咨询与建议

限定检索结果

文献类型

  • 285 篇 期刊文献
  • 18 篇 会议

馆藏范围

  • 303 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 254 篇 工学
    • 160 篇 计算机科学与技术...
    • 83 篇 电气工程
    • 66 篇 电子科学与技术(可...
    • 63 篇 信息与通信工程
    • 54 篇 网络空间安全
    • 43 篇 材料科学与工程(可...
    • 30 篇 控制科学与工程
    • 17 篇 软件工程
    • 14 篇 机械工程
    • 9 篇 仪器科学与技术
    • 6 篇 生物医学工程(可授...
    • 5 篇 力学(可授工学、理...
    • 1 篇 土木工程
    • 1 篇 轻工技术与工程
  • 137 篇 理学
    • 92 篇 数学
    • 41 篇 物理学
    • 26 篇 天文学
    • 3 篇 生物学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 化学
  • 10 篇 医学
    • 10 篇 临床医学
  • 8 篇 管理学
    • 6 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 1 篇 教育学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 文学
    • 1 篇 中国语言文学

主题

  • 303 篇 cryptography
  • 32 篇 security
  • 25 篇 quantum
  • 15 篇 key
  • 15 篇 authentication
  • 15 篇 cryptanalysis
  • 15 篇 encryption
  • 11 篇 information secu...
  • 10 篇 digital signatur...
  • 9 篇 data security
  • 8 篇 elliptic curve
  • 8 篇 distribution
  • 8 篇 steganography
  • 8 篇 secret
  • 7 篇 privacy
  • 7 篇 sharing
  • 7 篇 decryption
  • 7 篇 secure
  • 6 篇 image encryption
  • 6 篇 communication

机构

  • 4 篇 state key labora...
  • 4 篇 national laborat...
  • 4 篇 computer school ...
  • 4 篇 school of mathem...
  • 3 篇 college of mathe...
  • 3 篇 college of compu...
  • 3 篇 china
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 school of comput...
  • 3 篇 state key labora...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 school of inform...
  • 2 篇 department of el...
  • 2 篇 institute of low...
  • 2 篇 department of co...
  • 2 篇 department of ap...

作者

  • 7 篇 wen qiaoyan
  • 5 篇 zhang huanguo
  • 4 篇 zhu fuchen
  • 3 篇 du jiao
  • 3 篇 feng rongquan
  • 3 篇 saman riaz
  • 3 篇 muhammad nadeem
  • 3 篇 邓富国
  • 3 篇 houzhen wang
  • 3 篇 pang shanqi
  • 3 篇 ali arshad
  • 3 篇 boris s. verkhov...
  • 3 篇 chen zhixiong
  • 3 篇 周宏余
  • 3 篇 liu jinhui
  • 3 篇 gao fei
  • 3 篇 李春燕
  • 3 篇 syeda wajiha zah...
  • 3 篇 huanguo zhang
  • 3 篇 jia jianwei

语言

  • 279 篇 英文
  • 24 篇 中文
检索条件"主题词=cryptography"
303 条 记 录,以下是231-240 订阅
排序:
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
收藏 引用
Intelligent Control and Automation 2022年 第4期13卷 39-53页
作者: Md. Al-Sajiduzzaman Akand Sarwar Azmain Reza Amatul Bushra Akhi Department of Computer Science & Engineering Daffodil International University Dhaka Bangladesh
Marriage is a momentous event in anyone’s life. It is not just an ordinary relationship. This partnership is supported legally by a civil contract between a man and a woman. According to Islamic values, the Muslim co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Comparing the efficiencies of different detect strategies in the ping-pong protocol
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第12期51卷 1853-1860页
作者: GAO Fei GUO FenZhuo WEN QiaoYan ZHU FuChen State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Tele-communicationsBeijing 100876China School of Sciences Beijing University of Posts and TelecommunicationsBeijing 100876China National Laboratory for Modern Communications Chengdu 610041China
The way to compare the efficiencies of different detect strategies (DSs) in the "ping-pong" protocol is studied. The trade-off between information gain and dis- turbance is calculated and compared for different DSs. T... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Secure Transfer of Identification Information in Medical Images by Steganocryptography
收藏 引用
International Journal of Communications, Network and System Sciences 2010年 第10期3卷 801-804页
作者: Shuhong Jiao Robert Goutte 不详
The fast growth of the exchange traffic in medical imagery on the Internet justifies the creation of adapted tools guaranteeing the quality and the confidentiality of the information while respecting the legal and eth... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
On designated-weight Boolean functions with highest algebraic immunity
收藏 引用
Science China Mathematics 2010年 第11期53卷 2847-2854页
作者: LIU MeiCheng1,3, DU YuSong2, PEI DingYi2 & LIN DongDai1 1The State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sciences, Beijing 100190, China 2College of Mathematics and Information Sciences, Guangzhou University, Guangzhou 510006, China 3Graduate University of Chinese Academy of Sciences, Beijing 100049, China The State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing China Graduate University of Chinese Academy of Sciences Beijing China College of Mathematics and Information Sciences Guangzhou University Guangzhou China
Algebraic immunity has been considered as one of cryptographically significant properties for Boolean functions. In this paper, we study ∑d-1 i=0 (ni)-weight Boolean functions with algebraic immunity achiev-ing the m... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2,WEN QiaoYan3 & ZHANG Xing4,5 1 College of Computer Science and Technology,Beijing University of Technology,Beijing 100022,China 2 State Key Laboratory of Information Security (Graduate University of the Chinese Academy of Sciences),Beijing 100049,China 3 School of Science,Beijing University of Posts and Telecommunications,Beijing 100876,China 4 Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,China 5 Trusted Computing Laboratory,Beijing University of Technology,Beijing 100022,China College of Computer Science and Technology Beijing University of Technology Beijing China State Key Laboratory of Information Security (Graduate University of the Chinese Academy of Sciences) Beijing China School of Science Beijing University of Posts and Telecommunications Beijing China Institute of Electronic Technology Information Engineering University Zhengzhou China Trusted Computing Laboratory Beijing University of Technology Beijing China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Study of the Security in Network Management Based on Mobile Agents
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2004年 第4期11卷 37-42页
作者: CHEN Zhi~1 WANG Ru-chuan~(1,2)1.Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R.China 2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,P.R.China Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 P. R. China
Security of mobile-agent based network management must be considered due to the widespread adoption of mo-bile agents in network management,which involves the protections of mobile agents,management station and manage... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Privacy Preserving Mining of Association Rules on Horizontally Distributed Databases
Privacy Preserving Mining of Association Rules on Horizontal...
收藏 引用
2012 International Conference on Software and Computer Applications(ICSCA 2012)
作者: Seyed Ziaeddin Alborzi Fatemeh Raji Mohammad H.Saraee Computer Engineering School Nanyang Technological UniversitySingapore Dept. of Elec. and Computer Engineering Isfahan University of Technology
Many algorithms have been proposed to provide privacy preserving in data mining.These protocols are based on two main approaches named as:the Randomization approach and the Cryptographic approach.The first one is base... 详细信息
来源: cnki会议 评论
Quantum Authentication Based on the Lengthened String Scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2004年 第z1期11卷 14-17,25页
作者: GUO Fen-zhuo~(1,2), WEN Qiao-yan~1, ZHU Fu-chen~3 1.School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, P.R. China 2.State Key Laboratory of Integrated Services Network, Xidian University, Xi’an 710071, P.R. China 3.National Laboratory for Secure Communication, Chengdu 610041, P.R. China School of Science Beijing University of Posts and Telecommunications Beijing 100876 P.R. China
Assuming there is a shared string between the users, we present a novel scheme, the lengthened string scheme (LSS), where the shared string is lengthened firstly by a specially designed algorithm, then some special tr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On Lucas Sequences Computation
收藏 引用
International Journal of Communications, Network and System Sciences 2010年 第12期3卷 943-944页
作者: Aleksey Koval Computer Science Department New Jersey Institute of Technology
This paper introduces an improvement to a currently published algorithm to compute both Lucas 'sister' sequences Vk and Uk. The proposed algorithm uses Lucas sequence properties to improve the running time by about 20... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Overview Of security Problems in MANET
An Overview Of security Problems in MANET
收藏 引用
International Conference on Intelligent Computational Systems
作者: Kuldeep Sharma Neha Khandelwal Prabhakar.M Anna University
Mobile ad hoc networks(MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node partici... 详细信息
来源: cnki会议 评论