期刊文献+
共找到213篇文章
< 1 2 11 >
每页显示 20 50 100
Controlled Bidirectional Quantum Direct Communication by Using a GHZ State 被引量:20
1
作者 满忠晓 夏云杰 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1680-1682,共3页
A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with ... A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed. 展开更多
关键词 SECURE DIRECT COMMUNICATION WOJCIKS eavesdropping ATTACK PING-PONGPROTOCOL ENTANGLEMENT CRYPTOGRAPHY SCHEME
下载PDF
一种防窃听的随机网络编码 被引量:18
2
作者 周业军 李晖 马建峰 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第4期696-701,共6页
针对应用随机网络编码进行文件传输时的安全问题,提出了一种防窃听的网络编码算法.应用该算法,窃听者得不到关于信源的任何有意义的信息,称之为弱安全.该算法通过舍弃少量带宽使得随机网络编码能以很高的概率达到弱安全性的要求.另外,... 针对应用随机网络编码进行文件传输时的安全问题,提出了一种防窃听的网络编码算法.应用该算法,窃听者得不到关于信源的任何有意义的信息,称之为弱安全.该算法通过舍弃少量带宽使得随机网络编码能以很高的概率达到弱安全性的要求.另外,当信源和信宿共享有秘密信道时,秘密信道编码算法达到弱安全性要求的概率为1,且能达到网络的最大流.该编码算法仅是在原随机编码体制的基础上对信源和信宿进行了改变,中间节点编码保持不变. 展开更多
关键词 网络编码 窃听 网络安全
下载PDF
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation 被引量:13
3
作者 LI Jian JIN HaiFei JING Bo 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第9期1612-1618,共7页
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two. 展开更多
关键词 "Ping-pong" protocol XOR operation GHZ state eavesdropping detection protocol security
原文传递
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
4
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol eavesdropping
下载PDF
TEMPEST ATTACK对信息安全的威胁与对策 被引量:8
5
作者 刘杰 刘济林 《浙江大学学报(理学版)》 CAS CSCD 2004年第5期528-534,547,共8页
针对 TEMPEST ATTACK对计算机信息安全构成的威胁 ,建立了基本的电磁辐射模型 .详细讨论了TEMPEST ATTACK对计算机显示单元、外部设备和主机的信息窃取以及利用 TEMPEST ATTACK计算机病毒窃取信息 .最后介绍了防止 TEMPEST
关键词 电磁辐射 TEMPEST ATTACK 信息窃取
下载PDF
多信道无线网络中窃听与干扰攻击的对抗策略 被引量:9
6
作者 方禾 许力 +1 位作者 苏彬庭 林晖 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2016年第1期1-7,共7页
为了在无线网络中同时对抗智能干扰与窃听攻击,基于斯坦伯格博弈,通过功率控制的方法,设计窃听与干扰攻击对抗策略。在该策略中,干扰者的目标是造成源节点的能量损耗与通信质量的下降,而源节点则通过功率控制来对抗干扰者的干扰。不仅... 为了在无线网络中同时对抗智能干扰与窃听攻击,基于斯坦伯格博弈,通过功率控制的方法,设计窃听与干扰攻击对抗策略。在该策略中,干扰者的目标是造成源节点的能量损耗与通信质量的下降,而源节点则通过功率控制来对抗干扰者的干扰。不仅严格证明了该博弈模型均衡的存在,而且提出一种分布式学习算法,使得博弈过程可以在节点间没有信息交换的情况下高效地收敛于该均衡。在此基础上,通过分析安全容量与窃听概率,证明了提高干扰信道的信道增益可以降低窃听者的窃听概率。在性能分析中,通过与其他博弈模型的分析对比,提出的策略在对抗非合谋的智能干扰与窃听攻击方面可以达到很好的抗攻击效果。 展开更多
关键词 多信道无线网络 智能干扰 窃听攻击 斯坦伯格博弈 分布式算法
下载PDF
Encrypted Finite-Horizon Energy-to-Peak State Estimation for Time-Varying Systems Under Eavesdropping Attacks: Tackling Secrecy Capacity 被引量:4
7
作者 Lei Zou Zidong Wang +2 位作者 Bo Shen Hongli Dong Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期985-996,共12页
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measu... This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential eavesdroppers.To avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption scheme.The purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is achieved.Sufficient conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state estimator.Finally,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme. 展开更多
关键词 Artificial-noise-assisted technique eavesdropping encryption-decryption scheme energy-to-peak state estimation finitehorizon state estimation
下载PDF
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
8
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "Ping-pong " protocol protocol security eavesdropping detection
下载PDF
A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation 被引量:5
9
作者 李剑 宋丹劼 +1 位作者 郭晓静 景博 《Chinese Physics C》 SCIE CAS CSCD 2012年第1期31-36,共6页
In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eav... In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eavesdroppers,and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol.In the security analysis,the entropy theory method is introduced,and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced.If the eavesdroppers intend to obtain all the information,the detection rate of the original ping-pong protocol is 50%;the second protocol,using two particles of the Einstein-Podolsky-Rosen pair as detection particles,is also 50%;while the presented protocol is 89%.Finally,the security of the proposed protocol is discussed,and the analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 QSDC XOR operation five-particle cluster state eavesdropping detection protocol security
原文传递
Revisiting Quantum Secure Direct Communication with W State 被引量:5
10
作者 刘俊 刘益民 +2 位作者 曹海静 史守华 张战军 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第10期2652-2655,共4页
The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of t... The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of this leak, an eavesdropper may adopt the intercept-measure-resend strategy to attack the quantum channel such that in the C-S QSDC protocol the secret message can be completely eavesdropped. To fix the leak, the original version of the C-S QSDC protocol is revised. As a consequence, the security is improved and assured at least in the case of an ideal quantum channel. 展开更多
关键词 WOJCIKS eavesdropping ATTACK PING-PONG PROTOCOL ENTANGLEMENT
下载PDF
试论叙事中的偷听 被引量:7
11
作者 傅修延 易丽君 《江西师范大学学报(哲学社会科学版)》 CSSCI 北大核心 2018年第2期57-62,共6页
从偷听者和偷听对象主观意愿的角度,可以把叙事中的偷听分为四类:一是从"无心"到"有意",二是从一开始就"有意",三是在"无心"与"有意"之间,四是偷听者受到偷听对象的反制。偷听可以... 从偷听者和偷听对象主观意愿的角度,可以把叙事中的偷听分为四类:一是从"无心"到"有意",二是从一开始就"有意",三是在"无心"与"有意"之间,四是偷听者受到偷听对象的反制。偷听可以为故事的发展和转折提供动力,还有凸显人物性格的妙用,因此中外叙事作品中的偷听事件屡见不鲜,但此类描写出现的根本原因,还是因为人类社会的群居模式使得自觉不自觉的偷听成为生活中的常态。对这一行为作细致的观察与分类,能使我们更深刻地认识叙事艺术的丰富与微妙。 展开更多
关键词 偷听 叙事 无心 有意 反制
下载PDF
量子密码协议安全性分析 被引量:7
12
作者 温巧燕 秦素娟 高飞 《密码学报》 2014年第2期200-210,共11页
密码分析和密码设计是密码学的两个分支,它们相辅相成,共同推动密码学的发展.量子密码也是如此.然而与经典密码相比,目前量子密码中的密码分析工作还远远不够.本文介绍了多种常见的量子密码攻击方法的基本原理和过程,包括截获-测量-重... 密码分析和密码设计是密码学的两个分支,它们相辅相成,共同推动密码学的发展.量子密码也是如此.然而与经典密码相比,目前量子密码中的密码分析工作还远远不够.本文介绍了多种常见的量子密码攻击方法的基本原理和过程,包括截获-测量-重发攻击、关联提取攻击、假信号攻击、纠缠附加粒子攻击、被动攻击、拒绝服务攻击等,并对部分攻击方法给出了具体攻击方案.纠缠附加粒子攻击是最具一般性的分析方法,截获-测量-重发攻击、假信号攻击等都可以看作是这种攻击的特例.论文概括了有效的检测窃听策略,如共轭基测量、分步传输-步步检测等,并建议明确各类协议的安全性标准,结合自身特点分析其安全性.如多方量子密码协议中要重点分析参与者攻击,而量子安全直接通信中则要注意蛮力攻击.最后论文指出了量子密码分析未来的发展方向. 展开更多
关键词 量子密码 密码分析 攻击 窃听 安全性
下载PDF
偷听——《红楼梦》中无所不在的“耳朵” 被引量:7
13
作者 冉耀斌 《西北师大学报(社会科学版)》 CSSCI 北大核心 2011年第2期60-67,共8页
从《红楼梦》中的一个特殊现象——偷听入手,展示了书中描写的形形色色的偷听现象,进而运用马斯洛人本主义心理学的需要层次理论,揭示各种各样偷听行为背后的心理动机,剖析人物内在的心理活动,并深入探讨偷听情节描写在塑造人物形象和... 从《红楼梦》中的一个特殊现象——偷听入手,展示了书中描写的形形色色的偷听现象,进而运用马斯洛人本主义心理学的需要层次理论,揭示各种各样偷听行为背后的心理动机,剖析人物内在的心理活动,并深入探讨偷听情节描写在塑造人物形象和推动故事发展中的重要作用。 展开更多
关键词 《红楼梦》 偷听 需要层次理论 艺术魅力
下载PDF
A Privacy-preserving Energy Management System Based on Homomorphic Cryptosystem for IoT-enabled Active Distribution Network
14
作者 Qian Hu Siqi Bu +1 位作者 Wencong Su Vladimir Terzija 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第1期167-178,共12页
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping... Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping attacks that lead to privacy breaches are addressed for the IoT-enabled ADN.A privacy-preserving energy management system(EMS)is proposed and empowered by secure data exchange protocols based on the homomorphic cryptosystem.During the information transmission among distributed generators and load customers in the EMS,private information including power usage and electricity bidding price can be effectively protected against eavesdropping attacks.The correctness of the final solutions,e.g.,optimal market clearing price and unified power utilization ratio,can be deterministically guaranteed.The simulation results demonstrate the effectiveness and the computational efficiency of the proposed homomorphically encrypted EMS. 展开更多
关键词 eavesdropping attack energy management system homomorphic cryptosystem Internet of Things(IOTs) active distribution network(ADN) PRIVACY-PRESERVING
原文传递
全双工窃听下的无人机通信保密性能分析
15
作者 刘硕 《信息与电脑》 2024年第10期222-224,共3页
在全双工通信技术被广泛采用的背景下,无人机通信系统遭遇了前所未有的安全威胁。本研究致力于分析在全双工通信模式下,无人机通信的保密性能,在此基础上,进一步考察窃听者如何对无人机通信实施可能的干扰或窃听,以及目前所采取的保密... 在全双工通信技术被广泛采用的背景下,无人机通信系统遭遇了前所未有的安全威胁。本研究致力于分析在全双工通信模式下,无人机通信的保密性能,在此基础上,进一步考察窃听者如何对无人机通信实施可能的干扰或窃听,以及目前所采取的保密措施之有效性。本项研究首先阐述了全双工通信技术,并探讨了该技术在无人机系统中的应用场景,随后深入分析了全双工窃听技术对通信保密性的潜在威胁,基于此最后提出了一系列改进的保密措施及策略。 展开更多
关键词 无人机 通信保密 窃听 信息安全 保密技术
下载PDF
Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system
16
作者 Na LI Yuanyuan GAO +4 位作者 Kui XU Xiaochen XIA Huazhi HU Yang LI Yueyue ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第4期500-512,共13页
We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of li... We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of limited pilot resources,a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation.Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers,based on the local partial zero-forcing precoding scheme,a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency.Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security. 展开更多
关键词 CELL-FREE Colluding eavesdropping Limited pilot resources Access point selection Security rate
原文传递
沈从文小说中的“窃听”叙事模式
17
作者 张杰 罗义华 《中南民族大学学报(人文社会科学版)》 北大核心 2024年第8期160-168,188,共10页
窃听是一种特殊的听觉行为,在文学作品中往往承担着重要的叙事功能。学界多将沈从文的窃听书写视为对郁达夫自叙传的被动模仿,而忽视了窃听作为结构因子隐伏着沈从文在文体实验上的努力。从初期的自叙传模拟,到有意识的形式跳脱,再到多... 窃听是一种特殊的听觉行为,在文学作品中往往承担着重要的叙事功能。学界多将沈从文的窃听书写视为对郁达夫自叙传的被动模仿,而忽视了窃听作为结构因子隐伏着沈从文在文体实验上的努力。从初期的自叙传模拟,到有意识的形式跳脱,再到多元模式开掘,窃听书写贯穿了沈从文整个创作阶段,并逐渐剥离欲望的纠缠而偷天换日般变频生成牧歌情致。在这一渐进历程中沈从文完成了从一个“窃听的人”向“讲故事的人”的成长。 展开更多
关键词 沈从文 窃听 听觉叙事 噪音 结构模式
下载PDF
EPON安全问题探悉 被引量:4
18
作者 赵丹 朱娜 赵红 《计算机应用研究》 CSCD 北大核心 2009年第2期719-722,725,共5页
以太无源光网络(EPON)的点到多点(P2M)结构使其存在严重的安全隐患。结合具体的EPON结构和原理,全面详细分析了EPON系统中各种安全攻击(从简单的被动监测到拒绝服务(DoS)、再到伪装和窃取服务(ToS))实施的原理、过程及其危害性,并提出... 以太无源光网络(EPON)的点到多点(P2M)结构使其存在严重的安全隐患。结合具体的EPON结构和原理,全面详细分析了EPON系统中各种安全攻击(从简单的被动监测到拒绝服务(DoS)、再到伪装和窃取服务(ToS))实施的原理、过程及其危害性,并提出了相应的对策,包括鉴定、安全封装、加密、入侵检测、利用到期活动等。 展开更多
关键词 以太无源光网络 安全 窃听 拒绝服务 伪装 窃取服务 加密
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
19
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
下载PDF
基于信道CSI的抗窃听信号安全保障方法研究 被引量:1
20
作者 傅洪亮 康超男 韩伟良 《数字通信世界》 2023年第3期30-32,共3页
随着无线通信网络在全球范围内蓬勃发展,无线通信网络中的隐私和安全问题引起了广泛的研究。物理层安全技术方案已被证明是解决未来网络安全性能的重要方案,有望满足日益增长的用户安全通信需求。为了防止窃听者窃取保密信息,在合法信... 随着无线通信网络在全球范围内蓬勃发展,无线通信网络中的隐私和安全问题引起了广泛的研究。物理层安全技术方案已被证明是解决未来网络安全性能的重要方案,有望满足日益增长的用户安全通信需求。为了防止窃听者窃取保密信息,在合法信道和窃听信道的信道状态信息(Channel State Information,CSI)已知的情况下,文章提出一种抗窃听物理层安全预编码方案。该方案能够有效提升合法信道的信道容量,在合法用户(Bob)和窃听用户(Eve)之间产生容量差以保证信息的安全传输,同时使得合法用户的中断概率远低于窃听用户,从而保证信息传输的可靠性。仿真结果证明了所提方案的有效性。 展开更多
关键词 物理层安全 预编码 窃听 广义瑞利商
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部