咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 2 篇 机械工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 信息与通信工程
    • 1 篇 交通运输工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 data stream clus...
  • 1 篇 homomorphic encr...
  • 1 篇 all-or-nothing t...
  • 1 篇 algorithms
  • 1 篇 energy comparing
  • 1 篇 secure network c...
  • 1 篇 纹理特征
  • 1 篇 traffic identifi...
  • 1 篇 digital rights m...
  • 1 篇 desktop virtuali...
  • 1 篇 convolutional ne...
  • 1 篇 disaster backup
  • 1 篇 storage optimiza...
  • 1 篇 attribute-based ...
  • 1 篇 audio water-mark...
  • 1 篇 h.264/avc
  • 1 篇 视频顽健水印
  • 1 篇 能量差
  • 1 篇 convolutional mu...
  • 1 篇 zero-watermark

机构

  • 1 篇 national enginee...
  • 1 篇 college of infor...
  • 1 篇 state key labora...
  • 1 篇 信息网络安全公安...
  • 1 篇 national enginee...
  • 1 篇 information secu...
  • 1 篇 school of comput...
  • 1 篇 北京邮电大学
  • 1 篇 school of comput...
  • 1 篇 information secu...

作者

  • 2 篇 beijing universi...
  • 1 篇 xiao da
  • 1 篇 china 3 beijing ...
  • 1 篇 张维纬
  • 1 篇 3) 1national eng...
  • 1 篇 cheng mingzhi
  • 1 篇 beijing universi...
  • 1 篇 state key labora...
  • 1 篇 liu bohuai
  • 1 篇 zhengming hu 1 1...
  • 1 篇 张茹
  • 1 篇 xiao lim in
  • 1 篇 beijing universi...
  • 1 篇 jianfen peng~(1
  • 1 篇 zhu mingfa
  • 1 篇 2 key laboratory...
  • 1 篇 3national engine...
  • 1 篇 yang xin 1
  • 1 篇 huang qinlong
  • 1 篇 yang yu

语言

  • 4 篇 英文
  • 4 篇 中文
检索条件"作者=3National Engineering laboratory for Disaster Backup and Recovery, beijing university of posts and telecommunications, beijing 100876, china"
8 条 记 录,以下是1-10 订阅
排序:
Secure network coding in the presence of eavesdroppers
收藏 引用
Science china(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1Information Security Center, State Key laboratory of Networking and Switching Technology, beijing university of posts and telecommunications, beijing 100876, china 2Key laboratory of Network and Information Attack and Defence Technology of MOE, beijing university of posts and telecommunications, beijing 100876, china 3national engineering laboratory for disaster backup and recovery, beijing university of posts and telecommunications, beijing 100876, china 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing
收藏 引用
china Communications 2014年 第4期11卷 50-63页
作者: HUANG Qinlong Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China national engineering laboratory for disaster backup and recovery Beijing University of Posts and Telecommunications Beijing 100876 China
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption ***,these schemes suffer from inefficiency and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Construction of Convolutional Network Coding for Cyclic Multicast Networks
Construction of Convolutional Network Coding for Cyclic Mult...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Qin Guo~(1,2,3),Mingxing Luo~(1,2,3),Lixiang Li~(1,2,3),Licheng Wang~(1,2,3),Yixian Yang~(1,2,3) 1 Information Security Center,State Key laboratory of Networking and Switching Technology, beijing university of posts and telecommunications,beijing 100876,china 2 Key laboratory of Network and Information Attack and Defence Technology of MOE, beijing university of posts and telecommunications,beijing 100876,china 3 national engineering laboratory for disaster backup and recovery, beijing university of posts and telecommunications,beijing 100876,china.
<正>In this paper,we present a practical algorithm to construct the convolutional multicast network coding over any finite directed cyclic *** dual line graph of a directed cyclic graph is considered as a *** regard... 详细信息
来源: cnki会议 评论
DYNAMIC ONLINE TRAFFIC IDENTIFICATION SCHEME BASED ON DATA STREAM CLUSTERING ALGORITHM
DYNAMIC ONLINE TRAFFIC IDENTIFICATION SCHEME BASED ON DATA S...
收藏 引用
2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
作者: Dan Li 1 2 3 Xiaobo Xu 1 2 Yang Xin 1 2 Zhengming Hu 1 1 Information Security Center beijing university of posts and telecommunications beijing 100876 china 2 national engineering laboratory for disaster backup and recovery beijing 100876 china 3 beijing Safe-Code Technology Co.Ltd. beijing 100876 china
Although researches on network traffic identification have already got some achievements, but most of them are not suitable for online traffic classification by considered the dynamic feature of *** this paper,we prop... 详细信息
来源: cnki会议 评论
CYCLIC REDUNDANCY CODE CHECK ALGORITHM BASED ON SMALL LOOKUP TABLE
CYCLIC REDUNDANCY CODE CHECK ALGORITHM BASED ON SMALL LOOKUP...
收藏 引用
2009 IEEE International Conference on Communication Technology and Applications(ICCTA2009)
作者: Jianfen Peng~(1 2 3) Yajian Zhou~(1 2 3) Yixian Yang~(1 2 3) 1national engineering laboratory for disaster backup and recovery beijing university of posts and telecommunications 2Information Security Center State Key laboratory of Networking and Switching Technology beijing university of posts and telecommunications 3Key laboratory of network and information attack & defence technology of MOE beijing university of posts and telecommunications
<正>Real time and low occupation of memory must be satisfied in the error controlling of computer *** redundancy code Generation algorithm based on small lookup table(CRCGA) is presented in this paper,which is bas... 详细信息
来源: cnki会议 评论
基于纹理特征的H.264/AVC顽健视频水印算法
收藏 引用
通信学报 2012年 第3期33卷 82-89页
作者: 张维纬 张茹 刘建毅 钮心忻 杨义先 北京邮电大学信息安全中心 北京100876 北京邮电大学灾备技术国家工程实验室 北京100876 信息网络安全公安部重点实验室(公安部第三研究所) 上海201204
在分析现有视频水印算法的基础上,结合H.264压缩编码标准的特性,提出了一种新的基于纹理特征的视频顽健水印算法。算法先对当前帧4×4块进行整数离散余弦变换,判断其是否是纹理块,再采用能量差的方式自适应选择系数嵌入水印。实验结果表... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Audio Zero-Watermark Scheme Based on Energy Comparing
收藏 引用
china Communications 2014年 第7期11卷 110-116页
作者: YANG Yu LEI Min CHENG Mingzhi LIU Bohuai LIN Guoyuan XIAO Da Information Security Center Beijing University of Posts and Telecommunications Beijing China College of Information engineering Beijing Institute of Graphic Communication Beijing China national engineering laboratory for disaster backup and recovery Beijing China School of Computer Science and Technology China University of Mining and Technology China
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of ***,there is little research on audio *** paper proposes an audio zero-watermark scheme base... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Content Addressable Storage Optimization for Desktop Virtualization Based disaster backup Storage System
收藏 引用
china Communications 2012年 第7期9卷 1-13页
作者: Ruan Li Xiao Lim in Zhu Mingfa State Key laboratory of Software Development Environment Beijing 100191 P. R. China School of Computer Science and engineering Beihang University Beijing 100191 P. R. China
This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by em... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论