中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
地理科学与资源研究所 [2]
软件研究所 [2]
长春光学精密机械与物... [1]
采集方式
OAI收割 [5]
内容类型
期刊论文 [4]
会议论文 [1]
发表日期
2024 [1]
2022 [1]
2014 [1]
2008 [1]
2005 [1]
学科主题
Computer S... [1]
筛选
浏览/检索结果:
共5条,第1-5条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Workable solutions for sustainably feeding the Chinese population
期刊论文
OAI收割
RESOURCES CONSERVATION AND RECYCLING, 2024, 卷号: 205, 页码: 8
作者:
Sun, Jing
;
Yang, Lun
;
Wang, Xingao
;
Lun, Fei
;
Lu, Miao
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2024/05/27
Food security
Metacoupling
Sustainable development goals
Carbon footprint
Water footprint
Evaluating the impact of urban expansion on the habitat quality and constructing ecological security patterns: A case study of Jiziwan in the Yellow River Basin, China
期刊论文
OAI收割
ECOLOGICAL INDICATORS, 2022, 卷号: 145, 页码: 13
作者:
Wei, Le
;
Zhou, Liang
;
Sun, Dongqi
;
Yuan, Bo
;
Hu, Fengning
  |  
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2023/10/09
Urban expansion
Habitat quality
Ecological security patterns
Urbanization
InVEST
MCR
Sustainable development goals (SDGs)
Arid region
一种基于UML的网络安全体系建模分析方法
期刊论文
OAI收割
计算机研究与发展, 2014, 卷号: 51, 期号: 7, 页码: 1578-1593
布宁
;
刘玉岭
;
连一峰
;
黄亮
  |  
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2014/12/16
网络安全体系
UML建模
安全目标
安全边界
安全措施
network security infrastructure
UML modeling
security goals
security boundary
security measures
A new authentication protocol for wireless communication network based on IEEE802.16 (EI CONFERENCE)
会议论文
OAI收割
2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, December 10, 2008 - December 12, 2008, Sydney, NSW, Australia
Li R.
;
Fang Z.
;
Cao W.
;
Yin Y.
;
Xu P.
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2013/03/25
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16
a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then
its security was analyzed from the angle of technical realization and formal analysis to verify whether the original safety goals were achieved. Especially
formal analysis was mostly done. Finally
system testing was also carried out and the results were analyzed to verify function and performance of the new protocol. 2008 IEEE.
a formal model of fair exchange protocols
期刊论文
OAI收割
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 卷号: 48, 期号: 4, 页码: 499-512
Qing SH
;
Li GC
  |  
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2011/07/28
events
local causal relation
local temporal relation
global relation
exchanged item
security goals