咨询与建议

限定检索结果

文献类型

  • 276 篇 期刊文献
  • 17 篇 会议

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 269 篇 工学
    • 206 篇 计算机科学与技术...
    • 106 篇 电气工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 网络空间安全
    • 85 篇 信息与通信工程
    • 68 篇 软件工程
    • 50 篇 控制科学与工程
    • 39 篇 材料科学与工程(可...
    • 35 篇 仪器科学与技术
    • 25 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 16 篇 力学(可授工学、理...
    • 9 篇 航空宇航科学与技...
    • 6 篇 光学工程
  • 140 篇 理学
    • 93 篇 数学
    • 25 篇 物理学
    • 21 篇 生物学
    • 17 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 5 篇 天文学
    • 5 篇 地球物理学
  • 51 篇 管理学
    • 46 篇 管理科学与工程(可...
  • 19 篇 军事学
    • 18 篇 军队指挥学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 11 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 9 篇 教育学
    • 7 篇 教育学
  • 8 篇 艺术学
    • 8 篇 设计学(可授艺术学...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 文学
  • 2 篇 农学

主题

  • 22 篇 blockchain
  • 18 篇 security
  • 11 篇 cryptography
  • 9 篇 authentication
  • 9 篇 data
  • 7 篇 access control
  • 7 篇 cloud computing
  • 6 篇 privacy
  • 6 篇 information secu...
  • 5 篇 deep learning
  • 5 篇 data security
  • 5 篇 cloud
  • 5 篇 encryption
  • 4 篇 image encryption
  • 4 篇 smart grid
  • 4 篇 signature
  • 4 篇 data privacy
  • 4 篇 learning
  • 4 篇 internet of thin...
  • 4 篇 electronic comme...

机构

  • 9 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 genome institute...
  • 5 篇 school of comput...
  • 5 篇 school of inform...
  • 5 篇 school of automa...
  • 5 篇 department of el...
  • 5 篇 school of comput...
  • 5 篇 school of electr...
  • 4 篇 security enginee...
  • 4 篇 school of comput...
  • 4 篇 moe key lab for ...
  • 3 篇 school of comput...
  • 3 篇 jiangsu key labo...
  • 3 篇 ieee
  • 3 篇 college of compu...
  • 3 篇 precision medici...
  • 3 篇 center for cyber...
  • 3 篇 guangxi key labo...

作者

  • 7 篇 kai ye
  • 7 篇 xiaofei yang
  • 5 篇 yong ding
  • 5 篇 walid el-shafai
  • 5 篇 peng jia
  • 5 篇 bo yang
  • 4 篇 yujue wang
  • 4 篇 chunxiang xu
  • 4 篇 yongjun ren
  • 4 篇 wei li
  • 4 篇 tun xu
  • 4 篇 yang zhao
  • 3 篇 yunqing shi
  • 3 篇 qirong mao
  • 3 篇 xiaohong guan
  • 3 篇 mohamad khairi i...
  • 3 篇 junchao dong
  • 3 篇 chengsheng zhang
  • 3 篇 hu xiong
  • 3 篇 li guo

语言

  • 289 篇 英文
  • 4 篇 中文
检索条件"机构=School of Computer Science and Information Security Guilin University of Electronic Technology 1 Jinji Road"
293 条 记 录,以下是51-60 订阅
排序:
Identity-based public auditing for cloud storage systems against malicious auditors via blockchain
收藏 引用
science China(information sciences) 2019年 第3期62卷 45-60页
作者: Jingting XUE Chunxiang XU Jining ZHAO Jianfeng MA Center for Cyber security School of Computer Science and Engineering University of Electronic Science and Technology of China Department of Mathematics and computer science Emory University school of computer science Xidian University
Cloud storage systems provide users with convenient data storage services, which allow users to access and update outsourced data remotely. However, these cloud storage services do not guarantee the integrity of the d... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A User-Centric Data Secure Creation Scheme in Cloud Computing
收藏 引用
Chinese Journal of electronics 2016年 第4期25卷 753-760页
作者: SU Mang LI Fenghua SHI Guozhen GENG Kui XIONG Jinbo school of computer science and Engineering Nanjing University of Science and Technology State Key Laboratory of information security Institute of Information EngineeringChinese Academy of Sciences Department of information security Beijing Electronic Science and Technology Institute State Key Laboratory of Integrated Services Network Xidian University
Due to the use of the cloud computing technology,the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds,which would bring new challenges ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Constructing Odd-Variable Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity and High Nonlinearity
收藏 引用
Chinese Journal of electronics 2019年 第1期28卷 45-51页
作者: ZHAO Qinglan HAN Gang ZHENG Dong LI Xiangxue school of information security Engineering Shanghai Jiaotong University National Engineering Laboratory for Wireless security Xi'an University of Post and Telecommunications College of electronic information Northwestern Polytechnical University school of computer science and technology East China Normal University
Rotation symmetric Boolean functions(RSBFs) have attracted widespread attention due to their good cryptographic properties. We present a new construction of RSBFs with optimal algebraic immunity on odd number of varia... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A New Method for Meet-in-the-Middle Attacks on Reduced AES
收藏 引用
China Communications 2011年 第2期8卷 21-25页
作者: 董晓丽 胡予濮 韦永壮 陈杰 Key Lab. of computer Networks & information security Ministry of EducationXidian University school of information and Communication Guilin University of Electronic Technology State Key Lab. of information security Institute of SoftwareChinese Academy of Sciences
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On-chain is not enough:Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1053-1060页
作者: Yilei Wang Zhaojie Wang Guoyu Yang Shan Ai Xiaoyu Xiang Chang Chen Minghao Zhao school of computer science Qufu Normal UniversityRizhao276826China Guangxi Key Laboratory of Cryptography and information security Guilin University of Electronic TechnologyGuilin541004China Institute of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou510006China school of Software Tsinghua UniversityTsinghua UniversityBeijing100191China
The blockchain provides a reliable and scalable method for enabling source-tracing functionality in large-scale Internet of Things(IoT)*** blockchain-based source tracing applications are generally based on the hypoth... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Minimum Cost Multi-Path Parallel Transmission with Delay Constraint by Extending Openflow
收藏 引用
China Communications 2018年 第3期15卷 15-26页
作者: Kuangyu Qin Chuanhe Huang N.Ganesan Kewei Liu Xi Chen computer school of Wuhan university Wuhan 430072 China Collaborative Innovation Center of Geospatial technology Wuhan 430072 China school of computer science and information security Guilin University of Electronic Technology Guilin 541004 China Regional Institute of Co-operative Management Banashankari 2nd Stage Bangalore 560070 India
Sometimes user has the requirement to run a high bandwidth application over a low bandwidth network. But its implementation is not easy as the traditional network transmits data with only one path where its bandwidth ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Sharing of Encrypted Lock Keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption
收藏 引用
China Communications 2022年 第5期19卷 164-177页
作者: Zhiwei Wang Liping Qian Danwei Chen Guozi sun school of computer Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data security and Intelligent Processing Nanjing 210023China Guangxi Key Laboratory of Cryptography and information security Department of Computer SciencesGuilin University of Electronic TechnologyGuilin 541004China
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum secure direct communication and authentication protocol with single photons
收藏 引用
Chinese science Bulletin 2013年 第36期58卷 4571-4576页
作者: CHANG Yan XU ChunXiang ZHANG ShiBin YAN LiLi school of computer science and Engineering University of Electronic Science and Technology of China Department of Network Engineering Chengdu University of Information Technology
A quantum secure direct communication and authentication protocol is proposed by using single *** information transmission is completed by sending photons once in quantum channel,which improves the efficiency without ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum broadcast communication and authentication protocol with a quantum one-time pad
收藏 引用
Chinese Physics B 2014年 第1期23卷 80-83页
作者: 昌燕 许春香 张仕斌 闫丽丽 school of computer science and technology University of Electronic Science and Technology of China Department of Network Engineering Chengdu University of Information Technology
A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger-Horne-Zeilinger state is proposed. A binary string is used to express the identity of the receiver, wh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
收藏 引用
Frontiers of information technology & electronic Engineering 2019年 第6期20卷 787-800页
作者: Xin WANG Bo YANG Zhe XIA Hong-xia HOU school of computer science Shaanxi Normal University Xi'an 710119 China school of electronic information and Artificial Intelligence Shaanxi University of Science and Technology Xi'an 710021 China State Key Laboratory of information security Chinese Academy of Sciences Beijing 100093 China school of computer science and technology Wuhan University of Technology Wuhan 430070 China
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论