咨询与建议

限定检索结果

文献类型

  • 1,490 篇 期刊文献
  • 93 篇 会议

馆藏范围

  • 1,583 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,133 篇 工学
    • 449 篇 计算机科学与技术...
    • 211 篇 网络空间安全
    • 188 篇 软件工程
    • 187 篇 控制科学与工程
    • 166 篇 电子科学与技术(可...
    • 155 篇 仪器科学与技术
    • 121 篇 信息与通信工程
    • 112 篇 机械工程
    • 44 篇 电气工程
    • 38 篇 材料科学与工程(可...
    • 34 篇 地质资源与地质工...
    • 33 篇 环境科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 30 篇 水利工程
    • 29 篇 农业工程
    • 28 篇 化学工程与技术
    • 23 篇 交通运输工程
    • 20 篇 土木工程
  • 382 篇 理学
    • 84 篇 物理学
    • 78 篇 大气科学
    • 56 篇 地球物理学
    • 54 篇 数学
    • 38 篇 生态学
    • 32 篇 生物学
  • 230 篇 管理学
    • 207 篇 管理科学与工程(可...
  • 127 篇 医学
    • 81 篇 临床医学
    • 18 篇 公共卫生与预防医...
  • 86 篇 农学
    • 43 篇 农业资源与环境
  • 60 篇 军事学
    • 59 篇 军队指挥学
  • 47 篇 经济学
    • 43 篇 应用经济学
  • 17 篇 艺术学
  • 14 篇 文学
  • 8 篇 教育学
  • 7 篇 法学

主题

  • 70 篇 deep learning
  • 51 篇 security
  • 41 篇 machine learning
  • 36 篇 blockchain
  • 35 篇 network
  • 31 篇 internet of thin...
  • 24 篇 cloud computing
  • 23 篇 network security
  • 22 篇 monitoring
  • 22 篇 convolutional ne...
  • 18 篇 artificial intel...
  • 15 篇 system
  • 15 篇 china
  • 14 篇 covid-19
  • 13 篇 anomaly detectio...
  • 13 篇 iot
  • 13 篇 neural network
  • 13 篇 climate change
  • 12 篇 quantum
  • 12 篇 feature extracti...

机构

  • 34 篇 university of ch...
  • 23 篇 jiangsu collabor...
  • 17 篇 information secu...
  • 16 篇 information secu...
  • 16 篇 national compute...
  • 15 篇 school of comput...
  • 14 篇 jiangsu engineer...
  • 13 篇 national compute...
  • 12 篇 wuxi research in...
  • 11 篇 engineering rese...
  • 11 篇 school of automa...
  • 10 篇 jiangsu engineer...
  • 8 篇 shanghai institu...
  • 8 篇 jiangsu engineer...
  • 7 篇 institute of inf...
  • 7 篇 school of comput...
  • 7 篇 national compute...
  • 6 篇 school of comput...
  • 6 篇 school of inform...
  • 6 篇 state key labora...

作者

  • 21 篇 wei sun
  • 21 篇 xiaorui zhang
  • 12 篇 zhiguo qu
  • 12 篇 xingming sun
  • 11 篇 xiu-bo chen
  • 11 篇 taher m.ghazal
  • 10 篇 wei li
  • 10 篇 gang xu
  • 10 篇 sunil kumar jha
  • 9 篇 wenjie liu
  • 8 篇 yuqing zhang
  • 7 篇 jieren cheng
  • 7 篇 yixian yang
  • 7 篇 yongjun ren
  • 7 篇 yang yi-xian
  • 7 篇 muhammad adnan k...
  • 6 篇 zhang yuqing
  • 6 篇 ruohan meng
  • 6 篇 guang-hui liu
  • 6 篇 qi cui

语言

  • 1,465 篇 英文
  • 118 篇 中文
检索条件"机构=Network Security Monitoring Center"
1583 条 记 录,以下是1-10 订阅
排序:
Authentication Methods for 802.11s Mesh networks
收藏 引用
China Communications 2007年 第1期4卷 56-65页
作者: SangJae Moon Mobile network security Technology Research center
With the rapid development of the WLAN,the 802. 11 s mesh network is ***,adaptability and scalability are the most important attributes of a mesh ***,the security in an 802.11s mesh network is not well defined or spec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Overview of General Theory of security
收藏 引用
China Communications 2017年 第7期14卷 1-10页
作者: Min Lei Yixian Yang Xinxin Niu Yu Yang Jie Hao Information security center Beijing University of Posts and Telecommunications Guizhou University Guizhou Provincial Key Laboratory of Public Big Data Jiangsu Engineering center of network monitoring Nanjing University of Information Science & Technology
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Minimum length key in MST cryptosystems
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 142-152页
作者: Haibo HONG Licheng WANG Haseeb AHMAD Yixian YANG Zhiguo QU School of Computer Science and Information Engineering Zhejiang Gongshang University Information security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Jiangsu Engineering center of network monitoring Nanjing University of Information Science & Technology
As a special factorization category of finite groups, logarithmic signature(LS) is used as the main component of cryptographic keys that operate within secret key cryptosystems such as PGM and public key cryptosystems... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Universally composable secure TNC model and EAP-TNC protocol in IF-T
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 465-482页
作者: MOON SangJae Mobile network security Technology Research center Kyungpook National University
This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC, the... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Provably Secure Identity-based Group Key Exchange Protocol
收藏 引用
China Communications 2007年 第4期4卷 11-22页
作者: SangJae Moon Mobile network security Technology Research center Kyungpook National University
Group key management is one of the basic building blocks in securing group communication.A number of solutions to group key exchange have been proposed,but most of them are not scalable and,in particular,require at le... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Universally composable one-time signature and broadcast authentication
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 567-580页
作者: MOON SangJae Mobile network security Technology Research center Kyungpook National University
Broadcast authentication is a vital security primitive for the management of a copious number of parties. In the universally composable framework, this paper investigates broadcast authentication using one-time signat... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Efficient quantum state transmission via perfect quantum network coding
收藏 引用
Science China(Information Sciences) 2019年 第1期62卷 191-204页
作者: Zhen-Zhen LI Gang XU Xiu-Bo CHEN Zhiguo QU Xin-Xin NIU Yi-Xian YANG Information security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Jiangsu Engineering center of network monitoring Nanjing University of Information Science and Technology
Quantum network coding with the assistance of auxiliary resources can achieve perfect transmission of the quantum state. This paper suggests a novel perfect network coding scheme to efficiently solve the quantum k-pai... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Controlled remote preparation of an arbitrary four-qubit cluster-type state
收藏 引用
Chinese Physics B 2016年 第10期25卷 52-57页
作者: 陈维林 马松雅 瞿治国 School of Mathematics and Statistics Henan University Jiangsu Engineering center of network monitoring Nanjing University of Information Science and Technology
Two schemes are proposed to realize the controlled remote preparation of an arbitrary four-qubit cluster-type state via a partially entangled channel. We construct ingenious measurement bases at the sender’s and the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Improved quantum ripple-carry addition circuit
收藏 引用
Science China(Information Sciences) 2016年 第4期59卷 104-111页
作者: Feng WANG Mingxing LUO Huiran LI Zhiguo QU Xiaojun WANG College of mathematical sciences Dezhou University Information security and National Computing Grid Laboratory Southwest Jiaotong University Jiangsu Engineering center of network monitoring Nanjing University of Information Science & Technology School of Electronic Engineering Dublin City University
A serious obstacle to large-scale quantum algorithms is the large number of elementary gates, such as the controlled-NOT gate or Toffoli gate. Herein, we present an improved linear-depth ripple-carry quantum addition ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quantum private comparison based on quantum dense coding
收藏 引用
Science China(Information Sciences) 2016年 第11期59卷 195-207页
作者: Feng WANG Mingxing LUO Huiran LI Zhiguo QU Xiaojun WANG College of Mathematical Sciences Dezhou University Information security and National Computing Grid Laboratory Southwest Jiaotong University Jiangsu Engineering center of network monitoring Nanjing University of Information Science & Technology School of Electronic Engineering Dublin City University
A serious problem in cloud computing is privacy information protection. This study proposes a new private comparison protocol using Einstein-Podolsky-Rosen(EPR) pairs. This protocol allows two parties to secretly comp... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论