咨询与建议

限定检索结果

文献类型

  • 433 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 308 篇 工学
    • 176 篇 网络空间安全
    • 118 篇 计算机科学与技术...
    • 40 篇 电子科学与技术(可...
    • 27 篇 软件工程
    • 25 篇 信息与通信工程
    • 19 篇 仪器科学与技术
    • 16 篇 控制科学与工程
    • 14 篇 机械工程
    • 7 篇 光学工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 电气工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
  • 206 篇 理学
    • 110 篇 物理学
    • 99 篇 数学
    • 3 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 地球物理学
  • 112 篇 军事学
    • 112 篇 军队指挥学
  • 24 篇 管理学
    • 22 篇 管理科学与工程(可...
  • 6 篇 艺术学
    • 6 篇 设计学(可授艺术学...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 医学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 农学

主题

  • 100 篇 cryptography
  • 26 篇 quantum cryptogr...
  • 26 篇 quantum
  • 17 篇 cryptanalysis
  • 14 篇 key
  • 14 篇 blockchain
  • 14 篇 information secu...
  • 11 篇 security
  • 11 篇 quantum key dist...
  • 10 篇 block cipher
  • 9 篇 boolean function...
  • 9 篇 post-quantum cry...
  • 9 篇 attack
  • 9 篇 encryption
  • 8 篇 distribution
  • 8 篇 provable securit...
  • 7 篇 standard model
  • 7 篇 data security
  • 7 篇 identity-based c...
  • 6 篇 elliptic curve

机构

  • 25 篇 state key labora...
  • 18 篇 state key labora...
  • 12 篇 key laboratory o...
  • 11 篇 university of ch...
  • 10 篇 school of cyber ...
  • 9 篇 state key labora...
  • 8 篇 synergetic innov...
  • 7 篇 trusted computin...
  • 7 篇 department of co...
  • 6 篇 henan key labora...
  • 6 篇 data assurance a...
  • 6 篇 henan key labora...
  • 6 篇 school of cybers...
  • 6 篇 information secu...
  • 6 篇 state key labora...
  • 6 篇 institute for ad...
  • 5 篇 state key labora...
  • 5 篇 state key labora...
  • 5 篇 henan key labora...
  • 5 篇 synergetic innov...

作者

  • 13 篇 wan-su bao
  • 10 篇 yang wang
  • 9 篇 温巧燕
  • 9 篇 鲍皖苏
  • 9 篇 hu yupu
  • 9 篇 huanguo zhang
  • 8 篇 lin dongdai
  • 8 篇 李宏伟
  • 7 篇 周淳
  • 7 篇 江木生
  • 7 篇 wen qiaoyan
  • 6 篇 yiliang han
  • 6 篇 meiqin wang
  • 6 篇 zhang huanguo
  • 6 篇 he-liang huang
  • 6 篇 汪洋
  • 6 篇 xiaoyun wang
  • 5 篇 xiu-bo chen
  • 5 篇 zhu fuchen
  • 5 篇 陈秀波

语言

  • 411 篇 英文
  • 28 篇 中文
检索条件"机构=Al-Kindi Cryptography Research Laboratory"
439 条 记 录,以下是1-10 订阅
排序:
Reference-frame-independent quantum key distribution with two-way classical communication
收藏 引用
Chinese Physics B 2024年 第10期33卷 146-152页
作者: Chun Zhou Hai-Tao Wang Yi-Fei Lu Xiao-Lei Jiang Yan-Mei Zhao Yu Zhou Yang Wang Jia-Ji Li Yan-Yang Zhou Xiang Wang Hong-Wei Li Wan-Su Bao Henan Key laboratory of Quantum Information and cryptography SSF IEUZhengzhou 450001China
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)*** this ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering research Center of Commercial cryptography Theory and Technology Innovation State Key laboratory of Information Security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Fe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Improving Transferable Targeted Adversarial Attack for Object Detection Using RCEN Framework and Logit Loss Optimization
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4387-4412页
作者: Zhiyi Ding Lei Sun Xiuqing Mao Leyu Dai Ruiyang Ding School of cryptography Engineering Information Engineering UniversityZhengzhou450000China
Object detection finds wide application in various sectors,including autonomous driving,industry,and *** studies have highlighted the vulnerability of object detection models built using deep neural networks when conf... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 19-29页
作者: Kexin QIAO Zhiyu ZHANG Zhongfeng NIU Liehuang ZHU School of Cyberspace Science and Technology Beijing Institute of Technology State Key laboratory of Cryptology Institute of Information Engineering Chinese Academy of Sciences School of cryptography University of Chinese Academy of Sciences
Recent results show that the differential properties within quadruples boom as a new inspiration in cryptanalysis of Advanced Encryption Standard(AES)-like constructions. These methods include the exchange attack prop... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Automatically identifying imperfections and attacks in practical quantum key distribution systems via machine learning
收藏 引用
Science China(Information Sciences) 2024年 第10期67卷 359-372页
作者: Jiaxin XU Xiao MA Jingyang LIU Chunhui ZHANG Hongwei LI Xingyu ZHOU Qin WANG Institute of Quantum Information and Technology Nanjing University of Posts and Telecommunications Telecommunication and Networks National Engineering Research CenterNanjing University of Posts and Telecommunications Henan Key laboratory of Quantum Information and cryptography Strategic Support Force Information Engineering University
The realistic security of quantum key distribution(QKD) systems is currently a hot research topic in the field of quantum communications. There are always defects in practical devices, and eavesdroppers can make use o... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Security analysis of satellite-to-ground reference-frame-independent quantum key distribution with beam wandering
收藏 引用
Chinese Physics B 2024年 第8期33卷 192-201页
作者: 周淳 赵燕美 杨晓亮 陆宜飞 周雨 姜晓磊 汪海涛 汪洋 李家骥 江木生 汪翔 张海龙 李宏伟 鲍皖苏 Henan Key laboratory of Quantum Information and cryptography SSF IEUZhengzhou 450001China Synergetic Innovation Centre of Quantum Information and Quantum Physics University of Science and Technology of ChinaHefei 230026China
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference ***,how the beam wandering influences the performance of RFI-QKD... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Model for Detecting Fake News by Integrating Domain-Specific Emotional and Semantic Features
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2161-2179页
作者: Wen Jiang Mingshu Zhang Xu’an Wang Wei Bin Xiong Zhang Kelan Ren Facheng Yan College of cryptography Engineering Engineering University of People’s Armed PoliceXi’an710086China Key laboratory of Network and Information Security Engineering University of People’s Armed PoliceXi’an710086China Key laboratory of CTC&Information Engineering Engineering University of People’s Armed PoliceMinistry of EducationXi’an710086China
With the rapid spread of Internet information and the spread of fake news,the detection of fake news becomes more and more *** detection methods often rely on a single emotional or semantic feature to identify fake ne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4729-4748页
作者: Cong Shen Wei Zhang Tanping Zhou Yiming Zhang Lingling Zhang College of cryptography Engineering Engineering University of PAPXi’an710086China Key laboratory of People’s Armed Police for Cryptology and Information Security Xi’an710086China College of Information Engineering Engineering University of PAPXi’an710086China
With the increasing awareness of privacy protection and the improvement of relevant laws,federal learning has gradually become a new choice for cross-agency and cross-device machine *** order to solve the problems of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 585-607页
作者: Min-Gyu Kim Hwankuk Kim Department of Financial Information Security Kookmin UniversitySeoul02707Republic of Korea Department of Information Security cryptography Mathematics Kookmin UniversitySeoul02707Republic of Korea
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted *** research on anomaly detection u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 1925-1938页
作者: Xiong Zhang Minqing Zhang Xu AnWang Wen Jiang Chao Jiang Pan Yang College of cryptography Engineering Engineering University of People’s Armed PoliceXi’an710086China Key laboratory of People’s Armed Police for Cryptology and Information Security Xi’an710086China Key laboratory of CTC&Information Engineering(Engineering University of People’s Armed Police) Ministry of EducationXi’an710086China Staff Department of People’s Armed Police Ningxia Corps Yinchuan750000China
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during *** algorithm we designed aims to mit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论