咨询与建议

限定检索结果

文献类型

  • 3,593,006 篇 期刊文献
  • 29,765 篇 会议
  • 143 篇 学位论文
  • 32 册 图书
  • 12 篇 报纸

馆藏范围

  • 3,622,951 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 1,688,520 篇 工学
    • 224,607 篇 材料科学与工程(可...
    • 171,761 篇 机械工程
    • 171,247 篇 化学工程与技术
    • 136,296 篇 计算机科学与技术...
    • 106,330 篇 软件工程
    • 104,349 篇 电气工程
    • 101,681 篇 土木工程
    • 93,212 篇 仪器科学与技术
    • 81,105 篇 动力工程及工程热...
    • 79,770 篇 交通运输工程
    • 79,302 篇 控制科学与工程
    • 78,581 篇 电子科学与技术(可...
    • 74,222 篇 环境科学与工程(可...
    • 70,689 篇 水利工程
    • 64,533 篇 建筑学
  • 1,016,667 篇 医学
    • 584,160 篇 临床医学
    • 138,804 篇 中西医结合
    • 98,039 篇 公共卫生与预防医...
    • 93,116 篇 药学(可授医学、理...
    • 72,461 篇 中药学(可授医学、...
    • 71,525 篇 医学技术(可授医学...
    • 65,868 篇 基础医学(可授医学...
  • 418,100 篇 理学
    • 91,770 篇 化学
    • 77,790 篇 生物学
  • 336,438 篇 农学
    • 86,929 篇 作物学
    • 72,088 篇 农业资源与环境
  • 290,625 篇 管理学
    • 118,848 篇 管理科学与工程(可...
    • 93,054 篇 公共管理
  • 184,294 篇 教育学
    • 143,138 篇 教育学
  • 121,755 篇 经济学
    • 106,198 篇 应用经济学
  • 90,930 篇 法学
  • 60,133 篇 文学
  • 31,987 篇 艺术学
  • 24,569 篇 历史学
  • 15,912 篇 哲学
  • 12,545 篇 军事学

主题

  • 23,519 篇 数值模拟
  • 22,592 篇 影响因素
  • 17,161 篇 预后
  • 16,615 篇 应用
  • 15,842 篇 儿童
  • 13,641 篇 力学性能
  • 12,953 篇 诊断
  • 12,574 篇 产量
  • 12,201 篇 治疗
  • 12,094 篇 危险因素
  • 11,784 篇 大鼠
  • 11,308 篇 对策
  • 10,683 篇 教学改革
  • 10,252 篇 磁共振成像
  • 9,715 篇 综述
  • 9,670 篇 糖尿病
  • 9,462 篇 中国
  • 9,393 篇 稳定性
  • 8,970 篇 疗效
  • 8,947 篇 大学生

机构

  • 22,527 篇 清华大学
  • 21,387 篇 上海交通大学
  • 20,677 篇 中国科学院大学
  • 20,527 篇 浙江大学
  • 18,535 篇 天津大学
  • 18,309 篇 同济大学
  • 18,083 篇 北京大学
  • 18,011 篇 吉林大学
  • 17,853 篇 四川大学
  • 17,342 篇 中国矿业大学
  • 17,118 篇 西安交通大学
  • 17,042 篇 武汉大学
  • 16,364 篇 中国石油大学
  • 15,798 篇 山东大学
  • 15,751 篇 西北工业大学
  • 15,645 篇 中国地质大学
  • 15,547 篇 西北农林科技大学
  • 15,137 篇 哈尔滨工业大学
  • 14,974 篇 华中科技大学
  • 14,557 篇 中南大学

作者

  • 25,216 篇 张伟
  • 21,690 篇 张磊
  • 18,049 篇 张静
  • 17,645 篇 张勇
  • 17,156 篇 张涛
  • 16,969 篇 张敏
  • 16,828 篇 张鹏
  • 15,308 篇 张杰
  • 13,637 篇 张强
  • 13,418 篇 张健
  • 12,891 篇 张军
  • 12,615 篇 张超
  • 12,354 篇 张丽
  • 12,236 篇 张辉
  • 12,090 篇 张华
  • 11,416 篇 张颖
  • 11,285 篇 张莉
  • 10,726 篇 张宇
  • 10,399 篇 张斌
  • 10,346 篇 张波

语言

  • 3,444,192 篇 中文
  • 178,702 篇 英文
  • 64 篇 日文
检索条件"作者=ZhanG HuanGuo"
3622958 条 记 录,以下是1-10 订阅
排序:
Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition
收藏 引用
Chinese Journal of Electronics 2017年 第6期26卷 1139-1146页
作者: LIU Jinhui zhang huanguo JIA Jianwei Computer School of Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education
Advances in quantum computation threaten to break public key cryptosystems such as RSA,ECC, and El Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 947-951页
作者: JIA Jianwei LIU Jinhui zhang huanguo Computer School of Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education
A key exchange protocol is considered *** scheme is based on a set of m commuting square singular matrices of dimension n×n over a finite field,and its security is claimed to rely on the hardness of the matrix versio... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of Cryptosystems Based on General Linear Group
收藏 引用
China Communications 2016年 第6期13卷 217-224页
作者: Jianwei Jia Jinhui Liu huanguo zhang Computer School of Wuhan University WuhanHubei 430072China Key Laboratory of Aerospace Information security and trusted computing Ministry of Education Wuhan UniversityWuhan 430072HubeiProvinceChina
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
CYBERSPACE SECURITY
收藏 引用
China Communications 2016年 第11期13卷 68-69页
作者: huanguo zhang Yi Mu computer school in wuhan university school of computer science and software engineering centre for computer and information security research at university of wollongong
With rapid development and wide application of information technology,mankind is entering into an information *** world where people live and work has been changed to a brand new triple-dimensional space that consists... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum Polynomial-Time Fixed-Point Attack for RSA
收藏 引用
China Communications 2018年 第2期15卷 25-32页
作者: Yahui Wang huanguo zhang Houzhen Wang School of computer Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education Wuhan University
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 499-510页
作者: Chao Wang Feng Hu huanguo zhang Jie Wu the Key Laboratory of Specialty Fiber Optics and Optical Access Networks School of Communication and Information EngineeringShanghai University the Department of Computer and Information Sciences Temple University the Key Lab of Aerospace Information Security and Trusted Computing Wuhan University
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research in Computer Viruses and Worms
收藏 引用
China Communications 2007年 第2期4卷 90-96页
作者: Peng Guojun zhang huanguo Wang Lina Wuhan Univ Comp Sch Wuhan 430072 Peoples R China
Viruses and worms have become so common that most computer users now accept them as a fact of *** paper introduces the definitions and difference of the computer viruses and *** main research problems about the comput... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Simple Method for Realizing Weil Theorem in Secure ECC Generation
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 511-519页
作者: Feng Hu Chao Wang huanguo zhang Jie Wu the Key Laboratory of Specialty Fiber Optics and Optical Access Networks School of Communication and Information EngineeringShanghai University the Department of Computer and Information Sciences Temple University the Key Lab of Aerospace Information Security and Trusted Computing Wuhan University
How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
收藏 引用
Chinese Journal of Electronics 2018年 第3期27卷 625-633页
作者: LIU Dong CHEN Jing DU Ruiying zhang huanguo Key Laboratory of Aerospace Information Security and the Trusted Computing Ministry of Education School of ComputerWuhan University Science and Technology on Communication Security Laboratory North Automatic Control Technique Research Institute Collaborative Innovation Center of Geospatial Technology
Recently several reduced-operation two Factor authentication(2FA) methods have been proposed to improve the usability of traditional 2FA. The existing works cannot protect the user’s password from online guessing att... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 944-952页
作者: LI Pengwei FU Jianming XU Chao CHENG Binlin zhang huanguo School of Information Engineering Nanjing Audit University School of Cyber Science and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University College of Computer Science and Technology Hubei Normal University
Security-sensitive operations in Android applications(apps for short) can either be benign or malicious. In this work, we introduce an approach of static program analysis that extracts "second-step behavior features",... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论