咨询与建议

限定检索结果

文献类型

  • 1,894 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 1,971 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,776 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 751 篇 电气工程
    • 693 篇 网络空间安全
    • 614 篇 信息与通信工程
    • 588 篇 电子科学与技术(可...
    • 428 篇 材料科学与工程(可...
    • 367 篇 软件工程
    • 326 篇 控制科学与工程
    • 194 篇 生物医学工程(可授...
    • 168 篇 力学(可授工学、理...
    • 161 篇 机械工程
    • 147 篇 仪器科学与技术
    • 57 篇 环境科学与工程(可...
    • 49 篇 光学工程
    • 49 篇 生物工程
    • 46 篇 动力工程及工程热...
    • 45 篇 化学工程与技术
  • 1,034 篇 理学
    • 537 篇 数学
    • 328 篇 物理学
    • 198 篇 天文学
    • 98 篇 生物学
    • 55 篇 化学
    • 52 篇 地球物理学
    • 41 篇 生态学
  • 345 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
  • 233 篇 军事学
    • 231 篇 军队指挥学
  • 113 篇 医学
    • 75 篇 临床医学
  • 75 篇 农学
    • 42 篇 农业资源与环境
  • 62 篇 法学
  • 46 篇 经济学
    • 44 篇 应用经济学
  • 30 篇 艺术学
  • 14 篇 文学
  • 13 篇 教育学
  • 1 篇 历史学

主题

  • 130 篇 cryptography
  • 97 篇 security
  • 85 篇 blockchain
  • 50 篇 deep learning
  • 41 篇 information secu...
  • 37 篇 quantum cryptogr...
  • 36 篇 quantum
  • 35 篇 cloud computing
  • 30 篇 internet of thin...
  • 30 篇 authentication
  • 30 篇 encryption
  • 29 篇 machine learning
  • 26 篇 privacy
  • 26 篇 quantum key dist...
  • 24 篇 privacy protecti...
  • 24 篇 network security
  • 20 篇 cryptanalysis
  • 17 篇 image encryption
  • 17 篇 network
  • 17 篇 federated learni...

机构

  • 45 篇 state key labora...
  • 43 篇 information secu...
  • 35 篇 information secu...
  • 29 篇 information secu...
  • 19 篇 information secu...
  • 19 篇 china informatio...
  • 15 篇 university of ch...
  • 15 篇 school of inform...
  • 14 篇 state key labora...
  • 14 篇 national enginee...
  • 14 篇 school of cyber ...
  • 13 篇 key laboratory o...
  • 12 篇 beijing national...
  • 12 篇 national compute...
  • 11 篇 synergetic innov...
  • 11 篇 data assurance a...
  • 11 篇 synergetic innov...
  • 10 篇 university of ch...
  • 10 篇 national compute...
  • 10 篇 faculty of infor...

作者

  • 24 篇 xiu-bo chen
  • 21 篇 gang xu
  • 15 篇 yixian yang
  • 15 篇 李宏伟
  • 14 篇 yang yixian
  • 14 篇 wan-su bao
  • 14 篇 yang yi-xian
  • 14 篇 taher m.ghazal
  • 12 篇 鲍皖苏
  • 12 篇 xiubo chen
  • 12 篇 yang wang
  • 12 篇 杨义先
  • 11 篇 陈秀波
  • 11 篇 niu xinxin
  • 11 篇 liang jin
  • 11 篇 yu yang
  • 10 篇 周淳
  • 10 篇 yuling chen
  • 10 篇 lin dongdai
  • 10 篇 yongjun ren

语言

  • 1,815 篇 英文
  • 156 篇 中文
检索条件"机构=Center for Information Security and Cryptography"
1971 条 记 录,以下是1-10 订阅
排序:
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering Research center of Commercial cryptography Theory and Technology Innovation State Key Laboratory of information security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Fe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 585-607页
作者: Min-Gyu Kim Hwankuk Kim Department of Financial information security Kookmin UniversitySeoul02707Republic of Korea Department of information security cryptography Mathematics Kookmin UniversitySeoul02707Republic of Korea
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted *** research on anomaly detection u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improving Transferable Targeted Adversarial Attack for Object Detection Using RCEN Framework and Logit Loss Optimization
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4387-4412页
作者: Zhiyi Ding Lei Sun Xiuqing Mao Leyu Dai Ruiyang Ding School of cryptography Engineering Information Engineering UniversityZhengzhou450000China
Object detection finds wide application in various sectors,including autonomous driving,industry,and *** studies have highlighted the vulnerability of object detection models built using deep neural networks when conf... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher *** generated many excellent results for some ciphers,for example,*** this research,w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2085-2103页
作者: Jun Li Minqing Zhang Ke Niu Yingnan Zhang Xiaoyuan Yang College of cryptography Engineering Engineering University of the Chinese People’s Armed Police ForceXi’an710086China Key Laboratory of Network and information security of the Chinese People’s Armed Police Force Xi’an710086China
Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging *** the purpose of improving the detection perf... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4729-4748页
作者: Cong Shen Wei Zhang Tanping Zhou Yiming Zhang Lingling Zhang College of cryptography Engineering Engineering University of PAPXi’an710086China Key Laboratory of People’s Armed Police for Cryptology and information security Xi’an710086China College of information Engineering Engineering University of PAPXi’an710086China
With the increasing awareness of privacy protection and the improvement of relevant laws,federal learning has gradually become a new choice for cross-agency and cross-device machine *** order to solve the problems of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
General Method of Combining Grover and Simon for Attacking Block Ciphers
收藏 引用
China Communications 2024年 第6期21卷 237-245页
作者: Fu Xiangqun Bao Wansu Shi Jianhong Li Tan Henan Key Laboratory of Quantum information and cryptography PLA SSF IEUZhengzhou 450001China Synergetic Innovation center of Quantum information and Quantum Physics University of Science and Technology of ChinaHefei 230026China
The compatibility of different quantum algorithms should be considered when these algorithms are *** this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions or ***,we... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Automatically identifying imperfections and attacks in practical quantum key distribution systems via machine learning
收藏 引用
Science China(information Sciences) 2024年 第10期67卷 359-372页
作者: Jiaxin XU Xiao MA Jingyang LIU Chunhui ZHANG Hongwei LI Xingyu ZHOU Qin WANG Institute of Quantum information and Technology Nanjing University of Posts and Telecommunications Telecommunication and Networks National Engineering Research CenterNanjing University of Posts and Telecommunications Henan Key Laboratory of Quantum information and cryptography Strategic Support Force Information Engineering University
The realistic security of quantum key distribution(QKD) systems is currently a hot research topic in the field of quantum communications. There are always defects in practical devices, and eavesdroppers can make use o... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4491-4512页
作者: Chunhui Li Hua Jiang School of Computer and Electronic information Guangxi UniversityNanning530000China Cyber security and information center Guangxi UniversityNanning530000China
In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of *** systems spanning various sectors of enterprises geographically dispersed,the necessit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of Network security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym information security Technology Ltd. center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National cryptography Standard for Identity-Based cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论