咨询与建议

限定检索结果

文献类型

  • 1,295 篇 期刊文献
  • 38 篇 会议

馆藏范围

  • 1,333 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,086 篇 工学
    • 480 篇 计算机科学与技术...
    • 298 篇 网络空间安全
    • 186 篇 电子科学与技术(可...
    • 178 篇 软件工程
    • 152 篇 仪器科学与技术
    • 152 篇 控制科学与工程
    • 151 篇 信息与通信工程
    • 96 篇 机械工程
    • 60 篇 电气工程
    • 21 篇 交通运输工程
    • 19 篇 水利工程
    • 14 篇 航空宇航科学与技...
    • 13 篇 光学工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 土木工程
    • 12 篇 船舶与海洋工程
    • 12 篇 环境科学与工程(可...
    • 11 篇 化学工程与技术
  • 231 篇 管理学
    • 211 篇 管理科学与工程(可...
  • 207 篇 理学
    • 86 篇 数学
    • 59 篇 物理学
    • 15 篇 生物学
    • 13 篇 生态学
    • 10 篇 系统科学
  • 76 篇 军事学
    • 73 篇 军队指挥学
  • 43 篇 医学
    • 30 篇 临床医学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 33 篇 农学
    • 16 篇 农业资源与环境
  • 21 篇 艺术学
    • 20 篇 设计学(可授艺术学...
  • 20 篇 法学
    • 13 篇 政治学
  • 9 篇 文学
  • 8 篇 教育学
  • 2 篇 历史学

主题

  • 72 篇 security
  • 51 篇 network security
  • 48 篇 deep learning
  • 42 篇 machine learning
  • 42 篇 blockchain
  • 36 篇 network
  • 32 篇 intrusion detect...
  • 25 篇 internet of thin...
  • 22 篇 cloud computing
  • 19 篇 authentication
  • 18 篇 cryptography
  • 16 篇 privacy
  • 15 篇 anomaly detectio...
  • 15 篇 iot
  • 15 篇 neural network
  • 14 篇 smart grid
  • 13 篇 artificial intel...
  • 12 篇 clustering
  • 12 篇 wireless sensor ...
  • 12 篇 data

机构

  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 20 篇 university of ch...
  • 15 篇 institute of inf...
  • 14 篇 school of cyber ...
  • 13 篇 department of co...
  • 10 篇 school of cyber ...
  • 10 篇 institute of inf...
  • 10 篇 cyberspace insti...
  • 9 篇 ieee
  • 8 篇 institute for ne...
  • 8 篇 fujian provincia...
  • 8 篇 trusted computin...
  • 8 篇 national compute...
  • 8 篇 state key labora...
  • 7 篇 state key labora...
  • 7 篇 university of ch...
  • 7 篇 institute of inf...
  • 7 篇 shanghai institu...
  • 6 篇 department of in...

作者

  • 9 篇 wei li
  • 8 篇 dengguo feng
  • 8 篇 wei wang
  • 7 篇 lin dongdai
  • 7 篇 qixu liu
  • 6 篇 li yang
  • 6 篇 liehuang zhu
  • 6 篇 zhen chen
  • 6 篇 yu yang
  • 5 篇 junwei cao
  • 5 篇 yu wang
  • 5 篇 jiang zhang
  • 5 篇 si wang
  • 5 篇 baoxu liu
  • 5 篇 guang-hui liu
  • 5 篇 dongdai lin
  • 5 篇 yu zhang
  • 5 篇 jing qu
  • 5 篇 walid el-shafai
  • 5 篇 jiangyuan yao

语言

  • 1,227 篇 英文
  • 106 篇 中文
检索条件"机构=Institute for Cryptology and Network Security"
1333 条 记 录,以下是31-40 订阅
排序:
Quantum private query: A new kind of practical quantum cryptographic protocol
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2019年 第7期62卷 10-21页
作者: Fei Gao SuJuan Qin Wei Huang QiaoYan Wen State Key Laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Science and Technology on Communication security Laboratory Institute of Southwestern Communication State Key Laboratory of cryptology
This research aims to review the developments in the field of quantum private query(QPQ), a type of practical quantum cryptographic protocol. The primary protocol, as proposed by Jacobi et al., and the improvements in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(Information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of network security and cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym Information security Technology Ltd. Center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quantum Codes from Constacyclic Codes over Polynomial Residue Rings
收藏 引用
Chinese Journal of Electronics 2019年 第6期28卷 1131-1138页
作者: DING Jian LI Hongju LIANG Jing TANG Yongsheng College of Mathematics and Informatics Fujian Normal University Fujian Provincial Key Lab of network security and cryptology Fujian Normal University Department of General Education Anhui Xinhua University School of Mathematics and Statistics Hefei Normal University
Sufficient and necessary conditions for Hermitian(1 + λu)-constacyclic self-orthogonal codes over F;m +uF;m are obtained, where λ is a unit of F;m +uF;*** on this, a new method for the construction of p;ary quantu... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Analysis and improvement of a provable secure fuzzy identity-based signature scheme
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 156-160页
作者: XIONG Hu CHEN YaNan ZHU GuoBin QIN ZhiGuang School of Computer Science and Engineering University of Electronic Science and Technology of China Chongqing Key Lab of Computer network and Communication Technology Key Lab of network security and cryptology Fujian Normal University School of Traffic and Transportation Beijing Jiaotong University
To enjoy the property of error tolerance in the biometric identities extraction,the fuzzy identitybased signature has been initialized to issue a signature on behalf of a descriptive attributes setωinstead of a singl... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 113-129页
作者: Debiao HE Ding WANG Qi XIE Kefei CHEN State Key Laboratory of Software Engineering Computer School Wuhan University State Key Laboratory of cryptology School of Electronics Engineering and Computer Science Peking University Hangzhou Key Laboratory of Cryptography and network security Hangzhou Normal University
With the development of the wireless communication technology and the popularity of mobile devices, the mobile wireless network(MWN) has been widely used in our daily life. Through the access point(AP), users could ac... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Two open-source projects for image aesthetic quality assessment
收藏 引用
Science China(Information Sciences) 2019年 第2期62卷 198-199页
作者: Le WU Xin JIN Geng ZHAO Xinghui ZHOU Beijing Electronic Science and Technology institute State Key Laboratory of cryptology
Here we introduce two open-source projects for image aesthetic quality assessment. The first one is ILGnet, an open-source project for the aesthetic evaluation of images based on the convolution neural network. The se... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient and Privacy-Preserving Data Aggregation Scheme Supporting Arbitrary Statistical Functions in IoT
收藏 引用
China Communications 2022年 第6期19卷 91-104页
作者: Haihui Liu Jianwei Chen Liwei Lin Ayong Ye Chuan Huang College of Computer and Cyber security Fujian Normal UniversityFuzhou 350117China Fujian Provincial Key Laboratory of network security and cryptology Fujian Normal UniversityFuzhou 350117China School of Computer Science and Mathematics Fujian University of TechnologyFuzhou 350118China Digital Fujian institute of Big Data security Technology Fujian Normal UniversityFuzhou 350117China
The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our *** terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to achieve i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On the 2~m-variable symmetric Boolean functions with maximum algebraic immunity
收藏 引用
Science in China(Series F) 2008年 第2期51卷 120-127页
作者: QU LongJiang LI Chao Department of Mathematic and System Science National University of Defense Technology Changsha 410073 China Key Lab of network security and cryptology Technique Fujian Normal University Fuzhou 350007 China
The properties of the 2m-variable symmetric Boolean functions with maximum al- gebraic immunity are studied in this paper. Their value vectors, algebraic normal forms, and algebraic degrees and weights are all obtaine... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure fusion of encrypted remote sensing images based on Brovey
收藏 引用
Science China(Information Sciences) 2021年 第2期64卷 243-245页
作者: Junzhi YANG Guohua CHENG Meng SHEN School of Information and Electronics Beijing Institute of Technology School of Computer Science Beijing Institute of Technology Key Lab of Information network security of Ministry of Public security (The Third Research institute of Ministry of Public security)
Dear editor,In the field of image fusion, panchromatic images captured by the Satellite Pour l’Observation de la Terre(SPOT) [1]have high spatial resolutions, whereas their spectral resolutions are relatively low. On... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Achieve Personalized Anonymity Through Query Blocks Exchanging
收藏 引用
China Communications 2016年 第11期13卷 106-118页
作者: Chunguang Ma Lei Zhang Songtao Yang Xiaodong Zheng Pinhui Ke College of Computer Science and Technology Harbin Engineering University Fujian Provincial Key Laboratory of network security and cryptology Fujian Normal University College of Information and Electronic Technology Jiamusi University College of Applied Technology Qiqihar University
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论