设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
SpringerLink电子期刊(31)
在“
SpringerLink电子期刊
”中,
命中:
31
条,耗时:0.0229848 秒
在所有数据库中总计命中:
31
条
1.
Regional Frequency Analysis of Droughts in
China
: A Multivariate Perspective
作者:
Qiang Zhang (1) (2) (3)
Tianyao Qi (1) (2)
Vijay P. Singh (4)
Yongqin David Chen (5)
Mingzhong Xiao (1) (2)
1. Department of Water Resources and Environment
;
Sun Yat-sen University
;
Guangzhou
;
510275
;
China
2. Key
Laboratory
of Water Cycle and Water
Security
in South China of Guangdong High Education
Institute
;
Sun Yat-sen University
;
Guangzhou
;
510275
;
China
3. Guangdong Key
Laboratory
for Urbanization and Geo-simulation
;
Sun Yat-sen University
;
Guangzhou
;
China
4. Department of Biological & Agricultural
Engineering
and Zachry Department of Civil Engineering
;
Texas A & M University
;
College Station
;
TX
;
77843-2117
;
USA
5. Department of Geography and Resource Management
;
and
Institute
of Environment
;
Energy and Sustainability
;
The Chinese University of Hong Kong
;
Shatin
;
Hong Kong
关键词:
Meteorological droughts
;
Regional frequency analysis
;
Multivariate L
;
moment
;
Copula functions
;
FCM algorithm
;
China
刊名:Water Resources Management
出版年:2015
2.
Strategies for network
security
作者:
AngSheng Li (1)
XueChen Li (2)
YiCheng Pan (1)
Wei Zhang (1) (3)
1.
State
Key
Laboratory
of Computer Science
Institute
of Software
;
Chinese Academy of Sciences
;
P.O. Box 8718
;
Beijing
;
100190
;
China
2. Beijing No. 4 High School
;
Beijing
;
100034
;
China
3. University of Chinese Academy of Sciences
;
Beijing
;
100190
;
China
关键词:
complex networks
;
security
of networks
;
strategy for network
security
;
cascading failure
;
model of networks
;
012107
刊名:SCIENCE
CHINA
Information
Sciences
出版年:2015
3.
Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records
作者:
Yunya Zhou (15) (16) (17)
Jianwei Liu (15) (18)
Hua Deng (19)
Bo Qin (16) (20)
Lei Zhang (21)
15. School of Electronic and
Information
Engineering
;
Beihang University
;
Beijing
;
China
16.
State
Key
Laboratory
of Integrated Services Networks
;
Xidian University
;
Xi鈥檃n
;
China
17.
State
Key
Laboratory
of
Information
Security
;
Institute
of
Information
Engineering
;
Chinese Academy of Sciences
;
Beijing
;
China
18. The Academy of Satellite Application
;
Beijing
;
China
19. School of Computer
;
Wuhan University
;
Wuhan
;
China
20. Knowledge
Engineering
(Renmin University of China) Ministry of Education
;
School of
Information
;
Renmin University of
China
;
Beijing
;
China
21. Software
Engineering
Institute
;
East
China
Normal University
;
Shanghai
;
China
关键词:E ;
healthcare records
;
Identity
;
based access control
;
Revocation
;
Non
;
interaction
刊名:Lecture Notes in Computer Science
出版年:2015
4.
The DBlock family of block ciphers
作者:
WenLing Wu (1) (2)
Lei Zhang (1)
XiaoLi Yu (1)
1. Trusted Computing and
Information
Assurance
Laboratory
;
Institute
of Software
;
Chinese Academy of Sciences
;
Beijing
;
100190
;
China
2.
State
Key
Laboratory
of Computer Science
;
Institute
of Software
;
Chinese Academy of Sciences
;
Beijing
;
100190
;
China
关键词:
block cipher
;
structure
;
round function
;
key scheduling
;
security
;
performance
;
鍒嗙粍瀵嗙爜
;
鏁翠綋缁撴瀯
;
杞嚱鏁?/li> 瀵嗛挜鎵╁睍绠楁硶
;
瀹夊叏鎬?/li> 鎬ц兘
;
032105
刊名:SCIENCE
CHINA
Information
Sciences
出版年:2015
5.
On the Impacts of Mathematical Realization over Practical
Security
of Leakage Resilient Cryptographic Schemes
作者:
Guangjun Fan (15)
Yongbin Zhou (16)
Fran莽ois-Xavier Standaert (17)
Dengguo Feng (15)
15.
State
Key
Laboratory
of Computer Science
;
Institute
of Software
;
Chinese Academy of Sciences
;
Beijing
;
China
16.
State
Key
Laboratory
of
Information
Security
;
Institute
of
Information
Engineering
;
Chinese Academy of Sciences
;
Beijing
;
China
17. ICTEAM/ELEN/Crypto Group
;
Universit茅 catholique de Louvain
;
Louvain-la-Neuve
;
Belgium
关键词:
Physical Attacks
;
Leakage Resilient Cryptography
;
Mathematical Realization
;
Physical Realization
刊名:Lecture Notes in Computer Science
出版年:2015
6.
KDM-CCA
Security
from RKA Secure Authenticated Encryption
作者:
Xianhui Lu (15) (16)
Bao Li (15) (16)
Dingding Jia (15) (16)
15. Data Assurance and Communication
Security
Research Center
;
Chinese Academy of Sciences
;
Beijing
;
10093
;
China
16.
State
Key
Laboratory
of
Information
Security
;
Institute
of
Information
Engineering
;
Chinese Academy of Sciences
;
Beijing
;
100093
;
China
关键词:
Public key encryption
;
Key
;
dependent message
security
;
Related key attack
;
Authenticated encryption
刊名:Lecture Notes in Computer Science
出版年:2015
7.
Cramer-Shoup Like Chosen Ciphertext
Security
from LPN
作者:
Xiaochao Sun (15) (16) (17)
Bao Li (15) (16)
Xianhui Lu (15) (16)
15. Data Assurance and Communication
Security
Research Center
;
Chinese Academy of Sciences
;
Beijing
;
100093
;
China
16.
State
Key
Laboratory
of
Information
Security
;
Institute
of
Information
Engineering
;
Chinese Academy of Sciences
;
Beijing
;
100093
;
China
17. University of Chinese Academy of Sciences
;
Beijing
;
China
关键词:
Public key encryption
;
chosen
;
ciphertext
security
;
LPN
刊名:Lecture Notes in Computer Science
出版年:2015
8.
Batch Blind Signatures on Elliptic Curves
作者:
Yang Sun (15) (16) (17)
Qianhong Wu (15) (17)
Bo Qin (16) (18)
Yujue Wang (19)
Jianwei Liu (15) (20)
15. School of Electronics and
Information
Engineering
;
Beihang University
;
Beihang
;
China
16.
State
Key
Laboratory
of Integrated Services Networks
;
Xidian University
;
Xidian
;
China
17.
State
Key
Laboratory
of
Information
Security
;
Institute
of
Information
Engineering
;
Chinese Academy of Sciences
;
Beijing
;
100093
;
China
18. Key
Laboratory
of Data
Engineering
and Knowledge Engineering (Renmin University of China) Ministry of Education
;
School of
Information
;
Renmin University of
China
;
Renmin
;
China
19. School of Computer
;
Wuhan University
;
Wuhan
;
China
20. The Academy of Satellite Application
;
Beijing
;
100086
;
China
关键词:
Modular exponentiation
;
Batch exponentiation
;
Batch signature
;
Blind signature
刊名:Lecture Notes in Computer Science
出版年:2015
9.
Fault Attacks on Stream Cipher Scream
作者:
Shaoyu Du (15) (18)
Bin Zhang (15) (16)
Zhenqi Li (15)
Dongdai Lin (17)
15. Trusted Computing and
Information
Assurance
Laboratory
;
Institute
of Software
;
Chinese Academy of Sciences
;
Beijing
;
China
18. University of Chinese Academy of Sciences
;
Beijing
;
China
16.
State
Key
Laboratory
of Computer Science
;
Institute
of Software
;
Chinese Academy of Sciences
;
Beijing
;
China
17.
State
Key
Laboratory
of
Information
Security
;
Institute
of
Information
Engineering
;
Chinese Academy of Sciences
;
Beijing
;
China
关键词:
Fault Attacks
;
Scream
;
Key
;
dependent S
;
box
;
Stream Cipher
刊名:Lecture Notes in Computer Science
出版年:2015
10.
Deterministic generations of quantum
state
with no more than six qubits
作者:
Ming-Xing Luo (1) (2) (3)
Song-Ya Ma (4)
Yun Deng (5)
Xiaojun Wang (6)
1.
Information
Security
and National Computing Grid
Laboratory
;
Southwest Jiaotong University
;
Chengdu
;
610031
;
China
2.
State
key
Laboratory
of Networking and Switching Technology (Beijing University of Posts and Telecommunications)
;
Beijing
;
100876
;
China
3.
State
Key
Laboratory
of
Information
Security
;
Institute
of
Information
Engineering
;
Chinese Academy of Sciences
;
Beijing
;
100093
;
China
4. School of Mathematics and Statistics
;
Henan University
;
Kaifeng
;
475004
;
China
5.
Institute
of Computer Science
;
Sichuan University of Science
Engineering
;
Zigong
;
64300
;
China
6. School of Electronic
Engineering
;
Dublin City University
;
Dublin 9
;
Ireland
关键词:
Quantum
state
;
Quantum generation circuit
;
Cartan KAK decomposition
刊名:Quantum
Information
Processing
出版年:2015
1
2
3
4
按检索点细分(31)
作者(28)
按出版年细分(31)
2015年(31)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.