咨询与建议

限定检索结果

文献类型

  • 91 篇 期刊文献
  • 38 篇 会议

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 36 篇 信息与通信工程
    • 36 篇 计算机科学与技术...
    • 25 篇 仪器科学与技术
    • 25 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 14 篇 软件工程
    • 10 篇 机械工程
    • 8 篇 光学工程
    • 7 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 交通运输工程
  • 24 篇 理学
    • 17 篇 物理学
    • 6 篇 数学
    • 2 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 统计学(可授理学、...
  • 20 篇 管理学
    • 20 篇 管理科学与工程(可...
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 9 篇 quantum
  • 5 篇 sharing
  • 4 篇 cryptography
  • 4 篇 threshold
  • 4 篇 secret
  • 2 篇 asn.1
  • 2 篇 single
  • 2 篇 xml
  • 2 篇 communication
  • 2 篇 模型
  • 2 篇 channel estimati...
  • 2 篇 load-balancing a...
  • 2 篇 state
  • 2 篇 signature
  • 2 篇 direct
  • 2 篇 system
  • 2 篇 authentication
  • 2 篇 heterogeneous cl...
  • 2 篇 移动代理
  • 2 篇 security

机构

  • 17 篇 北京邮电大学
  • 8 篇 state key labora...
  • 7 篇 state key labora...
  • 7 篇 school of scienc...
  • 6 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 2 篇 南京邮电学院
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 information secu...
  • 2 篇 key laboratory o...
  • 2 篇 state key lab of...
  • 1 篇 china mobile inf...
  • 1 篇 NOT FOUND
  • 1 篇 statekeylaborato...
  • 1 篇 national mobile ...
  • 1 篇 opt.
  • 1 篇 state key labora...

作者

  • 13 篇 china
  • 9 篇 beijing
  • 8 篇 杨义先
  • 7 篇 beijing universi...
  • 4 篇 钮心忻
  • 3 篇 苏森
  • 3 篇 廖建新
  • 3 篇 3 school of scie...
  • 3 篇 马兆丰
  • 3 篇 王励成
  • 3 篇 beijing 100876
  • 2 篇 胡正名
  • 2 篇 3 state key labo...
  • 2 篇 王汝传
  • 2 篇 4 state key labo...
  • 2 篇 陈俊亮
  • 2 篇 yang yuguang1 2 ...
  • 2 篇 余重秀
  • 2 篇 苑金辉
  • 2 篇 桑新柱

语言

  • 106 篇 英文
  • 23 篇 中文
检索条件"作者=4 State key laboratory of networking and Switching technology,beijing University of Posts and Tele-communications,beijing 100876,china"
129 条 记 录,以下是1-10 订阅
排序:
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology, beijing university of technology, beijing 100124, china 2 state key laboratory of Integrated Services Network, Xidian university, Xi’an 710071, china 3 state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences), beijing 100049, china 4 state key laboratory of networking and switching technology, beijing university of posts and tele-communications, beijing 100876, china College of Computer Science and technology Beijing University of Technology Beijing China state key laboratory of Integrated Services Network Xidian University Xi’an China state key laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing China state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology,beijing university of technology,beijing 100124,china 2 state key laboratory of Integrated Services Network,Xidian university,Xi’an 710071,china 3 state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences),beijing 100049,china 4 state key laboratory of networking and switching technology,beijing university of posts and tele-communications,beijing 100876,china College of Computer Science and technology Beijing University of Technology Beijing China state key laboratory of Integrated Services Network Xidian University Xi’an China state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing China state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Search recommendation model based on user search behavior and gradual forgetting collaborative filtering strategy
收藏 引用
The Journal of china Universities of posts and telecommunications 2010年 第3期17卷 110-117页
作者: LIU Chuan-chang state key laboratory of networking and switching technology, beijing university of posts and telecommunications, beijing 100876, china state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
The existing search engines are lack of the consideration of personalization and display the same search results for different users despite their differences in interesting and purpose. By analyzing user's dynamic s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer Science and technology,beijing university of technology,beijing 100124,china 2 state key laboratory of networking and switching technology,beijing university of posts and tele-communications,beijing 100876,china 3 state key laboratory of Integrated Services Network,Xidian university,Xi’an 710071,china 4 state key laboratory of Information Security(Graduate university of Chinese Academy of Sciences) ,beijing 100049,china College of Computer Science and technology Beijing University of Technology Beijing China state key laboratory of Integrated Services Network Xidian University Xi’an China state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing China state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Modified chaotic ant swarm to function optimization
收藏 引用
The Journal of china Universities of posts and telecommunications 2009年 第1期16卷 58-63页
作者: LI Yu-ying , WEN Qiao-yan, LI Li-xiang state key laboratory of networking and switching technology, beijing university of posts and telecommunications, beijing 100876, china state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
The chaotic ant swarm algorithm (CAS) is an optimization algorithm based on swarm intelligence theory, and it is inspired by the chaotic and self-organizing behavior of the ants in nature. Based on the analysis of t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Automatic composition of information-providing web services based on query rewriting
收藏 引用
Science china(Information Sciences) 2012年 第11期55卷 2428-2444页
作者: ZHAO WenFeng,LIU ChuanChang & CHEN JunLiang state key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing 100876,china state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing China
Compared with normal web services,information-providing services have unique features that have seldom been considered in existing research on the automatic composition of web *** this paper,we present a simple,yet we... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamic weighted random load balancing algorithm for SIP application server
收藏 引用
The Journal of china Universities of posts and telecommunications 2009年 第4期16卷 67-70页
作者: TENG Sheng-bo,LIAO Jian-xin,ZHU Xiao-min state key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing 100876,china state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
A new load balancing algorithm named dynamic weighed random (DWR) algorithm for the session initiation protocol (SIP) application server cluster is proposed. It uses weighted hashing random algorithm that supports... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Context-aware end-to-end QoS diagnosis and quantitative guarantee based on Bayesian network
收藏 引用
The Journal of china Universities of posts and telecommunications 2010年 第6期17卷 106-112页
作者: LIN Xiang-tao,CHNEG Bo,CHEN Jun-liang,QIAO Xiu-quan state key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing 100876,china state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
To support quality of service (QoS) management on current Internet working with best effort,we bring forth a systematic approach for end-to-end QoS diagnosis and quantitative guarantee. For QoS diagnosis,we take con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Relaying strategy for peer-to-peer content distribution based on genetic algorithm
收藏 引用
The Journal of china Universities of posts and telecommunications 2010年 第2期17卷 85-91页
作者: HE Qian ,MENG Xiang-wu,SHANG Yan-lei,CHEN Jun-liang state key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing 100876,china state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
This article proposes a cooperative relaying strategy to efficiently utilize the relaying resources of Interact service providers (ISPs), speedup distribution and save server bandwidth costs. ISPs cooperatively rela... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Detecting feature interactions in Web services with model checking techniques
收藏 引用
The Journal of china Universities of posts and telecommunications 2007年 第3期14卷 108-112页
作者: ZHANG Jian-yin,YANG Fang-chun,SU Sen state key laboratory of networking and switching technology,beijing university of posts and telecommunications,beijing 100876,china state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
As a platform-independent software system,a Web service is designed to offer interoperability among diverse and heterogeneous *** the introduction of service composition in the Web service creation,various message int... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论