期刊文献+
共找到34篇文章
< 1 2 >
每页显示 20 50 100
Eavesdropping Area for Evaluating the Security of Wireless Communications 被引量:3
1
作者 Xiaofeng Zhong Chenchen Fan Shidong Zhou 《China Communications》 SCIE CSCD 2022年第3期145-157,共13页
Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques o... Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques or cryptographic methods are carried out.This paper proposes a new index parameter named as eavesdropping area,to evaluate the anti-eavesdropping performance of wireless system.Given the locations of legitimate transmitter and receiver,eavesdropping area index describes the total area of eavesdropping regions where messages can be wiretapped in the whole evaluating region.This paper gives detailed explanations about its concept and deduces mathematical formulas about performance curves based on region classification.Corresponding key system parameters are analyzed,including the characteristics of eavesdropping region,transmitted beam pattern,beam direction,receiver sensitivity,eavesdropping sensitivity,path loss exponent and so on.The proposed index can give an insight on the confirmation of high-risk eavesdropping region and formulating optimal transmitting scheme for the confidential communications to decrease the eavesdropping probability. 展开更多
关键词 eavesdropping area wireless communication anti-eavesdropping performance transmitting scheme
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
2
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol eavesdropping
下载PDF
Encrypted Finite-Horizon Energy-to-Peak State Estimation for Time-Varying Systems Under Eavesdropping Attacks: Tackling Secrecy Capacity 被引量:4
3
作者 Lei Zou Zidong Wang +2 位作者 Bo Shen Hongli Dong Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期985-996,共12页
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measu... This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential eavesdroppers.To avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption scheme.The purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is achieved.Sufficient conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state estimator.Finally,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme. 展开更多
关键词 Artificial-noise-assisted technique eavesdropping encryption-decryption scheme energy-to-peak state estimation finitehorizon state estimation
下载PDF
Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping 被引量:4
4
作者 Bin Duo Junsong Luo +2 位作者 Yilian Li Hao Hu Zibin Wang 《China Communications》 SCIE CSCD 2021年第1期88-99,共12页
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl... Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks. 展开更多
关键词 UAV communications active eavesdropping physical-layer security secrecy rate maximization power control trajectory design
下载PDF
Eavesdropping on Quantum Secure Direct Communication with W State in Noisy Channel 被引量:3
5
作者 YUAN Hao LIU Yin-Min +1 位作者 ZHANG Wen ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第1期103-106,共4页
Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channe... Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward. 展开更多
关键词 eavesdropping quantum secure direct communication quantum bit error rate noise
下载PDF
Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels 被引量:2
6
作者 黄伟 温巧燕 +1 位作者 刘斌 高飞 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第7期114-124,共11页
A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can acco... A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can accomplish quantum key distribution with the help of a serving center. Due to the utilization of the collective eavesdropping detection strategy, the users of the protocol just need to have the ability of performing certain unitary operations. Furthermore, we present three fault-tolerant versions of the proposed protocol, which can combat with the errors over different collective-noise channels.The security of all the proposed protocols is guaranteed by the theorems on quantum operation discrimination. 展开更多
关键词 quantum cryptography quantum key distribution collective eavesdropping detection collective noise
下载PDF
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI 被引量:1
7
作者 Weijia Lei Yang Zhou Xiuzhen Lin 《Digital Communications and Networks》 SCIE CSCD 2021年第3期352-361,共10页
We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null spa... We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null space Artificial Noise(AN)while receiving information.Because the Channel State Information(CSI)of the eavesdropper is unavailable,we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint.As a result,the power of AN is maximized within the limit of total power,so the interception capability of the eavesdropper is suppressed as much as possible.Since self-interference cannot be completely eliminated,the optimization process of one legitimate node depends on the optimization result of the other.By substituting self-interference power in the secrecy rate formula with its average value,the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes.Then,the Water-Filling Algorithm(WFA)and bisection algorithm are used to get the optimal covariance matrices of the signal.Furthermore,we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme.The simulation results show that the theoretical derivation is correct,and the actual achievable rate is very close to the target rate,which means that the approximation in the optimization is feasible.The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved. 展开更多
关键词 Physical layer security Full-duplex SELF-INTERFERENCE eavesdropping CSI MULTI-ANTENNA
下载PDF
A two-stage amplifier of laser eavesdropping model based on waveguide fiber taper
8
作者 Mei-ting Wang Yan Zhu Yi-ning Mu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2019年第1期95-97,共3页
In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multistage amp... In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multistage amplifier laser eavesdropping model based on waveguide fiber taper. First of all, taking about four-quadrant (4QD) laser eavesdropping model as an example, from the theoretical view, analyses factors that, currently, laser eavesdropping system face many restrictive factors during practical applications. Besides, from the receiving FOV and ability of amplification about arrival angle of incoming optical axis angles, systematically analyses advantages of multi-stage amplifier model. What’s more,through constructing laser eavesdropping test platform, we demonstrate Signal to Noise Ratio(SNR) of two stage amplification model is eventually promoted to 6-10 dB compared with one amplifying model,especially in low and high audio level, the advantages is more obvious. 展开更多
关键词 LASER eavesdropping WAVEGUIDE FIBER TAPER 4QD
下载PDF
A Spectrum Sharing Model that Counters Eavesdropping:An Energy Efficiency View
9
作者 Yee-Loo Foo 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2021年第2期47-54,共8页
Wireless transmission is subject to eavesdropping.When wireless transmission ceases,the assigned frequency channel is unused,wasting the spectral opportunity given.In this study,a spectrum sharing model that reduces s... Wireless transmission is subject to eavesdropping.When wireless transmission ceases,the assigned frequency channel is unused,wasting the spectral opportunity given.In this study,a spectrum sharing model that reduces spectral wastage and protects against eavesdropping is proposed.First,cognitive radio(CR)shares the channel access with primary user(PU).When the CR senses that the channel is idle,CR can seize the unoccupied channel for its own use.If the channel is detected to be occupied by PU,CR transmits artificial noise to jam any potential eavesdropper.To what extent is this operation beneficial to the CR?The main concern of this study is the energy efficiency(μ)of CR,i.e.,the ratio of channel throughput to its energy consumption.The relationship betweenμand the percentage of frame duration allocated for sensing(τ)was investigated.This study contributes a novel theoretical expression that allows us to find the optimalμandτvalues,denoted byμ∗andτ∗.With the availability of this expression,the relationships between(μ∗,τ∗)and other important system parameters can be understood thoroughly.Our investigation reveals that strong CR signal will result in highμ∗without the need of increasingτ∗.On the other hand,a strong primary signal allows a shortτ∗and it improvesμ∗.High sampling rate for sensing may be unnecessary,as it does not improveμ∗significantly.A more demanding target probability of detection requires a higher sensing duration,but it has insignificant impact onμ∗. 展开更多
关键词 spectrum sharing cognitive radio physical layer security eavesdropping jamming THROUGHPUT energy efficiency
下载PDF
An Anti-Eavesdropping Method in Data Collection of Smart Meter
10
作者 Weiwei Dong Yong Wang +2 位作者 Lin Zhou Kanghua Cao Haiming Li 《Journal of Computer and Communications》 2019年第9期38-49,共12页
At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were ta... At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were taken into account. Plaintext is used in the protocol for data transmission, as a result, attackers can easily sniff the information and cause information leakage. In this paper, man-in-the-middle attack was used to verify that the smart meter data acquisition process was vulnerable when facing third-party attacks, and this can result in data eavesdropping. In order to resist such risks and prevent information being eavesdropped, a real ammeter communication experimental environment was built, it realized two-way identity authentication between data acquisition center and ammeter data center. At the same time, RSA (Rivest-Shamir-Adleman) was used to encrypt the meter data, which encrypted the collection, storage process of meter data and ensured the confidentiality and integrity of the meter data transmission. Compared with other methods, this method had obvious advantages. The analysis showed that this method can effectively prevent the data of smart meters from being eavesdropped. 展开更多
关键词 Smart METER Data ACQUISITION Transmission eavesdropping RSA Two-Way AUTHENTICATION
下载PDF
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
11
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol BB
下载PDF
Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system
12
作者 Na LI Yuanyuan GAO +4 位作者 Kui XU Xiaochen XIA Huazhi HU Yang LI Yueyue ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第4期500-512,共13页
We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of li... We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of limited pilot resources,a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation.Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers,based on the local partial zero-forcing precoding scheme,a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency.Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security. 展开更多
关键词 CELL-FREE Colluding eavesdropping Limited pilot resources Access point selection Security rate
原文传递
A survey of acoustic eavesdropping attacks:Principle,methods,and progress
13
作者 Yiwei Chen Wenhao Li +1 位作者 Xiuzhen Cheng Pengfei Hu 《High-Confidence Computing》 2024年第4期116-128,共13页
In today’s information age,eavesdropping has been one of the most serious privacy threats in information security,such as exodus spyware(Rudie et al.,2021)and pegasus spyware(Anatolyevich,2020).And the main one of th... In today’s information age,eavesdropping has been one of the most serious privacy threats in information security,such as exodus spyware(Rudie et al.,2021)and pegasus spyware(Anatolyevich,2020).And the main one of them is acoustic eavesdropping.Acoustic eavesdropping(George and Sagayarajan,2023)is a technology that uses microphones,sensors,or other devices to collect and process sound signals and convert them into readable information.Although much research has been done in this area,there is still a lack of comprehensive investigation into the timeliness of this technology,given the continuous advancement of technology and the rapid development of eavesdropping methods.In this article,we have given a selective overview of acoustic eavesdropping,focusing on the methods of acoustic eavesdropping.More specifically,we divide acoustic eavesdropping into three categories:motion sensor-based acoustic eavesdropping,optical sensor-based acoustic eavesdropping,and RFbased acoustic eavesdropping.Within these three representative frameworks,we review the results of acoustic eavesdropping according to the type of equipment they use and the physical principles of each.Secondly,we also introduce several important but challenging applications of these acoustic eavesdropping methods.In addition,we compared the systems that meet the requirements of acoustic eavesdropping in real-world scenarios from multiple perspectives,including whether they are nonintrusive,whether they can achieve unconstrained word eavesdropping,and whether they use machine learning,etc.The general template of our article is as follows:firstly,we systematically review and classify the existing eavesdropping technologies,elaborate on their working mechanisms,and give corresponding formulas.Then,these eavesdropping methods were compared and analyzed,and each method’s effectiveness and technical difficulty were evaluated from multiple dimensions.In addition to an assessment of the current state of the field,we discuss the current shortcomings and challenges and give a fruitful direction for the future of acoustic eavesdropping research.We hope to continue to inspire researchers in this direction. 展开更多
关键词 Acoustic eavesdropping Attack scenarios and threat models Acoustic side-channel attacks
原文传递
Humans identify negative (but not positive) arousal in silver fox vocalizations: implications for the adaptive value of interspecific eavesdropping 被引量:2
14
作者 Piera FILIPPI Svetlana S. GOGOLEVA +2 位作者 Elena V. VOLODINA Ilya A. VOLODIN Bart de BOER 《Current Zoology》 SCIE CAS CSCD 2017年第4期445-456,共12页
The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, par- ticularly be... The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, par- ticularly between humans and other species. Research shows that humans identify emotional arousal in vocalizations across multiple species, such as cats, dogs, and piglets. However, no previ- ous study has addressed humans" ability to identify emotional arousal in silver foxes. Here, we adopted low- and high-arousal calls emitted by three strains of silver fox--Tame, Aggressive, and Unselected--in response to human approach. Tame and Aggressive foxes are genetically selected for friendly and attacking behaviors toward humans, respectively. Unselected foxes show aggres- sive and fearful behaviors toward humans. These three strains show similar levels of emotional arousal, but different levels of emotional valence in relation to humans. This emotional information is reflected in the acoustic features of the calls. Our data suggest that humans can identify high- arousal calls of Aggressive and Unselected foxes, but not of Tame foxes. Further analyses revealed that, although within each strain different acoustic parameters affect human accuracy in identifying high-arousal calls, spectral center of gravity, harmonic-to-noise ratio, and F0 best predict humans' ability to discriminate high-arousal calls across all strains. Furthermore, we identified in spectral center of gravity and F0 the best predictors for humans' absolute ratings of arousal in each call. Implications for research on the adaptive value of inter-specific eavesdropping are discussed. 展开更多
关键词 eavesdropping emotional arousal emotional valence inter-species communication silver foxes vocal communication.
原文传递
Method for determining the best frequency band for eavesdropping the display image of a PC
15
作者 DU Yu-lei Lü Ying-hua +1 位作者 ZHANG Jin-ling ZHANG Nan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第4期93-98,共6页
The display image of the video display unit (VDU) can be reconstructed by receiving and analyzing the unexpected electromagnetic noise emanated from a personal computer system. This fact is one of the information le... The display image of the video display unit (VDU) can be reconstructed by receiving and analyzing the unexpected electromagnetic noise emanated from a personal computer system. This fact is one of the information leakage threats in information security. Therefore, in order to choose the best frequency range for receiving the electromagnetic compromising emanations form a PC display effectively and quickly, a method based on the correlation power analysis (CPA) and the common equipments is proposed. Firstly, the frequency spectrum of 10 MHz to 1 GHz is measured about 10 times respectively when the PC is displaying the white-black vertical strips image and black image. The frequency range which contains the display information can be obtained through the CPA. And then, the special image signal is searched around the dot frequency and harmonics. If the special signal disappears when displaying the total black image, it can be judged to be the real special signal. Finally, the best receiving frequency range can be chosen by comprehensive considering the results of CPA and the signal to noise ratio (SNR) of the special image signal. In order to check the validity of the chosen frequency range, eavesdropping experiments are carried out. The results demonstrate that the selected frequency range can retrieve the higher quality image than other frequency bands. 展开更多
关键词 electromagnetic secure compromising emanations CPA eavesdropping TEMPEST
原文传递
Eavesdropping the display image from conducted emission on network cable of a PC
16
作者 DU Yu-lei LU Ying-hua ZHANG Jin-ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第3期78-84,共7页
The display image of a PC can be reconstructed by using the conducted emission on the PC's network cable. The relevant signals which be used to reconstruct the original image are coupling from the radiation of the sw... The display image of a PC can be reconstructed by using the conducted emission on the PC's network cable. The relevant signals which be used to reconstruct the original image are coupling from the radiation of the switching of red, green, blue (RGB) signals in PC. These pertinent signals are partly contained in the frequency region higher than 30 MHz in the conducted emission. From these findings, the near-field coupling principle from PC to the network cable is analyzed firstly. And then, a multi-conductor transmission model for the RGB signals which transmit in the network cable is proposed. In addition, the maximum safe distance is estimated by using this model. In order to check the validity of the estimating distance, the eavesdropping experiment is carried out to reconstruct the original display image. The results demonstrate that the blurred display image can be retrieved at the place of 29.5 m. 展开更多
关键词 electromagnetic secure conducted emission unshielded twisted pair cables eavesdropping multi-conductor transmission model
原文传递
Novel virtual user scheme to increase data confidentiality against eavesdropping in OCDMA network
17
作者 Vishav Jyoti R.S.Kaler 《Chinese Optics Letters》 SCIE EI CAS CSCD 2011年第12期46-50,共5页
We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using thi... We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using this technique, an eavesdropper will never find an isolated authorized user's signal. When authorized users and virtual users transmit data synchronously and asynehronously, network security increases by 25% and 37.5%, respectively. 展开更多
关键词 OCDMA code Novel virtual user scheme to increase data confidentiality against eavesdropping in OCDMA network data
原文传递
Eavesdropping with a Mirror
18
作者 JENNIFER LIM 《Women of China》 1994年第10期35-35,共1页
It was a custom in Yidu that on New Year’s Eve, people eavesdropped outside other people’s homes with a bronze mirror hidden in the bosom after reciting a rhyme to it. People believed that what they had heard would ... It was a custom in Yidu that on New Year’s Eve, people eavesdropped outside other people’s homes with a bronze mirror hidden in the bosom after reciting a rhyme to it. People believed that what they had heard would often fortell good or bad luck. A family named Zheng once lived in Yidu. The two sons of this family were both considered intellectuals, But the older son was eager to learn while the younger was lazy and sluggish. Their parents only liked the older son. Because of this, the old couple’s attitudes toward their two daughters-in-law were 展开更多
关键词 eavesdropping with a Mirror
原文传递
Secure Computation Efficiency Resource Allocation for Massive MIMO-Enabled Mobile Edge Computing Networks
19
作者 Sun Gangcan Sun Jiwei +3 位作者 Hao Wanming Zhu Zhengyu Ji Xiang Zhou Yiqing 《China Communications》 SCIE CSCD 2024年第11期150-162,共13页
In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based ... In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes. 展开更多
关键词 eavesdropping massive multiple input multiple output mobile edge computing partial offloading secure computation efficiency
下载PDF
Controlled Bidirectional Quantum Direct Communication by Using a GHZ State 被引量:20
20
作者 满忠晓 夏云杰 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1680-1682,共3页
A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with ... A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed. 展开更多
关键词 SECURE DIRECT COMMUNICATION WOJCIKS eavesdropping ATTACK PING-PONGPROTOCOL ENTANGLEMENT CRYPTOGRAPHY SCHEME
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部