咨询与建议

限定检索结果

文献类型

  • 437 篇 期刊文献
  • 21 篇 会议

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 124 篇 计算机科学与技术...
    • 91 篇 电子科学与技术(可...
    • 85 篇 信息与通信工程
    • 80 篇 仪器科学与技术
    • 44 篇 网络空间安全
    • 34 篇 控制科学与工程
    • 31 篇 软件工程
    • 16 篇 光学工程
    • 15 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 电气工程
    • 9 篇 航空宇航科学与技...
    • 8 篇 交通运输工程
    • 7 篇 化学工程与技术
    • 6 篇 生物工程
  • 101 篇 理学
    • 52 篇 物理学
    • 14 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 4 篇 化学
  • 74 篇 管理学
    • 71 篇 管理科学与工程(可...
  • 50 篇 医学
    • 28 篇 临床医学
    • 9 篇 公共卫生与预防医...
    • 6 篇 药学(可授医学、理...
    • 5 篇 中西医结合
    • 5 篇 中药学(可授医学、...
  • 18 篇 军事学
    • 17 篇 军队指挥学
  • 13 篇 农学
    • 7 篇 作物学
  • 10 篇 经济学
    • 9 篇 应用经济学
  • 7 篇 教育学
    • 5 篇 教育学
  • 4 篇 法学
  • 4 篇 艺术学

主题

  • 14 篇 blockchain
  • 13 篇 networking
  • 11 篇 network
  • 10 篇 security
  • 7 篇 sdn
  • 7 篇 of
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 6 篇 load balancing
  • 6 篇 software-defined...
  • 6 篇 quantum cryptogr...
  • 6 篇 privacy protecti...
  • 6 篇 efficiency
  • 5 篇 internet of thin...
  • 5 篇 6g
  • 5 篇 networks
  • 5 篇 openflow
  • 5 篇 software defined...
  • 4 篇 deep learning
  • 4 篇 power

机构

  • 44 篇 information secu...
  • 27 篇 information secu...
  • 26 篇 state key labora...
  • 16 篇 state key labora...
  • 15 篇 school of inform...
  • 7 篇 department of co...
  • 6 篇 state key labora...
  • 5 篇 center for intel...
  • 5 篇 national digital...
  • 4 篇 state key lab of...
  • 4 篇 computer science...
  • 4 篇 shandong provinc...
  • 4 篇 information secu...
  • 4 篇 department of co...
  • 4 篇 center for compu...
  • 3 篇 information secu...
  • 3 篇 beijing national...
  • 3 篇 national key lab...
  • 3 篇 university of ch...
  • 3 篇 department of co...

作者

  • 22 篇 xiu-bo chen
  • 22 篇 gang xu
  • 12 篇 xiubo chen
  • 10 篇 yi-xian yang
  • 9 篇 yixian yang
  • 8 篇 haseeb ahmad
  • 8 篇 陈秀波
  • 8 篇 tao huang
  • 8 篇 jianhua zhang
  • 7 篇 zhao dou
  • 6 篇 杨义先
  • 6 篇 jian li
  • 5 篇 jiang liu
  • 5 篇 guozhen cheng
  • 5 篇 ying-chang liang
  • 5 篇 曾庆济
  • 5 篇 徐淑奖
  • 5 篇 yang yixian
  • 4 篇 xin liu
  • 4 篇 yuling chen

语言

  • 419 篇 英文
  • 39 篇 中文
检索条件"机构=Networking Center"
458 条 记 录,以下是71-80 订阅
排序:
Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme
收藏 引用
Chinese Physics B 2021年 第7期30卷 45-54页
作者: Jing-Wen Zhang Xiu-Bo Chen Gang Xu Yi-Xian Yang Information Security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876China School of Information Science and Technology North China University of TechnologyBeijing 100144China
Homomorphic encryption has giant advantages in the protection of privacy *** this paper,we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit ***,the pre-shared... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A blind quantum signature protocol using the GHZ states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2013年 第9期56卷 1636-1641页
作者: WANG MingMing CHEN XiuBo YANG YiXian Information Security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications State Key Laboratory of Information Security(Institute of Information Engineering Chinese Academy of Sciences)
Recently,some blind quantum signature(BQS) protocols have been *** the previous schemes have security and efficiency *** on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS protocol is *** with som... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fair rate control for wireless ad-hoc networks with time varying channel capacities
收藏 引用
控制理论与应用(英文版) 2010年 第1期8卷 69-74页
作者: Meiqin TANG Kai MA Xinping GUAN Institute of Mathematics and Information Ludong University Yantai Shandong 264025 China center for networking Control and Bioinformatics Department of Electrical Engineering Yanshan University Qinhuangdao Hebei 066004 China
We consider the problem of fair rate control for wireless ad-hoc networks with time varying channel capacities. The interaction between links in wireless ad-hoc networks introduces additional constraints on the flow r... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reconfiguring the Logical Topology With Performance Guarantees in WDM Networks
收藏 引用
光学学报 2003年 第S1期23卷 757-758页
作者: Fengqing Liu, Qingji Zeng, Xu Zhu, Xudong YangR&D center for Broadband Optical networking Techonology.Shanghai Jiaotong University Shanghai 200030, P.R. China, Tel: +86-21-62932166, Fax: +86-21-62932166, E-mail:liufengqing_1975@*** R&D center for Broadband Optical networking Techonology Shanghai Jiaotong UniversityShanghai 200030 P.R. China
To improve the network performance after traffic demand changes, reconfiguring the logical topology is necessary. We present an ILP algorithm to find out the least lightpath changes needed with guaranteed network perf... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
收藏 引用
Frontiers of Computer Science 2014年 第1期8卷 163-173页
作者: Lin CHENG Qiaoyan WEN Zhengping JIN Hua ZHANG State Key Laboratory of networking and Switch Technology Beijing University of Posts and Telecommunications Beijing 100876 China
Certificateless public key cryptography elimi- nates inherent key escrow problem in identity-based cryptog- raphy, and does not yet requires certificates as in the tradi- tional public key infrastructure. In this pape... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Value of Optical Bypass in Packet Ring Networks
收藏 引用
光学学报 2003年 第S1期23卷 755-756页
作者: Xu Zhu, Qingji Zeng, Fengqing Liu, Xudong Yang, Shilin Xiao R&D center for Broadband Optical networking, Shanghai Jiaotong University, Shanghai 200030, P.R.China R&D center for Broadband Optical networking Shanghai Jiaotong University Shanghai 200030 P.R.China
This paper firstly examines the value of optical bypass scheme in packet ring networks. An Integer Linear Program (ILP) formulation is presented and analytical results under different traffic patterns are given.
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Survey of Security Issues in Cognitive Radio Networks
收藏 引用
China Communications 2015年 第3期12卷 132-150页
作者: LI Jianwu FENG Zebing FENG Zhiyong ZHANG Ping Network Information Processing center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum ***,t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Multiparty semiquantum key agreement without entanglement
收藏 引用
Communications in Theoretical Physics 2020年 第6期72卷 70-75页
作者: Ming-Ming Wang Rui-Fan Han Lin-Ming Gong Shaanxi Key Laboratory of Clothing Intelligence State and Local Joint Engineering Research Center for Advanced Networking and Intelligent Information ServicesSchool of Computer ScienceXi'an Polytechnic UniversityXi'an 710048China
The key agreement protocols allow two or more users to negotiate a shared key for establishing a secure communication channel without a third trusted party in such a way that the shared key is determined by all author... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SERVICES AND COMMUNICATIONS IN FOG COMPUTING
收藏 引用
China Communications 2017年 第11期14卷 I0001-I0002页
作者: shangguang wang ao zhou michael m.komarov stephen s.yau the state key laboratory of networking and switching technology beijing university of posts and telecommunications(bupt) the state key laboratory of networking and switching technology beijing university of posts and telecommunications department of innovation and business in information technologies national research university arizona state university(asu) the asu information assurance center
In the current cloud-based Internet-of-Things (IoT) model, smart devices (such as sensors, smartphones) exchange information through the Internet to cooperate and provide services to users, which could be citizens... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论