咨询与建议

限定检索结果

文献类型

  • 456 篇 期刊文献
  • 21 篇 会议

馆藏范围

  • 477 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 343 篇 工学
    • 183 篇 计算机科学与技术...
    • 93 篇 网络空间安全
    • 58 篇 信息与通信工程
    • 53 篇 软件工程
    • 51 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
    • 31 篇 控制科学与工程
    • 15 篇 电气工程
    • 14 篇 材料科学与工程(可...
    • 12 篇 机械工程
    • 8 篇 交通运输工程
    • 6 篇 水利工程
    • 6 篇 航空宇航科学与技...
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
  • 85 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 7 篇 农林经济管理
    • 6 篇 工商管理
    • 6 篇 公共管理
  • 73 篇 理学
    • 31 篇 数学
    • 12 篇 物理学
    • 10 篇 生态学
    • 7 篇 生物学
    • 5 篇 大气科学
    • 4 篇 系统科学
  • 28 篇 农学
    • 12 篇 农业资源与环境
  • 28 篇 医学
    • 20 篇 临床医学
  • 20 篇 军事学
    • 19 篇 军队指挥学
  • 19 篇 经济学
    • 18 篇 应用经济学
  • 9 篇 法学
    • 4 篇 社会学
  • 4 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 24 篇 security
  • 22 篇 blockchain
  • 14 篇 cloud computing
  • 10 篇 internet of thin...
  • 10 篇 privacy
  • 9 篇 network
  • 8 篇 privacy protecti...
  • 8 篇 service
  • 8 篇 climate change
  • 7 篇 access control
  • 7 篇 data sharing
  • 7 篇 information syst...
  • 7 篇 authentication
  • 7 篇 china
  • 7 篇 encryption
  • 7 篇 cryptography
  • 6 篇 iot
  • 6 篇 anonymity
  • 5 篇 bilinear pairing
  • 5 篇 detection

机构

  • 18 篇 state key labora...
  • 12 篇 state key labora...
  • 9 篇 state key labora...
  • 6 篇 state key labora...
  • 6 篇 school of inform...
  • 5 篇 school of cybers...
  • 5 篇 department of bi...
  • 5 篇 center of excell...
  • 5 篇 national enginee...
  • 5 篇 national enginee...
  • 5 篇 information secu...
  • 4 篇 school of inform...
  • 4 篇 information secu...
  • 4 篇 state key labora...
  • 3 篇 institute of inf...
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 mushroom researc...
  • 3 篇 college of agric...
  • 3 篇 key laboratory o...

作者

  • 7 篇 hui li
  • 6 篇 changjun jiang
  • 5 篇 mingkwan doilom
  • 5 篇 saowaluck tibpro...
  • 4 篇 wang yumin
  • 4 篇 kai fan
  • 4 篇 anuruddha karuna...
  • 4 篇 wang baocang
  • 4 篇 yupu hu
  • 4 篇 shicheng zhang
  • 4 篇 chayanard phukha...
  • 4 篇 dhanushka n.wana...
  • 4 篇 hu yupu
  • 4 篇 yintang yang
  • 4 篇 ming yang
  • 4 篇 baocang wang
  • 3 篇 jung taek seo
  • 3 篇 cheng wang
  • 3 篇 jiajun fan
  • 3 篇 zong-long luo

语言

  • 439 篇 英文
  • 38 篇 中文
检索条件"机构=Security Service Co.Ltd."
477 条 记 录,以下是1-10 订阅
排序:
Determination of Working Pressure for Airport Runway Rubber Mark Cleaning Vehicle Based on Numeric Simulation
收藏 引用
computer Modeling in Engineering & Sciences 2019年 第9期120卷 799-813页
作者: Haojun Peng Zhongwei Wu Jinbing Xia Bolin Dong Yuntao Peng Linghe Wang Xingxing Ma Wei Shen School of Mechanical Engineering Hefei University of TechnologyHefeiChina Fire Detachment in Xi’an Xianyang International Airport co. Ltd.XianyangChina security service co.ltd. Xi’an Xianyang International AirportChina West Airport GroupXianyangChina
In this paper,numeric simulations are performed for three dimension models built according to actual surface cleaner in airport runway rubber mark cleaning vehicle using ANSYS FLUENT software on the basis of previous ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Precise sensitivity recognizing,privacy preserving,knowledge graph-based method for trajectory data publication
收藏 引用
Frontiers of computer Science 2022年 第4期16卷 219-221页
作者: Xianxian Li Bing Cai Li-e Wang Lei Lei Guangxi Key Lab of Multi-source Information Mining and security Guangxi Normal UniversityGuilin541004China college of computer Science and Information Engineering Guangxi Normal UniversityGuilin541004China Nanning Tiancheng Zhiyuan Intellectual Property service co.ltd. Nanning530000China
1Introduction The existing privacy protection methods of trajectory data publication have two ***,existing methods[1-3]cannot resist attribute link attacks *** practical scenarios,it is necessary to integrate data fro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Lattice-based certificateless encryption scheme
收藏 引用
Frontiers of computer Science 2014年 第5期8卷 828-836页
作者: Mingming JIANG Yupu HU Hao LEI Baocang WANG Qiqi LAI State Key Laboratory of Integrated service Networks Xidian University Xi'an 710071 China security and Privacy Lab CRDU Huawei Technologies Co. LTD. Beijing 100095 China
Certificateless public key cryptography (CL- PKC) can solve the problems of certificate management in a public key infrastructure (PKI) and of key escrows in identity-based public key cryptography (ID-PKC). In C... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Design of an Information security service for Medical Artificial Intelligence
收藏 引用
computers, Materials & continua 2022年 第1期70卷 679-694页
作者: Yanghoon Kim Jawon Kim Hangbae Chang Department of Cyber Drone Bot Military Engineering Shinhan UniversityUijeongbu-si11644Gyeonggi-doKorea Department of security convergence Graduate SchoolChung-Ang UniversityDongjack-gu06974SeoulKorea Department of Industrial security Chung-Ang UniversityDongjak-gu06974SeoulKorea
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT ***,it has been difficult to solve these problems due to data resource *** problems can cause... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第6期20卷 88-95页
作者: HUANG Qin-long MA Zhao-feng YANG Yi-xian FU Jing-yi NIU Xin-xin Information security Center Beijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing National security Science and Technology co. ltd
Cloud computing provides a convenient way of content trading and sharing. In this paper, we propose a secure and privacy-preserving digital rights management (DRM) scheme using homomorphic encryption in cloud comput... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Encrypted data sharing with multi-owner based on digital rights management in online social networks
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2014年 第1期21卷 86-93页
作者: HUANG Qin-long FU Jing-yi MA Zhao-feng YANG Yi-xian NIU Xin-xin Information security Center Beijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing National security Science and Technology co. Ltd
The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
收藏 引用
Journal of computer Science & Technology 2011年 第2期26卷 269-275页
作者: 潘森杉 傅晓彤 张卫国 State Key Laboratory of Integrated service Networks Xidian University State Key Laboratory of Information security Institute of SoftwareChinese Academy of Sciences
This paper presents a construction for a class of 1-resilient functions with optimal algebraic immunity on an even number of variables. The construction is based on the concatenation of two balanced functions in assoc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Lightweight Mutual Authentication Scheme for Protecting Identity in Insecure Environment
收藏 引用
China communications 2018年 第6期15卷 158-168页
作者: Xu Wu Jin Xu Binxing Fang School of Cyberspace security Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed computing and service (BUPT) Ministry of Education
Many improved authentication solutions were put forward, on purpose of authenticating more quickly and ***, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall secur... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reconstruction methodology for rational secret sharing based on mechanism design
收藏 引用
Science China(Information Sciences) 2017年 第8期60卷 240-242页
作者: Hai LIU Xinghua LI Jianfeng MA Mengfan XU Jingjing GUO State Key Laboratory of Integrated service Networks Xidian University Shaanxi Key Laboratory of Network and System security Xidian University School of Cyber Engineering Xidian University
Rational secret sharing[1]is the intersection of game theory[2]and traditional secret sharing[3].In rational secret sharing,the players are selfish and always behave in accordance with profit *** this implies,primaril... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix
收藏 引用
Science China(Information Sciences) 2022年 第3期65卷 196-210页
作者: Jun LIU Vincent RIJMEN Yupu HU Jie CHEN Baocang WANG State Key Laboratory of Integrated service Networks Xidian University Interuniversity Microelectronics Centre & computer security and Industrial Cryptography Group Department of Informatics University of Bergen
White-box cryptography aims to provide secure cryptographic primitives and implementations for the white-box attack model, which assumes that an adversary has full access to the implementation of the cryptographic alg... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论