期刊文献+
共找到71篇文章
< 1 2 4 >
每页显示 20 50 100
Guest Editorial Special Issue on Network and Communication Security
1
作者 Chin-Chen Chang Ming-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期193-194,共2页
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ... Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years. 展开更多
关键词 DATA Guest Editorial Special Issue on Network and communication security very CHEN OVER
在线阅读 下载PDF
Announcing a Special Issue on Network and Communication Security
2
《Journal of Electronic Science and Technology》 CAS 2012年第1期93-93,共1页
Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and applicati... Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and application achievements in NCS. It is intended to highlight and summarize the major developments that have occurred over the past few years. Topic scopes to be covered include: 展开更多
关键词 Announcing a Special Issue on Network and communication security WILL NCS
在线阅读 下载PDF
Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppers
3
作者 Huang Hailong Mohsen Eskandari +1 位作者 Andrey V.Savkin Wei Ni 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期537-543,共7页
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco... We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations. 展开更多
关键词 Unmanned aerial systems(UASs) Unmanned aerial vehicle(UAV) communication security Eaves-dropping Reconfigurable intelligent surfaces(RIS) Autonomous navigation and placement Path planning Model predictive control
在线阅读 下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
4
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The security Analysis of Two-Step Quantum Direct communication Protocol in Collective-Rotation Noise Channel EPR
在线阅读 下载PDF
Improving the security of secure deterministic communication scheme based on quantum remote state preparation
5
作者 秦素娟 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第2期73-76,共4页
The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all t... The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all the secret messages without being detected by an intercept-and-resend attack strategy. Furthermore, a possible improvement on this protocol is presented. It makes the modified protocol secure against this kind of attack. 展开更多
关键词 quantum secure direct communication CRYPTANALYSIS quantum cryptography security
在线阅读 下载PDF
ZTE Communications Special Issue on Security and Privacy in Communications
6
《ZTE Communications》 2015年第3期41-41,共1页
Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communica... Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communication also introduces new challenges for the security of systems and processes and the privacy of individuals. There is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integ- rity, and availability of resources in modern communication. 展开更多
关键词 security ZTE communications Special Issue on security and Privacy in communications
在线阅读 下载PDF
Physical Layer Security for Wireless and Quantum Communications
7
作者 Jinhong Yuan Yixian Yang Nanrun Zhou 《ZTE Communications》 2013年第3期1-2,共2页
his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issu... his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications. 展开更多
关键词 security Physical Layer security for Wireless and Quantum communications
在线阅读 下载PDF
A fractional-order chaotic Lorenz-based chemical system:Dynamic investigation,complexity analysis,chaos synchronization,and its application to secure communication
8
作者 Haneche Nabil Hamaizia Tayeb 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第12期223-235,共13页
Synchronization of fractional-order chaotic systems is receiving significant attention in the literature due to its applications in a variety of fields,including cryptography,optics,and secure communications.In this p... Synchronization of fractional-order chaotic systems is receiving significant attention in the literature due to its applications in a variety of fields,including cryptography,optics,and secure communications.In this paper,a three-dimensional fractional-order chaotic Lorenz model of chemical reactions is discussed.Some basic dynamical properties,such as stability of equilibria,Lyapunov exponents,bifurcation diagrams,Poincarémap,and sensitivity to initial conditions,are studied.By adopting the Adomian decomposition algorithm(ADM),the numerical solution of the fractional-order system is obtained.It is found that the lowest derivative order in which the proposed system exhibits chaos is q=0.694 by applying ADM.The result has been validated by the existence of one positive Lyapunov exponent and by employing some phase diagrams.In addition,the richer dynamics of the system are confirmed by using powerful tools in nonlinear dynamic analysis,such as the 0-1 test and C_(0)complexity.Moreover,modified projective synchronization has been implemented based on the stability theory of fractional-order systems.This paper presents the application of the modified projective synchronization in secure communication,where the information signal can be transmitted and recovered successfully through the channel.MATLAB simulations are provided to show the validity of the constructed secure communication scheme. 展开更多
关键词 chaotic system Adomian decomposition method modified projective synchronization secure communication
在线阅读 下载PDF
Quantum secure direct communication with quantum encryption based on pure entangled states 被引量:42
9
作者 李熙涵 李春燕 +3 位作者 邓富国 周萍 梁玉洁 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第8期2149-2153,共5页
This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and de... This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message. 展开更多
关键词 quantum secure direct communication quantum encryption quantum key pure entangled states
在线阅读 下载PDF
Controlled Bidirectional Quantum Direct Communication by Using a GHZ State 被引量:20
10
作者 满忠晓 夏云杰 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1680-1682,共3页
A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with ... A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed. 展开更多
关键词 SECURE DIRECT communication WOJCIKS EAVESDROPPING ATTACK PING-PONGPROTOCOL ENTANGLEMENT CRYPTOGRAPHY SCHEME
在线阅读 下载PDF
A two-step quantum secure direct communication protocol with hyperentanglement 被引量:18
11
作者 顾斌 黄余改 +1 位作者 方夏 张成义 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第10期66-70,共5页
We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced wi... We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol. 展开更多
关键词 quantum secure direct communication TWO-STEP hyperentanglement high capacity
在线阅读 下载PDF
Economical quantum secure direct communication network with single photons 被引量:10
12
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第12期3553-3559,共7页
In this paper a scheme for quantum secure direct communication (QSDC) network is proposed with a sequence of polarized single photons. The single photons are prepared originally in the same state (0) by the server... In this paper a scheme for quantum secure direct communication (QSDC) network is proposed with a sequence of polarized single photons. The single photons are prepared originally in the same state (0) by the servers on the network, which will reduce the difficulty for the legitimate users to check eavesdropping largely. The users code the information on the single photons with two unitary operations which do not change their measuring bases. Some decoy photons, which are produced by operating the sample photons with a Hadamard, are used for preventing a potentially dishonest server from eavesdropping the quantum lines freely. This scheme is an economical one as it is the easiest way for QSDC network communication securely. 展开更多
关键词 quantum secure direct communication NETWORK single photons
在线阅读 下载PDF
Fault tolerant quantum secure direct communication with quantum encryption against collective noise 被引量:9
13
作者 黄伟 温巧燕 +2 位作者 贾恒越 秦素娟 高飞 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第10期101-109,共9页
We present two novel quantum secure direct communication(QSDC) protocols over different collective-noise channels.Different from the previous QSDC schemes over collective-noise channels,which are all source-encrypti... We present two novel quantum secure direct communication(QSDC) protocols over different collective-noise channels.Different from the previous QSDC schemes over collective-noise channels,which are all source-encrypting protocols,our two protocols are based on channel-encryption.In both schemes,two authorized users first share a sequence of EPR pairs as their reusable quantum key.Then they use their quantum key to encrypt and decrypt the secret message carried by the decoherence-free states over the collective-noise channel.In theory,the intrinsic efficiencies of both protocols are high since there is no need to consume any entangled states including both the quantum key and the information carriers except the ones used for eavesdropping checks.For checking eavesdropping,the two parties only need to perform two-particle measurements on the decoy states during each round.Finally,we make a security analysis of our two protocols and demonstrate that they are secure. 展开更多
关键词 quantum cryptography quantum secure direct communication quantum encryption collective noise
在线阅读 下载PDF
An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication 被引量:10
14
作者 刘文杰 陈汉武 +3 位作者 马廷淮 李志强 刘志昊 胡文博 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4105-4109,共5页
A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit tw... A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. 展开更多
关键词 deterministic secure quantum communication cluster state identity authentication
在线阅读 下载PDF
An efficient quantum secure direct communication scheme with authentication 被引量:7
15
作者 杨宇光 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第7期1838-1842,共5页
In this paper an efficient quantum secure direct communication (QSDC) scheme with authentication is presented, which is based on quantum entanglement and polarized single photons. The present protocol uses Einstein-... In this paper an efficient quantum secure direct communication (QSDC) scheme with authentication is presented, which is based on quantum entanglement and polarized single photons. The present protocol uses Einstein-Podolsky-Rosen (EPR) pairs and polarized single photons in batches. A particle of the EPR pairs is retained in the sender's station, and the other is transmitted forth and back between the sender and the receiver, similar to the‘ping-pong' QSDC protocol. According to the shared information beforehand, these two kinds of quantum states are mixed and then transmitted via a quantum channel. The EPR pairs are used to transmit secret messages and the polarized single photons used for authentication and eavesdropping check. Consequently, because of the dual contributions of the polarized single photons, no classical information is needed. The intrinsic efficiency and total efficiency are both 1 in this scheme as almost all of the instances are useful and each EPR pair can be used to carry two bits of information. 展开更多
关键词 quantum key distribution quantum authentication quantum secure direct communication non-orthogonal
在线阅读 下载PDF
Adaptive projective synchronization of unified chaotic systems and its application to secure communication 被引量:4
16
作者 胡满峰 徐振源 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第11期3231-3237,共7页
In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of diffe... In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility. 展开更多
关键词 projective synchronization adaptive control unified chaotic system secure communication
在线阅读 下载PDF
Application of periodic orbit theory in chaos-based security analysis 被引量:3
17
作者 龙敏 丘水生 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第8期2254-2258,共5页
Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security an... Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys. 展开更多
关键词 periodic orbit theory secure communication chaos-based security analysis
在线阅读 下载PDF
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
18
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "Ping-pong " protocol protocol security eavesdropping detection
在线阅读 下载PDF
Extraction of periodic signals in chaotic secure communication using Duffing oscillators 被引量:2
19
作者 王云才 赵清春 王安帮 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第7期2373-2376,共4页
This paper presents a novel approach to extract the periodic signals masked by a chaotic carrier. It verifies that the driven Duffing oscillator is immune to the chaotic carrier and sensitive to certain periodic signa... This paper presents a novel approach to extract the periodic signals masked by a chaotic carrier. It verifies that the driven Duffing oscillator is immune to the chaotic carrier and sensitive to certain periodic signals. A preliminary detection scenario illustrates that the frequency and amplitude of the hidden sine wave signal can be extracted from the chaotic carrier by numerical simulation. The obtained results indicate that the hidden messages in chaotic secure communication can be eavesdropped utilizing Duffing oscillators. 展开更多
关键词 CHAOS signal extraction Duffing oscillator secure communication
在线阅读 下载PDF
Measurement-device-independent one-step quantum secure direct communication 被引量:4
20
作者 Jia-Wei Ying Lan Zhou +1 位作者 Wei Zhong Yu-Bo Sheng 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第12期57-65,共9页
The one-step quantum secure direct communication(QSDC)(Sci.Bull.67,367(2022))can effectively simplify QSDC’s operation and reduce message loss.For enhancing its security under practical experimental condition,we prop... The one-step quantum secure direct communication(QSDC)(Sci.Bull.67,367(2022))can effectively simplify QSDC’s operation and reduce message loss.For enhancing its security under practical experimental condition,we propose two measurement-device-independent(MDI)one-step QSDC protocols,which can resist all possible attacks from imperfect measurement devices.In both protocols,the communication parties prepare identical polarization-spatial-mode two-photon hyperentangled states and construct the hyperentanglement channel by hyperentanglement swapping.The first MDI one-step QSDC protocol adopts the nonlinear-optical complete hyperentanglement Bell state measurement(HBSM)to construct the hyperentanglement channel,while the second protocol adopts the linear-optical partial HBSM.Then,the parties encode the photons in the polarization degree of freedom and send them to the third party for the hyperentanglementassisted complete polarization Bell state measurement.Both protocols are unconditionally secure in theory.The simulation results show the MDI one-step QSDC protocol with complete HBSM attains the maximal communication distance of about354 km.Our MDI one-step QSDC protocols may have potential applications in the future quantum secure communication field. 展开更多
关键词 measurement-device-independent one-step quantum secure direct communication hyperentanglement Bell state measurement hyperentanglement-assisted complete polarization Bell state measurement
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部