咨询与建议

限定检索结果

文献类型

  • 189 篇 期刊文献
  • 58 篇 会议

馆藏范围

  • 247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 209 篇 工学
    • 60 篇 网络空间安全
    • 56 篇 计算机科学与技术...
    • 34 篇 仪器科学与技术
    • 32 篇 信息与通信工程
    • 28 篇 电子科学与技术(可...
    • 15 篇 软件工程
    • 13 篇 控制科学与工程
    • 12 篇 光学工程
    • 11 篇 机械工程
    • 8 篇 交通运输工程
    • 6 篇 农业工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 动力工程及工程热...
    • 3 篇 电气工程
    • 3 篇 水利工程
    • 3 篇 船舶与海洋工程
  • 36 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 6 篇 公共管理
    • 3 篇 农林经济管理
  • 28 篇 理学
    • 10 篇 物理学
    • 6 篇 数学
    • 6 篇 系统科学
    • 3 篇 生态学
  • 17 篇 军事学
    • 17 篇 军队指挥学
  • 7 篇 农学
    • 3 篇 作物学
    • 3 篇 农业资源与环境
  • 6 篇 教育学
    • 4 篇 心理学(可授教育学...
  • 5 篇 医学
  • 4 篇 经济学
    • 2 篇 理论经济学
  • 4 篇 艺术学
    • 4 篇 设计学(可授艺术学...
  • 3 篇 法学
  • 3 篇 文学
    • 3 篇 新闻传播学
  • 1 篇 哲学

主题

  • 10 篇 网络安全
  • 7 篇 quantum
  • 6 篇 设计
  • 5 篇 cryptography
  • 5 篇 公钥基础设施
  • 5 篇 计算机网络
  • 4 篇 认证
  • 4 篇 internet
  • 4 篇 信息隐藏
  • 4 篇 sharing
  • 4 篇 threshold
  • 4 篇 数字水印
  • 4 篇 secret
  • 3 篇 数据加密
  • 3 篇 空中下载
  • 3 篇 身份认证
  • 3 篇 signature
  • 3 篇 digital signatur...
  • 3 篇 认证中心
  • 3 篇 stk

机构

  • 64 篇 北京邮电大学
  • 11 篇 中国科学院大学
  • 6 篇 西安电子科技大学
  • 5 篇 清华大学
  • 4 篇 中国人民公安大学
  • 4 篇 山东大学
  • 4 篇 北京大学
  • 4 篇 公安部物证鉴定中...
  • 3 篇 华中科技大学
  • 3 篇 中国科学院物联网...
  • 3 篇 中国科学院研究生...
  • 3 篇 中国科学院高能物...
  • 3 篇 中国科学院生态环...
  • 3 篇 state key labora...
  • 2 篇 南京邮电学院
  • 2 篇 北京交通大学
  • 2 篇 首都师范大学
  • 2 篇 湖南信息技术职业...
  • 2 篇 telecommunicatio...
  • 2 篇 state key labora...

作者

  • 37 篇 杨义先
  • 24 篇 china
  • 12 篇 beijing
  • 11 篇 胡正名
  • 11 篇 钮心忻
  • 7 篇 李新
  • 6 篇 beijing universi...
  • 5 篇 李志江
  • 5 篇 张振涛
  • 4 篇 任传伦
  • 3 篇 3 school of scie...
  • 3 篇 hefei
  • 3 篇 李明柱
  • 3 篇 李作为
  • 3 篇 马兆丰
  • 3 篇 王励成
  • 3 篇 beijing 100876
  • 3 篇 张玉清
  • 2 篇 shanghai
  • 2 篇 刘传安

语言

  • 138 篇 中文
  • 109 篇 英文
检索条件"作者=Beijing university of {2. and telecommunications 2.nformation Security Center"
247 条 记 录,以下是1-10 订阅
排序:
Secure network coding in the presence of eavesdroppers
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2.3, YANG YiXian1,2.3, WANG LiCheng1,2.3 & NIU XinXin1,2.3 1Information security {2., State Key Laboratory of Networking and Switching Technology, beijing university of Posts and telecommunications, beijing 100876, China 2.ey Laboratory of Network and Information Attack and Defence Technology of MOE, beijing university of Posts and telecommunications, beijing 100876, China 3National Engineering Laboratory for Disaster Backup and Recovery, beijing university of Posts and telecommunications, beijing 100876, China 1. Information security {2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quasi-secure quantum dialogue using single photons
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2007年 第5期50卷 558-562页
作者: YANG YuGuang1,2.& WEN QiaoYan31 College of Computer Science and Technology, beijing university of Technology, beijing 10002., China 2.State Key Laboratory of Information security, Graduate university of the Chinese Academy of Sciences, beijing 100049, China 3 School of Science, beijing university of Posts and telecommunications, beijing 100876, China College of Computer Science Technology Beijing University of Technology Beijing 100022 China State Key Laboratory of Information security Graduate University of the Chinese Academy of Sciences Beijing 100049 China School of Science Beijing University of Posts telecommunications Beijing 100876 China
A quasi-secure quantum dialogue protocol using single photons was proposed. Different from the previous entanglement-based protocols, the present protocol uses batches of single photons which run back and forth betwee... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secure direct communication without entanglement
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第2期51卷 176-183页
作者: YANG YuGuang1,3 & WEN QiaoYan2.1 College of Computer Science and Technology, beijing university of Technology, beijing 10002., China 2.School of Science, beijing university of Posts and telecommunications, beijing 100876, China 3 State Key Laboratory of Information security (Graduate School of Chinese Academy of Sciences), beijing 100049, China 1. College of Computer Science and Technology Beijing University of Technology Beijing 100022 China 3. State Key Laboratory of Information security (Graduate School of Chinese Academy of Sciences) Beijing 100049 China 2. School of Science Beijing University of Posts and Telecommunications Beijing 100876 China
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and each ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Influence of magnetic current on the ground state entanglement in an isotropic transverse XY chain
收藏 引用
Progress in Natural Science:Materials International 2007年 第10期17卷 1147-1151页
作者: Liu Dan1,2., Zhang Yong3 and Long Guilu1,2.1. Key Laboratory for Atomic and Molecular NanoSciences, and Department of Physics, Tsinghua university, beijing 100084, China 2. {2. of Quantum Information Science and Technology, Tsinghua National Laboratory for information Science and Technology, beijing 100084, China 3. Institute of Physics, School of Sciences, beijing university of Posts and telecommunications, beijing 100876, China) Key Laboratory for Atomic and Molecular NanoSciences and Department of Physics Tsinghua University Beijing 100084 China center of Quantum Information Science and Technology Tsinghua National Laboratory for information Science and Technology Beijing 100084 China Institute of Physics School of Sciences Beijing University of Posts and Telecommunications Beijing 100876 China
We study the ground state entanglement in a three-qubit XY chain under the influence of a magnetization current. It is found that the ground state changes from a W state to a disentangled state as the magnetic field v... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An efficient quantum secret sharing protocol with orthogonal product states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2007年 第3期50卷 331-338页
作者: YANG YuGuang1,2. WEN QiaoYan3 & ZHU FuChen4 1 School of Computer, beijing university of Technology, beijing 10002., China 2.State Key Laboratory of Information security, Graduate university of Chinese Academy of Sciences, beijing 10002., China 3 School of Science, beijing university of Posts and telecommunications, beijing 100876, China 4 National Key Laboratory for Modern Communications, Chengdu 610041, China 1. School of Computer Beijing University of Technology Beijing 100022 China 2. State Key Laboratory of Information security Graduate University of Chinese Academy of Sciences Beijing 100022 China 3. School of Science Beijing University of Posts and Telecommunications Beijing 100876 China 4. National Key Laboratory for Modern Communications Chengdu 610041 China
An efficient quantum secret sharing protocol with orthogonal product states in the 33 Hilbert space is presented. The particles in the orthogonal product states form two particle sequences. One sequence is sent to B... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The age of synthesis:From cognitive science to converging technologies and hereafter
收藏 引用
Chinese Science Bulletin 2011年 第6期56卷 465-475页
作者: CAI ShuShan1,2.1 Department of Psychology, Tsinghua university, beijing 10084, China 2.{2. for Psychology and Cognitive Science, Tsinghua university, beijing 10084, China Department of Psychology Tsinghua University center for Psychology and Cognitive Science Tsinghua University
This paper describes the development of two of the most important scientific disciplines in the last quarter of the 2.th century, cognitive science, which emerged in 1975, and nano-bio-info-cogno (NBIC) converging tec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Local segment-shared protection based on source egress gateway selection for multi-domain optical mesh networks
收藏 引用
Science China(Information Sciences) 2011年 第2期54卷 227-235页
作者: ZHANG ShengFeng1,3, PENG YunFeng1,2. DU Shu1, YANG XiaoLong1,2.& LONG KePing1,2.1Research center for Optical Internet and Mobile Information Networks, {2. of Electronic Science and Technology of China, Chengdu 611731, China 2.nstitute of Advanced Network Technology and New Serives (ANTS), {2. of Science and Technology beijing, beijing 100083, China 3Research center for Optical Internet Networks, Chongqing {2. of Posts and telecommunications, Chongqing 400065, China 1. Research center for Optical Internet and Mobile Information Networks University of Electronic Science and Technology of China Chengdu 611731 China3. Research Center for Optical Internet Networks Chongqing University of Posts and Telecommunications Chongqing 400065 China2. Institute of Advanced Network Technology and New Serives (ANTS) University of Science and Technology Beijing Beijing 100083 China
Survivability for multi-domain optical networks is becoming a key parameter due to expanding network. In order to provide the shared-path-protected lightpath in multi-domain optical mesh networks, we propose a protect... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Digital Rights Management:Model,Technology and Application
收藏 引用
China Communications 2017年 第6期14卷 156-167页
作者: Zhaofeng Ma School of Cyberspace security Beijing University of Posts and Telecommunications Beijing 100876 China
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2.WEN QiaoYan3 & ZHANG Xing4,5 1 College of Computer Science and Technology,beijing university of Technology,beijing 10002.,China 2.State Key Laboratory of Information security (Graduate university of the Chinese Academy of Sciences),beijing 100049,China 3 School of Science,beijing university of Posts and telecommunications,beijing 100876,China 4 Institute of Electronic Technology,Information Engineering university,Zhengzhou 450004,China 5 Trusted Computing Laboratory,beijing university of Technology,beijing 10002.,China College of Computer Science Technology Beijing University of Technology Beijing 100022 China State Key Laboratory of Information security [Graduate university of the Chinese Academy of Sciences] Beijing 100049 China School of Science Beijing University of Posts telecommunications Beijing 100876 China Institute of Electronic Technology Information Engineering University Zhengzhou 450004 China Trusted Computing Laboratory Beijing University of Technology Beijing 100022 China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Black-box testing based on colorful taint analysis
收藏 引用
Science China(Information Sciences) 2012年 第1期55卷 171-183页
作者: CHEN Kai1,2.3,FENG DengGuo1,SU PuRui1&ZHANG YingJun1,2.3 1State Key Laboratory of Information security,Institute of Software,Chinese Academy of Science,{2. 100190,China 2.tate Key Laboratory of Information security,Graduate university of Chinese Academy of Sciences,{2. 100049,China 3National Engineering Research center of Information security,{2. 100190,China 1. State Key Laboratory of Information security Institute of Software Chinese Academy of Science Beijing 100190 China2. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China3. National Engineering Research Center of Information Security Beijing 100190 China
Software vulnerability detection is one of the most important methods for guaranteeing software *** main classes of methods can detect vulnerabilities in binary files:white-box testing and black-box *** former needs t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论