×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [127]
内容类型
其他 [82]
期刊论文 [45]
发表日期
2017 [8]
2016 [14]
2015 [18]
2014 [21]
2013 [12]
2012 [10]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共127条,第1-10条
帮助
限定条件
专题:北京大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
新量子技术时代下的信息安全
期刊论文
计算机科学, 2017
张亮亮
;
张翌维
;
梁洁
;
孙瑞一
;
王新安
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
量子计算
量子通信
密码学
信息安全
Quantum computation
Quantum communication
Cryptography
Information security
Twin Odd-Graceful Trees Towards Information Security
其他
2017-01-01
Wang, Hongyu
;
Xu, Jin
;
Yao, Bing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Graph labelling
odd-graceful labelling
information network
tree
algorithm
security
NETWORKS
GRAPHS
COLORINGS
Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation
期刊论文
JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 2017
Zhang, Yichen
;
Li, Zhengyu
;
Zhao, Yijia
;
Yu, Song
;
Guo, Hong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
quantum cryptography
quantum key distribution
continuous variable
optimal two-mode attack
KEY DISTRIBUTION
STATES
INFORMATION
Correlated channel model-based secure communications in dual-hop wireless communication networks
期刊论文
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017
Yuan, Zhen-hua
;
Chen, Chen
;
Cheng, Xiang
;
Lv, Guo-cheng
;
Yang, Liu-qing
;
Jin, Ye
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2017/12/03
Physical layer security
Relay beamforming
Correlated channels
Ergodic secrecy rate
PHYSICAL LAYER SECURITY
CONFIDENTIAL MESSAGES
BROADCAST CHANNELS
RELAY SELECTION
TAP CHANNEL
CAPACITY
An Absolute Secure Wire-Line Communication Method Against Wiretapper
期刊论文
IEEE COMMUNICATIONS LETTERS, 2017
Liu, Sanjun
;
Ma, Meng
;
Li, Yunzhou
;
Chen, Yingyang
;
Jiao, Bingli
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Physical layer security
artificial noise
full duplex
absolute security
PHYSICAL LAYER SECURITY
ARTIFICIAL NOISE
CHANNEL
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
He, Debiao
;
Wang, Ding
;
Xie, Qi
;
Chen, Kefei
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
PRESERVING AUTHENTICATION
SENSOR NETWORKS
SCHEME
SECURE
User Capacity of Wireless Physical-Layer Identification
期刊论文
IEEE ACCESS, 2017
Wang, Wenhao
;
Sun, Zhi
;
Ren, Kui
;
Zhu, Bocheng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Radio frequency fingerprinting
physical-layer security
mutual information
wireless communication
AUTHENTICATION
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
Science China. Information Science, 2017
He Debiao
;
Wang Ding
;
Xie Qi
;
Chen Kefei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
Separations in circular security for arbitrary length key cycles, revisited
其他
2016-01-01
Chang, Jinyong
;
Dai, Honglong
;
Xu, Maozhi
;
Xue, Rui
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
circular security
CCA security
hybrid encryption
KEM
MAC
indistinguishability obfuscation
ENCRYPTION
Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system
其他
2016-01-01
Chang, Jinyong
;
Dai, Honglong
;
Xu, Maozhi
;
Xue, Rui
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2017/12/03
P2P living streaming
homomorphic MAC
network coding
pollution attack
©版权所有 ©2017 CSpace - Powered by
CSpace