咨询与建议

限定检索结果

文献类型

  • 89 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 95 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 75 篇 工学
    • 33 篇 计算机科学与技术...
    • 30 篇 网络空间安全
    • 14 篇 信息与通信工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 仪器科学与技术
    • 9 篇 软件工程
    • 6 篇 机械工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 土木工程
    • 3 篇 交通运输工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 公安技术
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 生物医学工程(可授...
  • 38 篇 理学
    • 29 篇 物理学
    • 7 篇 数学
    • 1 篇 化学
    • 1 篇 海洋科学
    • 1 篇 系统科学
  • 15 篇 军事学
    • 15 篇 军队指挥学
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...

主题

  • 7 篇 blockchain
  • 4 篇 quantum network ...
  • 4 篇 privacy protecti...
  • 4 篇 efficiency
  • 4 篇 security
  • 3 篇 quantum walk
  • 3 篇 iov
  • 3 篇 network coding
  • 2 篇 6g
  • 2 篇 quantum cryptogr...
  • 2 篇 load balancer
  • 2 篇 quantum homomorp...
  • 2 篇 bilinear pairing
  • 2 篇 non-maximally en...
  • 2 篇 quantum teleport...
  • 2 篇 quantum hash fun...
  • 2 篇 隐私保护
  • 2 篇 anti-quantum
  • 2 篇 convolutional mu...
  • 2 篇 authentication

机构

  • 34 篇 information secu...
  • 19 篇 information secu...
  • 15 篇 北京邮电大学
  • 12 篇 school of inform...
  • 4 篇 information secu...
  • 4 篇 state key labora...
  • 4 篇 department of co...
  • 3 篇 information secu...
  • 3 篇 state key labora...
  • 3 篇 national enginee...
  • 3 篇 北京工业大学
  • 3 篇 faculty of infor...
  • 3 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 school of cybers...
  • 2 篇 college of mathe...
  • 2 篇 school of comput...
  • 2 篇 shandong provinc...
  • 2 篇 information cent...
  • 2 篇 beijing everyone...

作者

  • 18 篇 xiu-bo chen
  • 17 篇 gang xu
  • 10 篇 yi-xian yang
  • 9 篇 yixian yang
  • 9 篇 xiubo chen
  • 6 篇 zhao dou
  • 5 篇 haseeb ahmad
  • 5 篇 yang yixian
  • 5 篇 杨义先
  • 4 篇 陈秀波
  • 4 篇 zhiguo qu
  • 4 篇 yang yi-xian
  • 4 篇 yu yang
  • 4 篇 jian li
  • 4 篇 chen xiubo
  • 3 篇 yuguang yang
  • 3 篇 zhen-zhen li
  • 3 篇 王励成
  • 3 篇 ke xiao
  • 3 篇 钮心忻

语言

  • 78 篇 英文
  • 17 篇 中文
检索条件"作者=Qin Guo~,Mingxing Luo~,Lixiang Li~,Licheng Wang~,Yixian Yang~ 1 information Security Center,State key {2. of networking and Switching Technology, beijing university of posts and telecommunications,beijing 100876,china"
95 条 记 录,以下是1-10 订阅
排序:
Secure network coding in the presence of eavesdroppers
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 648-658页
作者: luo mingxing1,2.3, {2. yixian1,2.3, wang licheng1,2.3 & NIU XinXin1,2.3 1information security center, state key Laboratory of networking and {12. technology, beijing university of posts and telecommunications, beijing 100876, china 2.10} Laboratory of Network and information Attack and Defence technology of MOE, beijing university of posts and telecommunications, beijing 100876, china 3National Engineering Laboratory for Disaster Backup and Recovery, beijing university of posts and telecommunications, beijing 100876, china 1. information security {2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the {2. of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Sensor-Service Collaboration Approach for Target Tracking in Wireless Camera Networks
收藏 引用
china Communications 2017年 第7期14卷 44-56页
作者: Shuai Zhao Le Yu state key Laboratory of {2. and switching technology Beijing University of Posts and Telecommunications china Mobile information {2. center
Mobile target tracking is a necessary function of some emerging application domains, such as virtual reality, smart home and intelligent healthcare. However, existing portable devices for target tracking are resource ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Conjugate adjoining problem in braid groups and new design of braid-based signatures
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 524-536页
作者: wang licheng1,2, wang liHua2, CAO ZhenFu3, yang yixian1 & NIU XinXin1 information security center, state key Laboratory of networking and switching technology, beijing university of posts and telecommunications, beijing 100876, china 2National Institute of information and Communications technology, Tokyo 184-8795, Japan 3Trusted Digital technology Laboratory, Shanghai Jiao Tong university, Shanghai 200240, china 1. information security {2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. National Institute of Information and Communications Technology Tokyo 184-8795 Japan3. Trusted Digital Technology Laboratory Shanghai Jiao Tong University Shanghai 200240 China
The development of quantum computation casts serious threats to the securities of most existing public-key cryptosystems. Braid-based cryptography is one of the alternatives that have potential advantages in resisting... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The Research on Cryptographic Schemes
收藏 引用
ZTE Communications 2007年 第4期5卷 1-5页
作者: Zheng Shihui (information security {2. of state key Laboratory of networking and switching technology, beijing university of posts and telecommunications, beijing 100876, china)
Cryptography is an important technology for information {2.. It mainly includes symmetric and asymmetric cryptographic algorithms and protocols. For the symmetric cryptographic algorithms, it is easy to deduce de... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure Beamforming Design for SWIPT in Cooperative D2. Communications
收藏 引用
china Communications 2017年 第1期14卷 20-33页
作者: li Jiang Cheng qin Xixi Zhang Hui Tian state key Laboratory of {2. and switching technology Beijing University of Posts and Telecommunicationsand Science and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryBeijing100876China
In device-to-device(D2.) communications, device terminal relaying makes it possible for devices in a network to function as transmission relays for each other to enhance the spectral efficiency. In this paper we consi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
密码学原语中信任传递语义研究
收藏 引用
通信学报 2008年 第12期29卷 60-65页
作者: 王励成 潘耘 谷利泽 杨义先 北京邮电大学网络与交换技术国家重点实验室信息安全中心 中国传媒大学计算机学院
以可信计算和信任管理为背景,考察密码学原语中所包含的信任传递语义,进而借助于目前较为成熟的密码学理论为信任传递机理进行建模,提出了信任传递语义模型的雏形,分析了多种典型数字签名原语中的信任传递语义。分析结果表明所提模型具... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states
收藏 引用
Chinese Physics B 2015年 第5期24卷 231-238页
作者: 徐淑奖 陈秀波 王连海 钮心忻 杨义先 Shandong Provincial key Laboratory of Computer Networks Shandong Computer Science Center (National Supercomputer Center in Jinan) information security {2. State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications state key Laboratory of {2. security Institute of Information Engineering Chinese Academy of Sciences
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Construction of Convolutional Network Coding for Cyclic Multicast Networks
Construction of Convolutional Network Coding for Cyclic Mult...
收藏 引用
2.10 IEEE 2.d Symposium on Web Society
作者: qin guo~(1,2.3),mingxing luo~(1,2.3),{2.(1,2.3),licheng wang~(1,2.3),yixian yang~(1,2.3) 1 information security center,state key Laboratory of networking and {12. technology, beijing university of posts and telecommunications,beijing 100876,china 2.key Laboratory of Network and information Attack and Defence technology of MOE, beijing university of posts and telecommunications,beijing 100876,china 3 National Engineering Laboratory for Disaster Backup and Recovery, beijing university of posts and telecommunications,beijing 100876,china.
<正>In this paper,we present a practical algorithm to construct the convolutional multicast network coding over any finite directed cyclic *** dual line graph of a directed cyclic graph is considered as a *** regard... 详细信息
来源: cnki会议 评论
基于DWT和视觉加权的图像质量评价方法研究
收藏 引用
通信学报 2011年 第9期32卷 129-136页
作者: 蒋铭 马兆丰 辛宇 钮心忻 杨义先 北京邮电大学网络与交换技术国家重点实验室信息安全中心 北京邮电大学网络与信息攻防技术教育部重点实验室 天柏宽带网络科技(北京)有限公司
提出了一种新的基于小波变换和视觉加权的图像质量客观评价方法(WVWPSNR,wavelet and vision weighted peak signal noise ratio)。该方法将图像的DWT和HVS特性相结合,利用子图分解以及视觉加权处理实现图像质量的客观评价。对多幅分别... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
DRDoS Threat Analysis Based on Magnification Factor and Diffusion Factor
DRDoS Threat Analysis Based on Magnification Factor and Diff...
收藏 引用
第一届中国高校通信类院系学术研讨会
作者: li Ji Hu Ying Zheng Kangfeng Xiu Xinxin yang {2. information security center,state key laboratory of networking and switching technology,beijing {12. of posts and telecommunications,beijing 100876
<正>As a new kind of DDoS attack method,DRDoS (Distributed Reflect Denial of Service)is easy to launch, but difficult to trace back and *** this paper,the identical properties and possible scenes of DRDoS are disc... 详细信息
来源: cnki会议 评论