
  • 7 篇 secret
  • 6 篇 optimization
  • 6 篇 数字签名
  • 6 篇 密码学
  • 6 篇 function
  • 6 篇 and
  • 6 篇 information
  • 6 篇 计算机网络

机构

  • 22 篇 中国科学院研究生...
  • 21 篇 中国科学院大学
  • 15 篇 清华大学
  • 15 篇 北京邮电大学
  • 13 篇 中国科技大学
  • 12 篇 中国科学技术大学
  • 11 篇 state key labora...
  • 9 篇 北京交通大学
  • 9 篇 中国科学院地理科...
  • 7 篇 南京信息工程大学
  • 7 篇 college of compu...
  • 7 篇 北京师范大学
  • 6 篇 key laboratory o...
  • 6 篇 中国科学院研究生...
  • 6 篇 北京航空航天大学
  • 6 篇 state key labora...
  • 6 篇 西安电子科技大学
  • 6 篇 哈尔滨工业大学
  • 6 篇 武汉大学
  • 5 篇 信息安全国家重点...

作者

  • 99 篇 china
  • 28 篇 beijing
  • 18 篇 吕述望
  • 13 篇 杨义先
  • 12 篇 冯登国
  • 10 篇 tsinghua univers...
  • 9 篇 chinese academy ...
  • 8 篇 p.r.china
  • 8 篇 beijing jiaotong...
  • 7 篇 beijing 100084
  • 6 篇 shanghai
  • 6 篇 china)
  • 6 篇 钮心忻
  • 5 篇 beijing universi...
  • 4 篇 方滨兴
  • 4 篇 刘振华
  • 4 篇 胡铭曾
  • 4 篇 ministry of educ...
  • 4 篇 2 school of comp...
  • 3 篇 2 graduate unive...

语言

  • 728 篇 英文
  • 303 篇 中文
检索条件"作者=3.State Key Laboratory of Information Security ,beijing {13.,china"
1031 条 记 录,以下是21-30 订阅
排序:
Characteristics of fluid substitution in porous rocks
收藏 引用
Petroleum Science 2009年 第2期6卷 139-145页
作者: Li Shengjie School of Resource and information Technology China University of Petroleum Beijing 102249 China state key laboratory of Petroleum Resource and Prospecting China University of Petroleum Beijing 102249 China key laboratory of CNPC Geophysical Exploration China University of Petroleum Beijing 102249 China
Analysis of the effect of changes in fluid properties of rocks on the compressional-wave velocity VP and shear-wave velocity Vs is very important for understanding the rock physical properties, especially in oilfield ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
CMQV+:An authenticated key exchange protocol from CMQV
收藏 引用
Science china(information Sciences) 2012年 第7期55卷 1666-1674页
作者: LI Hui 1,2 & WU ChuanKun 1 1 state key laboratory of information security,Institute of Software,Chinese Academy of Sciences,beijing 100190,china 2 Graduate University of Chinese Academy of Sciences,beijing 100049,china state key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing China Graduate University of Chinese Academy of Sciences Beijing China
Ustaoglu presents a secure and efficient key exchange protocol named CMQV,based on the design rationales of HMQV and *** with the latter two protocols,on one hand,CMQV achieves high performance of HMQV,and on the othe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1information security Center, state key laboratory of Networking and Switching Technology, beijing University of Posts and Telecommunications, beijing 100876, china 2key laboratory of Network and information Attack and Defence Technology of MOE, beijing University of Posts and Telecommunications, beijing 100876, china 3National Engineering laboratory for Disaster Backup and Recovery, beijing University of Posts and Telecommunications, beijing 100876, china information security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications key laboratory of Network and information Attack and Defence Technology of MOE Beijing University of Posts and T
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A two-round honest-verifier zero-knowledge protocol
收藏 引用
Science china(information Sciences) 2010年 第5期53卷 954-963页
作者: LIU HanWu 1,2 & LIN DongDai 1 1 The state key laboratory of information security, Institute of Software, Chinese Academy of Sciences, beijing 100190, china 2 Graduate University of the Chinese Academy of Sciences, beijing 100049, china The state key laboratory of information security Institute of Software Chinese Academy of Sciences Graduate University of the Chinese Academy of Sciences
Since the concept of zero-knowledge protocols was introduced, it has attracted a lot of attention and in turn showed significant effect on the development of cryptography, complexity theory and other areas. The round ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Wide/narrow azimuth acquisition footprints and their effects on seismic imaging
收藏 引用
Petroleum Science 2008年 第4期5卷 308-313页
作者: Di Bangrang Xu Xiucang Wei Jianxin key laboratory of CNPC Geophysical Exploration China University of Petroleum Beijing 102249 China state key laboratory of Petroleum Resource and Prospecting China University of Petroleum Beijing 102249 China key laboratory of Earth Prospecting and information Technology China University of Petroleum Beijing 102249 China
Acquisition footprint is a new concept to describe the seismic noise in three-dimensional seismic exploration and it is closely related to geometry and observation shuttering. At present, the study on acquisition foot... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Study on NDVI-T_s space by combining LAI and evapotranspiration
收藏 引用
Science china Earth Sciences 2006年 第7期49卷 747-754页
作者: HAN Lijuan1,2,3, WANG Pengxin4, YANG Hua1,2,3, LIU Shaomin1,2,3 & WANG Jindi1,2,3 1. Research Center for Remote Sensing and GIS, School of Geography, beijing Normal University, beijing 100875, china 2. state key laboratory of Remote Sensing Science, beijing 100875, china 3. beijing key laboratory for Remote Sensing of Environment and Digital Cities, beijing 100875, china 4. Department of {13. Management, College of {13. and Electronic Engineering, china Agricultural University, beijing 100083, china Research Center for Remote Sensing and GIS School of Geography Beijing Normal University Beijing China state key laboratory of Remote Sensing Science Beijing China beijing key laboratory for Remote Sensing of Environment and Digital Cities Beijing China Department of information Management College of Information and Electronic Engineering China Agricultural University Beijing China
This paper focuses on interpreting the different spatial relationships between NDVI and Ts, a triangular or a trapezoid, and on analyzing transformation conditions, the physical and ecological meanings of the vegetati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Leakproof secret sharing protocols with applications to group identification scheme
收藏 引用
Science china(information Sciences) 2012年 第5期55卷 1172-1185页
作者: TANG ChunMing 1,2 & GAO ShuHong 3 1 School of Mathematics and information Science,Guangzhou University,Guangzhou 510006,china 2 state key laboratory of information security,Institute of Software Science,Chinese Academy of Sciences,beijing 100049,china 3 Department of Mathematical Sciences,Clemson University,SC 29634,USA School of Mathematics and information Science Guangzhou University state key laboratory of information security Institute of Software Science Chinese Academy of Sciences Department of Mathematical Sciences Clemson University
In a traditional (t,n)-threshold secret sharing scheme,t or more honest participants can reconstruct the secret *** the reconstruction process,the individual shares and the secret key K are revealed,hence K is shared ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Sensor-Service Collaboration Approach for Target Tracking in Wireless Camera Networks
收藏 引用
china Communications 2017年 第7期14卷 44-56页
作者: Shuai Zhao Le Yu state key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications china Mobile information security Center
Mobile target tracking is a necessary function of some emerging application domains, such as virtual reality, smart home and intelligent healthcare. However, existing portable devices for target tracking are resource ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A construction of hyperbent functions with polynomial trace form
收藏 引用
Science china Mathematics 2011年 第10期54卷 2229-2234页
作者: CAO XiWang1,2,3,& HU Lei3 1Department of Mathematics,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,china 2LMIB of Ministry of Education,beijing University of Aeronautics and Astronautics,beijing 100191,china 3state key laboratory of information security,Graduate School of Chinese Academy of Sciences,beijing 100049,china Department of Mathematics Nanjing University of Aeronautics and Astronautics LMIB of Ministry of Education Beijing University of Aeronautics and Astronautics state key laboratory of information security Graduate School of Chinese Academy of Sciences
This paper presents a construction of infinite classes of binary and p-ary hyperbent functions of polynomial trace form,based on finding a zero of a Kloosterman sum.
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Round-optimal zero-knowledge proofs of knowledge for NP
收藏 引用
Science china(information Sciences) 2012年 第11期55卷 2473-2484页
作者: LI HongDa1,FENG DengGuo2,LI Bao1 & XUE HaiXia1 1state key Lab of information security,Graduate University of Chinese Academy of Sciences,beijing 100049,china 2state key Lab of information security,Institute of software of Chinese Academy of Sciences,beijing 100080,china state key Lab of information security Graduate University of Chinese Academy of Sciences Beijing China state key Lab of information security Institute of software of Chinese Academy of Sciences Beijing China
It is well known that all the known black-box zero-knowledge proofs of knowledge for NP are *** there exit constant-round black-box zero-knowledge proofs of knowledge for all NP languages under certain standard assump... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论