咨询与建议

限定检索结果

文献类型

  • 2,070 篇 期刊文献
  • 62 篇 会议

馆藏范围

  • 2,132 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,560 篇 工学
    • 593 篇 计算机科学与技术...
    • 361 篇 电子科学与技术(可...
    • 289 篇 仪器科学与技术
    • 286 篇 网络空间安全
    • 278 篇 信息与通信工程
    • 265 篇 软件工程
    • 225 篇 控制科学与工程
    • 131 篇 机械工程
    • 77 篇 光学工程
    • 44 篇 交通运输工程
    • 41 篇 航空宇航科学与技...
    • 36 篇 电气工程
    • 28 篇 材料科学与工程(可...
    • 28 篇 环境科学与工程(可...
    • 24 篇 土木工程
  • 378 篇 理学
    • 115 篇 物理学
    • 77 篇 数学
    • 50 篇 大气科学
    • 38 篇 生物学
    • 32 篇 系统科学
    • 24 篇 生态学
  • 344 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 31 篇 公共管理
  • 226 篇 医学
    • 165 篇 临床医学
    • 30 篇 公共卫生与预防医...
  • 101 篇 军事学
    • 99 篇 军队指挥学
  • 92 篇 农学
    • 37 篇 农业资源与环境
    • 34 篇 作物学
  • 59 篇 经济学
    • 50 篇 应用经济学
  • 33 篇 艺术学
    • 32 篇 设计学(可授艺术学...
  • 23 篇 文学
  • 20 篇 法学
  • 16 篇 教育学
  • 3 篇 历史学
  • 2 篇 哲学

主题

  • 79 篇 blockchain
  • 76 篇 deep learning
  • 59 篇 security
  • 48 篇 machine learning
  • 44 篇 cloud computing
  • 36 篇 internet of thin...
  • 33 篇 communication
  • 28 篇 federated learni...
  • 26 篇 big data
  • 24 篇 china
  • 24 篇 artificial intel...
  • 20 篇 privacy protecti...
  • 20 篇 network
  • 20 篇 climate change
  • 19 篇 iot
  • 19 篇 quantum
  • 18 篇 privacy
  • 17 篇 encryption
  • 17 篇 data
  • 16 篇 covid-19

机构

  • 45 篇 information secu...
  • 35 篇 university of ch...
  • 25 篇 communication re...
  • 24 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 peng cheng labor...
  • 17 篇 information secu...
  • 16 篇 beijing national...
  • 13 篇 faculty of infor...
  • 13 篇 ieee
  • 13 篇 data assurance a...
  • 13 篇 school of cyber ...
  • 12 篇 state key labora...
  • 12 篇 purple mountain ...
  • 12 篇 department of el...
  • 12 篇 school of inform...
  • 11 篇 national mobile ...
  • 11 篇 school of comput...
  • 10 篇 school of inform...
  • 10 篇 school of inform...

作者

  • 18 篇 xiu-bo chen
  • 14 篇 gang xu
  • 10 篇 hao wang
  • 10 篇 taher m.ghazal
  • 9 篇 jieren cheng
  • 9 篇 jin wang
  • 9 篇 yu yang
  • 8 篇 wei li
  • 8 篇 yi-xian yang
  • 8 篇 jie xu
  • 8 篇 yixian yang
  • 8 篇 tao wang
  • 8 篇 hai jin
  • 8 篇 yongjun ren
  • 8 篇 yang li
  • 7 篇 jian wang
  • 7 篇 haseeb ahmad
  • 7 篇 陈秀波
  • 7 篇 kaizhi huang
  • 7 篇 yi zhang

语言

  • 1,915 篇 英文
  • 217 篇 中文
检索条件"机构=Data Assurance and Communication Security Research Center"
2132 条 记 录,以下是1-10 订阅
排序:
Privacy Distributed Constrained Optimization Over Time-Varying Unbalanced Networks and Its Application in Federated Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第2期12卷 335-346页
作者: Mengli Wei Wenwu Yu Duxin Chen Mingyu Kang Guang Cheng the School of Cyber Science and Engineering Southeast University IEEE the School of Mathematics Frontiers Science Center for Mobile Information Communication and Security Southeast University the Purple Mountain Laboratories the School of Mathematics Southeast University
This paper investigates a class of constrained distributed zeroth-order optimization(ZOO) problems over timevarying unbalanced graphs while ensuring privacy preservation among individual agents. Not taking into accoun... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Software-defined process-near-memory architecture using 3D hybrid bonding integration
收藏 引用
Science China(Information Sciences) 2025年 第1期68卷 366-378页
作者: Anlin XU Chenchen DENG Jianfeng ZHU Yao WANG Shaojun WEI Leibo LIU School of Integrated Circuits Tsinghua University Beijing Institution of Tracking and communication Technology Beijing National research center for Information Science and Technology Tsinghua University
With the unprecedented explosive growing amount of global data, the development of computing chips, which encounter bottlenecks such as power wall and memory wall, cannot satisfy the demanding requirement. This work p... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Improved Known-Key Distinguisher on Round-Reduced 3D Block Cipher
收藏 引用
Chinese Journal of Electronics 2015年 第1期24卷 199-204页
作者: ZHA Daren WU Shuang WANG Qiongxiao University of Chinese Academy of Sciences data assurance and communication security research center of Chinese Academy of Sciences
The 3D block cipher is a three-dimensional version of AES(Advanced encryption standard), which use a three-dimensional state and similar round functions. In this paper, we will use the known-key attack model proposed ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 407-426页
作者: Binyong Li Liangming Deng Jie Zhang Xianhui Deng School of Cybersecurity(Xin Gu Industrial College) Chengdu University of Information TechnologyChengdu610225China Advanced Cryptography and System security Key Laboratory of Sichuan Province Chengdu610225China SUGON Industrial Control and security center Chengdu610225China
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DDoS Attack Tracking Using Multi-Round Iterative Viterbi Algorithm in Satellite Internet
收藏 引用
China communications 2025年 第03期 148-163页
作者: Guo Wei Xu Jin Pei Yukui Yin Liuguo Feng Wei Department of Electronic Engineering Tsinghua University China Telecom Cybersecurity Technology Co. Ltd Operation center of Network security Products China Telecom Co. Ltd. Beijing National research center for Information Science and Technology research Institute of Tsinghua Pearl River Delta
Satellite Internet(SI) provides broadband access as a critical information infrastructure in ***, with the integration of the terrestrial Internet, the influx of massive terrestrial traffic will bring significant thre...
来源: 同方期刊数据库 同方期刊数据库 评论
Qubit-wise teleportation and its application in public-key secret communication
收藏 引用
Science China(Information Sciences) 2017年 第3期60卷 183-194页
作者: Chenmiao WU Li YANG State Key Laboratory of Information security Institute of Information EngineeringChinese Academy of Sciences data assurance and communication security research center Chinese Academy of Sciences University of Chinese Academy of Sciences
We propose a quantum public-key encryption(QPKE) protocol for an unknown multi-qubit state based on qubit-wise teleportation. The private-key is a computational Boolean function, whereas the public-key is a pair of a ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Montgomery Algorithm over a Prime Field
收藏 引用
Chinese Journal of Electronics 2019年 第1期28卷 39-44页
作者: YU Wei WANG Kunpeng LI Bao TIAN Song State Key Laboratory of Information security the Institute of Information EngineeringChinese Academy of Sciences data assurance and communication security research center Chinese Academy of Sciences University of Chinese Academy of Sciences
New formulae for point addition and point doubling on elliptic curves over prime fields are *** on these formulae, an improved Montgomery algorithm is proposed. The theoretical analysis indicates that it is about 13.4... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Analysis of bitcoin backbone protocol in the non-flat model
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 64-79页
作者: Peifang NI Hongda LI Dongxue PAN State Key Laboratory of Information security Institute of Information EngineeringChinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences data assurance and communication security research center Chinese Academy of Sciences
Owing to the novel proof-of-work based consensus algorithm, bitcoin has been the most successful decentralized cryptocurrency so far. In bitcoin system, parties(miners) compete to create blocks by doing publicly verif... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Mutual authenticated quantum no-key encryption scheme over private quantum channel
收藏 引用
Science China(Information Sciences) 2018年 第2期61卷 216-223页
作者: Li YANG Chenmiao WU Huiqin XIE State Key Laboratory of Information security Institute of Information EngineeringChinese Academy of Sciences data assurance and communication security research center Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
In this paper, we realize Shamir’s no-key protocol via quantum computation of Boolean functions and a private quantum channel. The proposed quantum no-key protocol has three rounds and provides mutual data origin aut... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Improved linear(hull) cryptanalysis of round-reduced versions of SIMON
收藏 引用
Science China(Information Sciences) 2017年 第3期60卷 223-225页
作者: Danping SHI Lei HU Siwei SUN Ling SONG Kexin QIAO Xiaoshuang MA State Key Laboratory of Information security Institute of Information Engineering Chinese Academy of Sciences data assurance and communication security research center Chinese Academy of Sciences University of Chinese Academy of Sciences
Dear editor,SIMON is a family of lightweight block ciphers proposed by the *** security Agency in2013[1].It employs a Feistel structure,and performs well in hardware and software implementa-
来源: 同方期刊数据库 同方期刊数据库 评论