咨询与建议

限定检索结果

文献类型

  • 678 篇 期刊文献
  • 23 篇 会议

馆藏范围

  • 701 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 611 篇 工学
    • 277 篇 计算机科学与技术...
    • 165 篇 网络空间安全
    • 152 篇 电子科学与技术(可...
    • 137 篇 信息与通信工程
    • 120 篇 软件工程
    • 117 篇 仪器科学与技术
    • 90 篇 控制科学与工程
    • 62 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 航空宇航科学与技...
    • 9 篇 生物医学工程(可授...
    • 6 篇 动力工程及工程热...
    • 6 篇 生物工程
    • 5 篇 交通运输工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 3 篇 化学工程与技术
  • 132 篇 管理学
    • 131 篇 管理科学与工程(可...
  • 114 篇 理学
    • 67 篇 数学
    • 26 篇 物理学
    • 13 篇 系统科学
    • 6 篇 生物学
    • 3 篇 统计学(可授理学、...
  • 51 篇 军事学
    • 51 篇 军队指挥学
  • 12 篇 法学
    • 12 篇 社会学
  • 12 篇 医学
    • 11 篇 临床医学
  • 11 篇 艺术学
    • 11 篇 设计学(可授艺术学...
  • 6 篇 文学
    • 4 篇 新闻传播学
  • 6 篇 农学
    • 4 篇 作物学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 教育学
  • 1 篇 历史学

主题

  • 33 篇 security
  • 32 篇 deep learning
  • 28 篇 blockchain
  • 22 篇 authentication
  • 17 篇 internet of thin...
  • 15 篇 wireless sensor ...
  • 15 篇 cryptography
  • 13 篇 encryption
  • 10 篇 cryptanalysis
  • 10 篇 network security
  • 10 篇 networks
  • 10 篇 provable securit...
  • 9 篇 social networks
  • 9 篇 information secu...
  • 9 篇 privacy
  • 8 篇 intrusion detect...
  • 8 篇 neural network
  • 8 篇 bilinear pairing...
  • 8 篇 cloud computing
  • 7 篇 power allocation

机构

  • 8 篇 state key labora...
  • 7 篇 genome institute...
  • 7 篇 college of compu...
  • 7 篇 national compute...
  • 7 篇 school of comput...
  • 7 篇 state key labora...
  • 7 篇 guangxi key lab ...
  • 7 篇 jiangsu high tec...
  • 6 篇 school of automa...
  • 6 篇 security enginee...
  • 6 篇 state key labora...
  • 6 篇 information secu...
  • 6 篇 guangdong key la...
  • 5 篇 school of comput...
  • 5 篇 ministry of educ...
  • 5 篇 moe key lab for ...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 college of compu...

作者

  • 11 篇 kai ye
  • 10 篇 hu yupu
  • 9 篇 hui li
  • 8 篇 xiaofei yang
  • 8 篇 wei chen
  • 6 篇 chao wang
  • 6 篇 jianfeng ma
  • 6 篇 yin qinye
  • 6 篇 peng jia
  • 6 篇 hu yu-pu
  • 6 篇 wang ruchuan
  • 6 篇 kim-kwang raymon...
  • 6 篇 walid el-shafai
  • 5 篇 wei li
  • 5 篇 xiaohong guan
  • 5 篇 huifang ma
  • 5 篇 jie wu
  • 5 篇 zhixin li
  • 5 篇 胡予濮
  • 5 篇 xiao ma

语言

  • 655 篇 英文
  • 46 篇 中文
检索条件"机构=The Key Lab. of Computer Networks and Information Security"
701 条 记 录,以下是1-10 订阅
排序:
key Management Using Certificate-Based Cryptosystem in Ad Hoc networks
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2006年 第2期11卷 152-157页
作者: 李发根 高军涛 刘双根 胡予濮 key lab. of computer networks and information security Xidian Univ. Xi'an 710071 China
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Weak generalized self-shrinking generators
收藏 引用
Journal of Systems Engineering and Electronics 2007年 第2期18卷 407-411页
作者: Dong Lihua Hu Yupu the key lab. of computer networks and information security the Ministry of Education Xidian Univ. Xi'an 710071 P. R. China
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS genera... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of PRIMATEs
收藏 引用
Science China(information Sciences) 2020年 第1期63卷 130-139页
作者: Yanbin LI Meiqin WANG Wenqing LIU Wei WANG key lab.ratory of Cryptologic Technology and information security Ministry of EducationShandong University Shandong Provincial key lab.ratory of computer networks
PRIMATEs is a family of authenticated encryption design submitted to competition for authenticated encryption: security, applicability, and robustness. The three modes of operation in PRIMATEs family are: APE, HANUMAN... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
收藏 引用
Frontiers of computer Science 2011年 第2期5卷 158-162页
作者: Wenfeng YANG Yupu HU key lab.ratory of computer networks and information security Ministry of Education Xidian University Xi'an 710071 China
A resynchronization attack is proposed on stream ciphers filtered by Maiorana-McFarland (M-M) functions and equipped with a linear resynchronization mechanism. The proposed attack utilizes the linear weakness of the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient quantum secret sharing scheme with two-particle entangled states
收藏 引用
Chinese Physics B 2011年 第4期20卷 59-64页
作者: 朱珍超 张玉清 付安民 key lab.of computer networks and information security of Ministry of Education Xidian University National computer Network Intrusion Protection Center Graduate University of the Chinese Academy of Sciences
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Short-ciphertext and BDH-based CCA2 secure certificateless encryption
收藏 引用
Science China(information Sciences) 2010年 第10期53卷 2005-2015页
作者: SUN YinXia & LI Hui 1 key lab.of computer networks and information security, Ministry of Education, Xidian University, Xi’an 710071, China 1. key lab.of computer networks and information security Ministry of Education Xidian University Xi’an 710071 China
Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user’s full private key. Most of t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Simple Method for Realizing Weil Theorem in Secure ECC Generation
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 511-519页
作者: Feng Hu Chao Wang Huanguo Zhang Jie Wu the key lab.ratory of Specialty Fiber Optics and Optical Access networks School of Communication and Information EngineeringShanghai University the Department of computer and information Sciences Temple University the key lab.of Aerospace information security and Trusted Computing Wuhan University
How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 499-510页
作者: Chao Wang Feng Hu Huanguo Zhang Jie Wu the key lab.ratory of Specialty Fiber Optics and Optical Access networks School of Communication and Information EngineeringShanghai University the Department of computer and information Sciences Temple University the key lab.of Aerospace information security and Trusted Computing Wuhan University
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure mediated certificateless signature scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2007年 第2期14卷 75-78页
作者: YANG Chen MA Wen-ping WANG Xin-mei Ministry of Education key lab.ratory of computer networks and information security Xidian University Xi'an 710071 China
Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Two-step transmission with artificial noise for secure wireless SIMO communications
收藏 引用
Science China(information Sciences) 2015年 第4期58卷 115-127页
作者: WANG Bo MU PengCheng YANG PeiZhi YIN QinYe Ministry of Education key lab.for Intelligent networks and Network security School of Electronic and Information Engineering Xi’an Jiaotong University
The issue of physical layer security of the wireless single-input multiple-output(SIMO) system is addressed in this paper. We propose a two-step transmission scheme with artificial noise to improve the security and th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论