咨询与建议

限定检索结果

文献类型

  • 317 篇 期刊文献
  • 194 篇 会议

馆藏范围

  • 511 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 360 篇 工学
    • 102 篇 计算机科学与技术...
    • 94 篇 网络空间安全
    • 55 篇 控制科学与工程
    • 46 篇 软件工程
    • 42 篇 信息与通信工程
    • 39 篇 机械工程
    • 38 篇 仪器科学与技术
    • 34 篇 电子科学与技术(可...
    • 11 篇 光学工程
    • 10 篇 地质资源与地质工...
    • 9 篇 电气工程
    • 9 篇 航空宇航科学与技...
    • 8 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 7 篇 环境科学与工程(可...
  • 150 篇 理学
    • 67 篇 数学
    • 27 篇 系统科学
    • 19 篇 物理学
    • 10 篇 大气科学
    • 8 篇 生物学
    • 6 篇 地球物理学
    • 6 篇 生态学
    • 5 篇 地质学
  • 48 篇 管理学
    • 41 篇 管理科学与工程(可...
  • 30 篇 军事学
    • 30 篇 军队指挥学
  • 28 篇 医学
    • 18 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 25 篇 农学
    • 9 篇 农业资源与环境
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 8 篇 艺术学
    • 8 篇 设计学(可授艺术学...
  • 3 篇 教育学
  • 1 篇 哲学
  • 1 篇 法学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 9 篇 密码学
  • 9 篇 网络安全
  • 9 篇 quantum
  • 8 篇 cryptography
  • 6 篇 sharing
  • 6 篇 authentication
  • 5 篇 of
  • 5 篇 计算机网络
  • 5 篇 信息安全
  • 5 篇 china
  • 5 篇 secret
  • 4 篇 model
  • 4 篇 signature
  • 4 篇 保密通信
  • 4 篇 function
  • 4 篇 threshold
  • 4 篇 stream cipher
  • 4 篇 cryptanalysis
  • 4 篇 密码协议
  • 4 篇 information secu...

机构

  • 21 篇 中国科学院研究生...
  • 20 篇 中国科学院大学
  • 12 篇 中国科技大学
  • 9 篇 中国科学技术大学
  • 9 篇 北京邮电大学
  • 8 篇 中国科学院研究生...
  • 8 篇 北京大学
  • 7 篇 南京信息工程大学
  • 5 篇 国家食品安全风险...
  • 5 篇 中国科学院软件研...
  • 4 篇 中国科学院计算技...
  • 4 篇 成都信息工程大学
  • 4 篇 武汉大学
  • 4 篇 中国科学院地理科...
  • 3 篇 南京邮电学院
  • 3 篇 北京交通大学
  • 3 篇 南京大学
  • 3 篇 山东大学
  • 3 篇 信息安全国家重点...
  • 3 篇 中国科学院物联网...

作者

  • 62 篇 china
  • 18 篇 beijing
  • 14 篇 吕述望
  • 12 篇 冯登国
  • 6 篇 卿斯汉
  • 6 篇 chinese academy ...
  • 5 篇 shanghai
  • 5 篇 陈君石
  • 5 篇 史忠植
  • 5 篇 陈铮鸣
  • 5 篇 余灿清
  • 5 篇 李立明
  • 5 篇 中国慢性病前瞻性...
  • 5 篇 裴培
  • 5 篇 吕筠
  • 4 篇 刘振华
  • 4 篇 p.r.china
  • 4 篇 孙点剑一
  • 4 篇 xi’an
  • 4 篇 beijing jiaotong...

语言

  • 344 篇 英文
  • 167 篇 中文
检索条件"作者=3State Key Laboratory of Information Security,Graduate school of Chinese Academy of Sciences,Beijing 100049,china"
511 条 记 录,以下是91-100 订阅
排序:
Algebraic Attack on Filter-Combiner Model keystream Generators
Algebraic Attack on Filter-Combiner Model Keystream Generato...
收藏 引用
The 1st chinese Conference on Trusted Computing and information security
作者: WU Zhi-ping. YE Ding-feng, MA Wei-ju state key laboratory of information security(graduate school of chinese academy of sciences), beijing 100039, china
<正> Algebraic attack was applied to attack Filter-Combiner model keystream generators. We proposed the technique of function composition to improve the model, and the improved model can resist the algebraic attack.... 详细信息
来源: cnki会议 评论
Study on the coating of nano-scale SiO_2 film on the surface of nanocrystalline Mg-Al layered double hydroxides
收藏 引用
Science china Chemistry 2005年 第2期48卷 107-114页
作者: ZHANG Zejiang1,2,3, MEI Xiujuan2, XU Chenghua1 & QIU Fali1 1. Chengdu Institute of Organic Chemistry, chinese academy of sciences, Chengdu 610041, china 2. Sichuan Fire Research Institute of Public security Ministry, Chengdu 611830, china 3. graduate school of the chinese academy of sciences, beijing 100039, china Correspondence should be addressed to Zhang Zejiang (email: zzjzzjzz@***) 1. Chengdu Institute of Organic Chemistry Chinese Academy of Sciences 610041 Chengdu China 2. Sichuan Fire Research Institute of Public security Ministry 611830 Chengdu China 3. graduate school of the chinese academy of sciences 100039 Beijing China
The coating process of a nano-scale SiO2 film on the nanocrystalline Mg-Al layered double hydroxides via a sol-gel process was investigated. The uniform and dense SiO2film with a thickness of about 5 nm on the nano-LD... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
人神经tau蛋白与DNA相互作用
收藏 引用
生物化学与生物物理进展 2004年 第10期31卷 918-923页
作者: 曲梅花 李辉 徐艳娟 赫荣乔 中国科学院生物物理研究所 中国科学院物理研究所
通过凝胶阻滞实验表明 ,人类神经tau能够与不同来源的DNA (λDNA ,质粒DNA以及PCR产物 )相结合 ,形成tau DNA复合物 .每分子神经tau大约与长度为 6~ 10bp的核苷酸片段结合 .原子力显微镜直接证实了tau与线性质粒DNA相结合形成串珠样的... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Spatial Distribution of Land Cover and Vegetation Activity along Topographic Gradient in an Arid River Valley, SW china
收藏 引用
Journal of Mountain Science 2009年 第3期6卷 274-285页
作者: LIU Wen XU Xianli LUO Jiancheng SHEN Zhanfeng ZHONG Qiuhai Department of Automatic Control School of Automation Beijing Institute of Technology Beijing 100081 China state key laboratory of Urban and Regional Ecology Research Center for Eco-Environmental Sciences Chinese Academy of Sciences Beijing 100085 China Institute of Remote Sensing Applications Chinese Academy of Sciences Beijing 100101 China Centre for Hydrology Micrometeorology and Climate Change Department of Civil and Environmental Engineering University College Cork Cork Ireland
Anthropogenic activities have become more and more important in characterizing the landscape, but their impacts are still restricted by natural environments. This paper discusses the interactions of anthropogenic acti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Research and Development of Worm Defense Strategies
The Research and Development of Worm Defense Strategies
收藏 引用
2010 3rd IEEE International Conference on Computer Science and information Technology—ICCSIT 2010
作者: Liuqi 1 1 state key laboratory of information security graduate University of chinese academy of Science beijing china Ma Guoqing 2 2 National key laboratory of Science and Technology on information System security beijing china
The deterioration of worm propagation on internet in recent years has pushed the research in the field of worm defense, as a result there are coming up plenty of worm defense strategies. This paper refers to make the ... 详细信息
来源: cnki会议 评论
Efficient DPCA SAR imaging with fast iterative spectrum reconstruction method
收藏 引用
Science china(information sciences) 2012年 第8期55卷 1838-1851页
作者: FANG Jian1,ZENG JinShan1,XU ZongBen1&ZHAO Yao2 1M inistry of Education key Lab for Intelligent Networks and Network security Xi'an Jiaotong University,Xi'an 710049,china 2N ational key laboratory of Science and Technology on Microwave Imaging&Institute of Electronics,chinese academy of sciences,beijing 100049,china 1. Ministry of Education key Lab for Intelligent Networks and Network security Xi’an Jiaotong University Xi’an 710049 China2. National Key Laboratory of Science and Technology on Microwave Imaging & Institute of Electronics Chinese Academy of Sciences Beijing 100049 China
The displaced phase center antenna(DPCA)technique is an effective strategy to achieve wide-swath synthetic aperture radar(SAR)imaging with high azimuth ***,traditionally,it requires strict limitation of the pulse repe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CONSENSUS CONTROL FOR LEADER-FOLLOWING MULTI-AGENT SYSTEMS WITH MEASUREMENT NOISES
收藏 引用
Journal of Systems Science & Complexity 2010年 第1期23卷 35-49页
作者: Cuiqin MA Tao LI Jifeng ZHANG school of Mathematical sciences Qufu Normal University Qufu 273165 China. key laboratory of Systems and Control Institute of Systems Science Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing 100190 China.
This work is concerned with consensus control for a class of leader-following multi-agentsystems (MASs).The information that each agent received is corrupted by measurement *** the impact of noises on consensus,time-v... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Design theory and method of multivariate hash function
收藏 引用
Science china(information sciences) 2010年 第10期53卷 1977-1987页
作者: WANG HouZhen 1,2 , ZHANG HuanGuo 1 , WU QianHong 1 , ZHANG Yu 1 , LI ChunLei 1 & ZHANG XinYu 1 1 The key laboratory of Aerospace information security and Trusted Computing, Ministry of Education, school of Computer, Wuhan University, Wuhan 430072, china 2 key laboratory of Mathematics Mechanization, beijing 100080, china 1. The key laboratory of Aerospace information security and Trusted Computing Ministry of Education School of Computer Wuhan University Wuhan 430072 China2. Key Laboratory of Mathematics Mechanization Beijing 100080 China
This paper proposes a novel hash algorithm whose security is based on the multivariate nonlinear polynomial equations of NP-hard problem over a finite field and combines with HAIFA iterative framework. Over the curren... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new perturbation algorithm and enhancing security of SFLASH signature scheme
收藏 引用
Science china(information sciences) 2010年 第4期53卷 760-768页
作者: WANG HouZhen1,2, ZHANG HuanGuo1,2*, GUAN HaiMing3 & HAN HaiQing1,2 1The key laboratory of Aerospace information security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan 430072, china 2school of Computer, Wuhan University, Wuhan 430079, china 3chinese Electronic Equipment System Corporation, beijing 100039, china 1. The key laboratory of Aerospace information security and Trusted Computing Ministry of Education Wuhan University Wuhan 430072 China2. School of Computer Wuhan University Wuhan 430079 China3. Chinese Electronic Equipment System Corporation Beijing 100039 China
This paper introduces the concept of noise factor and noise operation, and constructs a noise group. We present a new perturbation algorithm for enhancing security of multivariate public key cryptosystems (MPKCs). Eur... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The Study and Perspective of Mobile Agent security
收藏 引用
The Journal of china Universities of Posts and Telecommunications 2004年 第4期11卷 48-53页
作者: MU Honga~1 WANG Ru-chuan~(1,2) WANG Hai-yan~11.Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R.china 2.state key laboratory of information security(graduate school of chinese Aeademy of sciences),beijing 100039,P.R.china Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003
security is an important issue for the widespread deployment of applications based on software agent *** is generally agreed that without the proper countermeasures in place,use of agent-based applications will be ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论