咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 工学
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 2 篇 boolean function...
  • 2 篇 algebraic immuni...
  • 1 篇 indeterminate eq...
  • 1 篇 emergency situat...
  • 1 篇 algebraic attack...
  • 1 篇 modulus function
  • 1 篇 virtual identity
  • 1 篇 pixel value diff...
  • 1 篇 privacy
  • 1 篇 cryptography
  • 1 篇 annihilators
  • 1 篇 data embedding
  • 1 篇 internet of thin...
  • 1 篇 security

机构

  • 2 篇 state key labora...
  • 2 篇 school of scienc...
  • 1 篇 1. school of sci...
  • 1 篇 college of compu...
  • 1 篇 computer science...

作者

  • 2 篇 zhang jie
  • 2 篇 wen qiaoyan
  • 1 篇 zhang jie 1 2 so...
  • 1 篇 chunye hu 1
  • 1 篇 wang zhao
  • 1 篇 3 department of ...
  • 1 篇 beijing universi...
  • 1 篇 liu zhenhua
  • 1 篇 2 state key labo...
  • 1 篇 qiaoyan wen 2 1 ...
  • 1 篇 jie zhang 1
  • 1 篇 china
  • 1 篇 china 2 state ke...
  • 1 篇 liao xin
  • 1 篇 beijing 100876

语言

  • 4 篇 英文
检索条件"作者=zhang jie 1,2 ,song shouchao 1 ,{3.,3.& wen qiaoyan 2 1 school of science,beijing university of Posts and telecommunications,beijing 100876,china"
4 条 记 录,以下是1-10 订阅
排序:
On the construction of multi-output Boolean functions with optimal algebraic immunity
收藏 引用
science china(Information sciences) 2012年 第7期55卷 1617-1623页
作者: zhang jie 1,2 ,song shouchao 1 ,DU Jiao 2,{3.,{3.,beijing 100876,china 2 State Key Laboratory of Networking and Switching Technology,{3.,beijing 100876,china 3.Department of Mathematics,Xinxiang university,Xinxiang 453.03.china 1. school of science Beijing University of Posts and Telecommunications Beijing 100876 China2. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China3. Department of Mathematics Xinxiang University Xinxiang 453003 China
In this paper,we show a construction of multi-output Boolean functions with optimal algebraic ***,the relationship between the algebraic immunity of a multi-output Boolean function and those of its component functions... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
AN IDENTITY-BASED PERSONAL LOCATION SYSTEM WITH PROTECTED PRIVACY IN IOT
AN IDENTITY-BASED PERSONAL LOCATION SYSTEM WITH PROTECTED PR...
收藏 引用
2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
作者: Chunye Hu 1 jie zhang 1 qiaoyan {3. 2 1 school of {3. beijing university of posts and telecommunications beijing 100876 china 2 State Key Laboratory of Networking and Switching Technology beijing university of posts and telecommunications beijing 100876 china
The internet of things(IOT)has the same security requirements as traditional network,but according to the characteristics of its own,the internet of things also has some specific security features. Among these featu... 详细信息
来源: cnki会议 评论
Algebraic immunities of vector-valued functions over finite fields
收藏 引用
The Journal of china Universities of posts and telecommunications 2015年 第5期22卷 16-21页
作者: Liu Zhenhua zhang jie wen {3. Computer science department China Women's University school of science Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Algebraic immunity is an important cryptographic property of Boolean functions. The notion of algebraic immunity of Boolean functions has been generalized in several ways to vector-valued functions over arbitrary fini... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Data embedding based on pixel value differencing and modulus function using indeterminate equation
收藏 引用
The Journal of china Universities of posts and telecommunications 2015年 第1期22卷 95-100页
作者: Wang Zhao zhang jie Liao Xin wen {3. school of science Beijing University of Posts and Telecommunications College of Computer science and Electronic Engineering Hunan University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the rem... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论