咨询与建议

限定检索结果

文献类型

  • 206 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 207 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 145 篇 工学
    • 40 篇 计算机科学与技术...
    • 26 篇 网络空间安全
    • 21 篇 电子科学与技术(可...
    • 18 篇 仪器科学与技术
    • 16 篇 软件工程
    • 14 篇 材料科学与工程(可...
    • 13 篇 电气工程
    • 11 篇 信息与通信工程
    • 10 篇 光学工程
    • 10 篇 控制科学与工程
    • 9 篇 水利工程
    • 8 篇 机械工程
    • 7 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 4 篇 测绘科学与技术
    • 4 篇 环境科学与工程(可...
    • 3 篇 土木工程
    • 3 篇 核科学与技术
  • 46 篇 理学
    • 10 篇 物理学
    • 7 篇 数学
    • 7 篇 生物学
    • 6 篇 大气科学
    • 5 篇 化学
    • 3 篇 地球物理学
  • 20 篇 管理学
    • 10 篇 管理科学与工程(可...
  • 15 篇 医学
    • 4 篇 临床医学
  • 14 篇 农学
    • 6 篇 作物学
    • 4 篇 农业资源与环境
  • 7 篇 军事学
    • 7 篇 军队指挥学
  • 6 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学

主题

  • 5 篇 隐私保护
  • 3 篇 数据安全
  • 3 篇 区块链
  • 3 篇 mechanical prope...
  • 3 篇 交通工程
  • 3 篇 层次分析法
  • 3 篇 provable securit...
  • 2 篇 polarization
  • 2 篇 phylogeny
  • 2 篇 variable range h...
  • 2 篇 智能铁路
  • 2 篇 无人机
  • 2 篇 数字孪生
  • 2 篇 new species
  • 2 篇 cryptography
  • 2 篇 知识图谱
  • 2 篇 weak localizatio...
  • 2 篇 new genera
  • 2 篇 大数据
  • 2 篇 silver

机构

  • 18 篇 中国科学院大学
  • 9 篇 university of ch...
  • 8 篇 北京交通大学
  • 8 篇 清华大学
  • 6 篇 北京邮电大学
  • 5 篇 北京航空航天大学
  • 5 篇 西安电子科技大学
  • 5 篇 北京理工大学
  • 4 篇 北京大学
  • 4 篇 中国科学院信息工...
  • 4 篇 华北电力大学
  • 4 篇 center of materi...
  • 3 篇 中国科学院华南植...
  • 3 篇 南京大学
  • 3 篇 state key labora...
  • 3 篇 密码科学技术国家...
  • 3 篇 北京工业大学
  • 3 篇 天津大学
  • 3 篇 北京师范大学
  • 3 篇 西南交通大学

作者

  • 6 篇 吴昊
  • 6 篇 hui wu
  • 6 篇 hui li
  • 5 篇 sen lin
  • 4 篇 zhenglian liu
  • 4 篇 junchen liu
  • 4 篇 ming lei
  • 4 篇 李晖
  • 4 篇 jing li
  • 4 篇 jianan song
  • 4 篇 ziwei li
  • 3 篇 dong wang
  • 3 篇 李辉
  • 3 篇 王义炎
  • 3 篇 jing yang
  • 3 篇 李强
  • 3 篇 李凤华
  • 3 篇 hui ma
  • 3 篇 夏天龙
  • 3 篇 haiyang wang

语言

  • 130 篇 中文
  • 77 篇 英文
检索条件"作者=LI Hui 1,2 & WU ChuanKun 1 1 State Key Laboratory of Information Security,Institute of Software,chinese Academy of sciences,beijing 100190,china"
207 条 记 录,以下是1-10 订阅
排序:
CMQV+:An authenticated key exchange protocol from CMQV
收藏 引用
Science china(information sciences) 2012年 第7期55卷 1666-1674页
作者: li hui 1,2 & wu chuankun 1 1 state key laboratory of information security,institute of software,chinese academy of sciences,beijing 100190,china 2 Graduate University of chinese academy of sciences,beijing 100049,china state key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing China Graduate University of chinese academy of sciences Beijing China
Ustaoglu presents a secure and efficient key exchange protocol named CMQV,based on the design rationales of HMQV and *** with the latter two protocols,on one hand,CMQV achieves high performance of HMQV,and on the othe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamic tree-based authenticated group key exchange protocol
收藏 引用
Science china(information sciences) 2010年 第8期53卷 1591-1602页
作者: li hui 1,2 , wu chuankun 1 & TENG JiKai 1,2 1 state key laboratory of information security, institute of software, chinese academy of sciences, beijing 100190, china 2 Graduate University of chinese academy of sciences, beijing 100049, china state key laboratory of information security Institute of Software Chinese Academy of Sciences Beijing China Graduate University of chinese academy of sciences Beijing China
Authenticated group key exchange protocols allow a group of users over a public network to establish a shared secret key for the subsequent cryptographic goals. In this paper, we extend BD-II scheme into a dynamic set... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new one-bit diFFerence collision attack on HAVAL-128
收藏 引用
Science china(information sciences) 2012年 第11期55卷 2521-2529页
作者: ZHANG WenYing1,2,3,li YanYan1 & wu Lei1 1School of information Science and Engineering,Shandong Normal University,Jinan 250014,china 2state key Lab of information security,institute of information Engineering,chinese academy of sciences,beijing 100093,china 3Shandong Provincial key laboratory for Novel Distributed Computer software Technology,Jinan 250014,china School of information Science and Engineering Shandong Normal University Jinan China state key Lab of information security Institute of Information Engineering Chinese Academy of Sciences Beijing China Shandong Provincial key laboratory for Novel Distributed Computer software Technology Jinan China
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
QKD扩展BB84协议的Breidbart基窃听问题
收藏 引用
物理学报 2002年 第5期51卷 961-965页
作者: 杨理 吴令安 刘颂豪 中国科学院研究生院信息安全国家重点实验室 北京100039 中国科学院物理研究所 北京100080 华南师范大学量子电子学研究所 广州510631
给出了六态扩展BB84协议的Breidbart基窃听方案 ,分析并计算了各种截取 重发策略下的Alice Eve平均交互信息量和施行QKD标准纠错手续后的有效平均交互信息量 ,结果显示Breidbart基窃听 Breidbart基重发策略 (B B策略 )最为有效 .考虑到... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
INTEGRAL DISTINGUISHERS OF JH AND GRSTL-512
收藏 引用
Journal of Electronics(china) 2012年 第Z1期 94-102页
作者: li Yanjun wu Wenling Dong Le (state key laboratory of information security,institute of software,chinese academy of sciences,beijing 100190,china) (Graduate University of chinese academy of sciences,beijing 100049,china) (beijing Electronic Science and Technology institute,beijing 100070,china)
In December of 2010 NIST selected five SHA-3 finalists-BLAKE,Grstl,JH,Keccak,and Skein to advance to the third (and final) round of the SHA-3 *** present most specialists and scholars focus on the design and the att... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Portable fluorogenic probe for monitoring of volatile amine vapour and food spoilage
收藏 引用
chinese Chemical Letters 2024年 第3期35卷 257-261页
作者: Jian-Hao Zhao Wen-Xing Xu Bin li Wei Xu wu-Kun Zhang Ming-Shuai Yuan hui-Zi li Qing-Guo He Xiang Ma Jian-Gong Cheng Yan-Yan Fu state key Lab of Transducer Technology Shanghai Institute of Microsystem and Information TechnologyChinese Academy of SciencesShanghai 200050China Center of Materials Science and Optoelectronics Engineering University of the Chinese Academy of SciencesBeijing 100039China School of Physical Science and Technology ShanghaiTech UniversityShanghai 201210China key laboratory for Advanced Materials and Feringa Nobel Prize Scientist Joint Research Center Frontiers Science Center for Materiobiology and Dynamic Chemistry School of Chemistry and Molecular EngineeringEast China University of Science and TechnologyShanghai 200237China
There are urgent needs of volatile amine gas sensors with high-performance in food quality control,disease monitoring and environmental ***-film fluorescent probe is suitable for amine vapour sensing due to its high s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A near-complete assembly of the Houttuynia cordata genome provides insights into the regulatory mechanism of flavonoid biosynthesis in Yuxingcao
收藏 引用
Plant Communications 2024年 第10期5卷 180-199页
作者: Zhengting Yang Fayin He Yingxiao Mai Sixian Fan Yin An Kun li Fengqi wu Ming Tang hui Yu Jian-Xiang liu Rui Xia key laboratory of state Forestry Administration on Biodiversity Conservation in Karst Mountainous Areas of Southwestern china School of Life SciencesGuizhou Normal UniversityGuiyangGuizhou 550025China state key laboratory for Conservation and Utilization of Subtropical Agro-Bioresources College of HorticultureSouth China Agricultural UniversityGuangzhouGuangdong 510640China lishui Innovation Center for life and Health Zhejiang UniversityHangzhou 310027China
Houttuynia cordata,also known as Yuxingcao in chinese,is a perennial herb in the Saururaceae *** is highly regarded for its medicinal properties,particularly in treating respiratory infections and inflammatory conditi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Secure Beamforming Design for SWIPT in Cooperative D2D Communications
收藏 引用
china Communications 2017年 第1期14卷 20-33页
作者: li Jiang Cheng Qin Xixi Zhang hui Tian state key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunicationsand Science and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryBeijing100876China
In device-to-device(D2D) communications, device terminal relaying makes it possible for devices in a network to function as transmission relays for each other to enhance the spectral efficiency. In this paper we consi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Provably Secure and Efficient Proxy Signature with Untrustworthy Proxy Signer
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2008年 第6期13卷 675-678页
作者: 王志伟 郑世慧 王励成 杨义先 胡正名 information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Post and TelecommunicationsBeijing 100876China
Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme bas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Data-enhanced revealing of trends in Geoscience
收藏 引用
Journal of Data and information Science 2024年 第3期9卷 29-43页
作者: Yu Zhao Meng Wang Jiaxin Ding Jiexing Qi Lyuwen wu Sibo Zhang Luoyi Fu Xinbing Wang li Cheng School of Earth sciences and Resources China University of GeosciencesBeijing 100083China key laboratory of Ecological security and Sustainable Development of Arid Areas State Key Laboratory of Desert and Oasis EcologyChinese Academy of SciencesUrumqiXinjiang830011China Xinjiang key laboratory of Mineral Resources and Digital Geology Urumqi 830011China Shanghai Jiao Tong University Shanghai 200240China Journal Center China University of GeosciencesBeijing 100083China
Purpose:This article presents an in-depth analysis of global research trends in Geosciences from 2014 to *** integrating bibliometric analysis with expert insights from the Deep-time Digital Earth(DDE)initiative,this ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论