期刊文献+

量子密钥通信在分布式航天测控网中的应用研究 被引量:3

Quantum key distribution in the distributed TT&C network
下载PDF
导出
摘要 随着分布式航天测控网技术的不断发展,分布式航天测控网面临着信息安全问题。本文通过分析和研究各种信息加密技术,针对经典加密技术不能保证信息绝对保密性的弊端,考虑利用以量子力学为基础的量子密钥分配技术来保证测控信息传输的绝对安全。基于密钥这种"绝对保密"的方法与分布式航天测控网技术结合的思想,本文提出了量子密钥通信与分布式航天测控网相结合的密钥分配模型。 With the development of the technology in the Distributed TY&C ( track, telemetry and control) Network , the Distributed TT&C is faced with the problem of information security. Through analysis and study of all kinds of information encryption, considering of the classic encryption technology that has the deficiency of no guarantee on the absolute security on information, quantum mechanics - based quantum key distribution technology was used to ensure the Tr&c of the transmission of information's absolutely safe. Based on the combination of "absolutely confidential" method and the Distributed TF&C Network technology, this paper put forward a combining model of quantum key communications and the Distributed TT&C Network .
出处 《沈阳航空工业学院学报》 2009年第1期60-63,共4页 Journal of Shenyang Institute of Aeronautical Engineering
基金 中航一集团航空科学基金项目(2007ZC54002)
关键词 航天测控网 量子密钥 分配 TT&C quantum key distribution
  • 相关文献

参考文献4

二级参考文献31

  • 1[4]Ira Richer, Geoffrey Bacher. Gigabit networks. IEEE Communication Magazine, 1992
  • 2[5]Raji R S. Smart networks for control. IEEE Spectrum, 1994
  • 3Zhang C W,Phys Rev A,2000年
  • 4Zhang C W,Phys Rev A,2000年,61卷,062310页
  • 5Leung D,Phys Rev A,1999年,60卷,1924页
  • 6郭光灿,费曼处理器,1999年,49页
  • 7Duan L M,Phys Lett A,1998年,243卷,261页
  • 8Duan L M,Phys Rev A,1998年,57卷,2399页
  • 9Duan L M,Phys Rev A,1998年,57卷,737页
  • 10Chuang I L,Phys Rev Lett,1998年,80卷,3408页

共引文献54

同被引文献13

  • 1刘岩,张凤仙.量子密码通信技术及其应用模式研究[J].飞行器测控学报,2009,28(3):49-52. 被引量:5
  • 2E Lumer, B Faieta. Diversity and adaptation in populations of clustering ants : In Proceedings of the Third Intemational Conference on Simulation of Adaptive Behavior: From Ani - reals to Animats, Cambridge, August, 1994[C], Cambridge, 1994.
  • 3B. Wu, Z. Shi. A Clustering Algorithm Based on Swarm Intelligence: ICII2001 :IEEE International Conferences on Info -tech & Info - net Proceeding,Beijing,29 Oct. - 1 Nov. ,2001 [ C ]. Beijing,2001.
  • 4Tsang W, Kwong S. Unsupervised anomaly intrusion detection using ant colony clustering model: In Fourth IEEE International Workshop on Soft Computing as Transdisciplinary Science and Technology, Muroran, 2005 [ C]. Japan, 2005.
  • 5Yong Feng, Zhongfu Wu. An, Unsupervised anomaly intrusion detection algorithm based on swarm intelligence : Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August 2005[ C]. China,2005.
  • 6KDD cup 1999. KDD 99 cup dataset [ DB/OL ]. http ://kdd. ics. uci. edu/databases/kddcup 99,下载时间:2008-09-05.
  • 7Maheshkumar S, Grusel S. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context [ C ] : In Machine Learning, Models, Technologies and application, Las Vegas, 2003. USA, 209 -215.
  • 8Elkan C. Results of the KDD CUP 99 classifier learning [J]. SIGKDD Exploration, ACM SIGKDD, 2000,1 (2) :63 - 64.
  • 9周晓波,卢汉成,李津生,洪佩琳.AED:一种用于DTN的增强型Earliest-Delivery算法[J].电子与信息学报,2007,29(8):1956-1960. 被引量:14
  • 10刘晓凤,黄刘生,吴俊敏,徐宏力.传感网络定位中基于传染病模型的信息传播研究[J].小型微型计算机系统,2009,30(4):647-651. 被引量:3

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部