咨询与建议

限定检索结果

文献类型

  • 216 篇 期刊文献
  • 68 篇 会议

馆藏范围

  • 284 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 70 篇 网络空间安全
    • 60 篇 计算机科学与技术...
    • 31 篇 信息与通信工程
    • 20 篇 仪器科学与技术
    • 19 篇 机械工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 软件工程
    • 13 篇 控制科学与工程
    • 9 篇 地质资源与地质工...
    • 8 篇 光学工程
    • 5 篇 材料科学与工程(可...
    • 4 篇 电气工程
    • 4 篇 测绘科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 航空宇航科学与技...
    • 3 篇 环境科学与工程(可...
    • 2 篇 交通运输工程
  • 83 篇 理学
    • 50 篇 数学
    • 16 篇 物理学
    • 6 篇 系统科学
    • 4 篇 生物学
    • 3 篇 化学
    • 3 篇 地球物理学
    • 2 篇 地理学
  • 27 篇 管理学
    • 25 篇 管理科学与工程(可...
  • 25 篇 军事学
    • 25 篇 军队指挥学
  • 8 篇 农学
    • 4 篇 农业资源与环境
    • 2 篇 作物学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 2 篇 医学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 哲学
  • 1 篇 教育学

主题

  • 8 篇 cryptography
  • 8 篇 信息安全
  • 8 篇 quantum
  • 7 篇 密码学
  • 7 篇 计算机网络
  • 7 篇 网络安全
  • 5 篇 数字签名
  • 5 篇 sharing
  • 5 篇 密码协议
  • 5 篇 secret
  • 5 篇 provable securit...
  • 4 篇 bent函数
  • 4 篇 threshold
  • 4 篇 stream cipher
  • 4 篇 security
  • 4 篇 离散对数
  • 3 篇 dynamic
  • 3 篇 communication
  • 3 篇 公钥密码
  • 3 篇 信息隐藏

机构

  • 22 篇 中国科学院研究生...
  • 13 篇 中国科技大学
  • 10 篇 中国科学技术大学
  • 9 篇 北京邮电大学
  • 8 篇 西安电子科技大学
  • 6 篇 清华大学
  • 5 篇 信息安全国家重点...
  • 5 篇 北京航空航天大学
  • 4 篇 chinese acad sci...
  • 3 篇 南京邮电学院
  • 3 篇 state key labora...
  • 3 篇 中科院研究生院信...
  • 3 篇 中国科学院软件研...
  • 3 篇 1. state key lab...
  • 3 篇 college of compu...
  • 2 篇 state key labora...
  • 2 篇 中国科学院研究生...
  • 2 篇 山东大学
  • 2 篇 辽宁师范大学
  • 2 篇 telecommunicatio...

作者

  • 18 篇 吕述望
  • 16 篇 china
  • 12 篇 冯登国
  • 9 篇 杨义先
  • 5 篇 钮心忻
  • 5 篇 beijing
  • 4 篇 刘振华
  • 3 篇 2 graduate unive...
  • 3 篇 tsinghua univers...
  • 3 篇 王汝传
  • 3 篇 左英男
  • 3 篇 3 school of scie...
  • 3 篇 徐结绿
  • 3 篇 叶顶锋
  • 3 篇 p.r.china
  • 3 篇 徐汉良
  • 3 篇 beijing universi...
  • 3 篇 许剑卓
  • 3 篇 马兆丰
  • 3 篇 戴宗铎

语言

  • 177 篇 英文
  • 107 篇 中文
检索条件"作者=State Key Lab. of Information Security, Beijing 100049, China."
284 条 记 录,以下是41-50 订阅
排序:
SQUARE attack on block ciphers with low algebraic degree
收藏 引用
Science china.information Sciences) 2010年 第10期53卷 1988-1995页
作者: SUN Bing 1 , LI RuiLin 1 , QU LongJiang 1,3 & LI Chao 1,2,3 1 Science College of National University of Defense Technology, Changsha 410073, china.2 state key lab.ratory of information security, Graduate University of Chinese Academy of Sciences, beijing 100049, china.3 National Mobile Communications Research lab.ratory, Southeast University, Nanjing 210096, china 1. Science College of National University of Defense Technology Changsha 410073 China3. National Mobile Communications Research Laboratory Southeast University Nanjing 210096 China2. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China
By using an algebraic method, the mathematical foundation of SQUARE attack is studied in this paper. We point out that a SQUARE distinguisher exists if and only if the degree of the polynomial function between n-bit i... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Studies and advances on joint source-channel encoding/decoding techniques in flow media communications
收藏 引用
Science china.information Sciences) 2010年 第1期53卷 1-17页
作者: TU GuoFang1, LIU JianJun1, ZHANG Can1,2, GAO ShaoShuai3 & LI ShiDong4 1School of information Science and Engineering, Graduate University of Chinese Academy of Sciences, beijing 100049, china.2state key lab.ratory of information security, Graduate University of Chinese Academy of Sciences, beijing 100049, china.3National Institute of Standards and Technology, Gaithersburg, MD 20899, USA, 4Department of Mathematics, San Francisco state University, San Francisco, CA 94132, USA 1. School of information Science and Engineering Graduate University of Chinese Academy of Sciences Beijing 100049 China2. State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China3. National Institute of Standards and Technology Gaithersburg MD 20899 USA4. Department of Mathematics San Francisco State University San Francisco CA 94132 USA
Joint source-channel coding/decoding (JSCC/JSCD) techniques in flow media communications have become a state-of-the-art and one of the challenging research subjects in the spatial communication area. They have great a... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Study on attribute characterization for reservoir dynamic monitoring by seismic
收藏 引用
Science china.Earth Sciences 2008年 第S2期51卷 218-225页
作者: CHEN XiaoHong1,3,LI JingYe2,3 & ZHAO Wei4 1 key lab.of Geophysical Exploration of CNPC,china.Petroleum University,beijing 102249,china.2 Basin & Reservoir Research Center,china.Petroleum University,beijing 102249,china.3 state key lab.ratory of Petroleum Resource and Prospecting,china.University of Petroleum,beijing 102249,china.4 Research Center of CNOOC,beijing 100027,china 1. key lab.of Geophysical Exploration of CNPC China Petroleum University Beijing 102249 China 3. state key lab.ratory of Petroleum Resource and Prospecting China University of Petroleum Beijing 102249 China 2. Basin & Reservoir Research Center China Petroleum University Beijing 102249 China 4. Research Center of CNOOC Beijing 100027 China
Study on characterizing reservoir parameters dynamic variations by time-lapse seismic attributes is the theoretical basis for effectively distinguishing reservoir parameters variations and conducting time-lapse seismi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Multiparty quantum secret sharing of classical and quantum messages
收藏 引用
Progress in Natural Science:Materials International 2007年 第1期17卷 26-31页
作者: CHEN Pan, DENG Fuguo and LONG Guilu ( key lab.ratory for Quantum information and Measurements, and Department of Physics, Tsinghua University, beijing 100084, china.key lab.ratory of Beam Technology and Material Modification, MOE, Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, beijing Normal University, beijing 100875, china.beijing Radiation Center, beijing 100875, china.key lab.ratory for Atomic and Molecular Nano-Sciences, Tsinghua University, beijing 100084, china. [a]key lab.ratory for Quantum information and Measurements and Department of Physics Tsinghua University Beijing China [b]key lab.ratory of Beam Technology and Material Modification MOE Institute of Low Energy Nuclear Physics and Department of Material Science and Engineering Beijing Normal University Beijing China [c]beijing Radiation Center Beijing China [d]key lab.ratory for Atomic and Molecular Nano-Sciences Tsinghua University Beijing China
A scheme for multiparty quantum secret sharing of classical and quantum messages is proposed by using entanglement swapping. This scheme can distribute not only the classical information but also the quantum informati... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Accountable authority key policy attribute-based encryption
收藏 引用
Science china.information Sciences) 2012年 第7期55卷 1631-1638页
作者: WANG YongTao 1,2 ,CHEN KeFei 1,3 ,LONG Yu 1,4 & LIU ZhaoHui 2 1 Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai 200240,china.2 china.information Technology security Evaluation Center,beijing 100085,china.3 Shanghai key lab.ratory of Scalab.e Computing and Systems,Shanghai Jiao Tong University,Shanghai,200240,china.4 state key lab.ratory of information security,Graduate School of Chinese Academy of Sciences,100039,china 1. Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China2. China Information Technology Security Evaluation Center Beijing 100085 China3. Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China4. State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100039 China
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable authori... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Group-Oriented (t,n) Threshold Signature Scheme with Traceable Signers
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第6期13卷 680-684页
作者: TAN Zuowen1,2 1. School of information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, Jiangxi, china.2. state key lab.ratory of information security/Institute of Software, Chinese Academy of Sciences, beijing 100190, china School of information Technology Jiangxi University of Finance and Economics Nanchang 330013 Jiangxi China state key lab.ratory of information security/Institute of Software Chinese Academy of Sciences Beijing 100190 China
A group-oriented (t, n) threshold signature scheme employs the cryptographic techniques of secret share, allows any subset of t players out of n players to sign message on behalf of the group and disallows the creat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A novel adaptive spectrum forming filter:Application in cognitive ultra-wideband
收藏 引用
Science china.information Sciences) 2010年 第12期53卷 2584-2599页
作者: LI Bin ,ZHOU Zheng & ZOU WeiXia key lab.of Universal Wireless Communications,MOE.Wireless Network lab.beijing University of Posts and Telecommunications,beijing 100876,china 1. key lab.of Universal Wireless Communications MOE. Wireless Network Lab Beijing University of Posts and Telecommunications Beijing 100876 China
Ultra wideband impulse radio(UWB-IR) has important applications in high data rate communications,high precision positioning and penetrating target *** with cognitive radio(CR),UWB can also greatly alleviate the curren... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
Science china.information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1information security Center, state key lab.ratory of Networking and Switching Technology, beijing University of Posts and Telecommunications, beijing 100876, china.2key lab.ratory of Network and information Attack and Defence Technology of MOE, beijing University of Posts and Telecommunications, beijing 100876, china.3National Engineering lab.ratory for Disaster Backup and Recovery, beijing University of Posts and Telecommunications, beijing 100876, china 1. information security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure multi-party computation protocol for sequencing problem
收藏 引用
Science china.information Sciences) 2011年 第8期54卷 1654-1662页
作者: TANG ChunMing 1,2,SHI GuiHua 1 & YAO ZhengAn 3 1 School of Mathematics and information Science,Guangzhou University,Guangzhou 510006, china.2state key lab.ratory of information security, Institute of Software Science,Chinese Academy of Sciences,beijing 100080,china.3 School of Mathematics and Computational Science,Sun Yat-Sen University,Guangzhou 510275,china 1. School of Mathematics and information Science Guangzhou University Guangzhou 510006 China2. State Key Laboratory of Information Security Institute of Software Science Chinese Academy of Sciences Beijing 100080 China3. School of Mathematics and Computational Science Sun Yat-Sen University Guangzhou 510275 China
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific *** the present study,we make use of a secret sharing sche... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Weight hierarchies of linear codes satisfying the Near-Chain condition
收藏 引用
Progress in Natural Science:Materials International 2005年 第9期15卷 784-792页
作者: LIU Zihui1** and CHEN Wende2(1. School of Mathematical Sciences, Peking University, beijing 100871, china.2. lab.ratory of Systems and Control and key state lab.ratory of information security, Institute of Systems Science, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, beijing 100080, china. School of Mathematical Sciences Peking University Beijing 100871 China. lab.ratory of Systems and Control and key state lab.ratory of information security Institute of Systems Science Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing 100080 China
The weight hierarchies of a linear [n,k;q] code C satisfying the Near-Chain condition are studied, almost all the weight hierarchies of such code are determined.
来源: 同方期刊数据库 同方期刊数据库 评论