期刊文献+
共找到216篇文章
< 1 2 11 >
每页显示 20 50 100
Eavesdropping Area for Evaluating the Security of Wireless Communications 被引量:2
1
作者 Xiaofeng Zhong Chenchen Fan Shidong Zhou 《China Communications》 SCIE CSCD 2022年第3期145-157,共13页
Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques o... Compared with wired communication,the wireless communication link is more vulnerable to be attacked or eavesdropped because of its broadcast nature.To prevent eavesdropping,many researches on transmission techniques or cryptographic methods are carried out.This paper proposes a new index parameter named as eavesdropping area,to evaluate the anti-eavesdropping performance of wireless system.Given the locations of legitimate transmitter and receiver,eavesdropping area index describes the total area of eavesdropping regions where messages can be wiretapped in the whole evaluating region.This paper gives detailed explanations about its concept and deduces mathematical formulas about performance curves based on region classification.Corresponding key system parameters are analyzed,including the characteristics of eavesdropping region,transmitted beam pattern,beam direction,receiver sensitivity,eavesdropping sensitivity,path loss exponent and so on.The proposed index can give an insight on the confirmation of high-risk eavesdropping region and formulating optimal transmitting scheme for the confidential communications to decrease the eavesdropping probability. 展开更多
关键词 eavesdropping area wireless communication anti-eavesdropping performance transmitting scheme
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
2
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol eavesdropPING
下载PDF
Encrypted Finite-Horizon Energy-to-Peak State Estimation for Time-Varying Systems Under Eavesdropping Attacks: Tackling Secrecy Capacity 被引量:4
3
作者 Lei Zou Zidong Wang +2 位作者 Bo Shen Hongli Dong Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期985-996,共12页
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measu... This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential eavesdroppers.To avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption scheme.The purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is achieved.Sufficient conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state estimator.Finally,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme. 展开更多
关键词 Artificial-noise-assisted technique eavesdropPING encryption-decryption scheme energy-to-peak state estimation finitehorizon state estimation
下载PDF
Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping 被引量:4
4
作者 Bin Duo Junsong Luo +2 位作者 Yilian Li Hao Hu Zibin Wang 《China Communications》 SCIE CSCD 2021年第1期88-99,共12页
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl... Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks. 展开更多
关键词 UAV communications active eavesdropping physical-layer security secrecy rate maximization power control trajectory design
下载PDF
Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels 被引量:2
5
作者 黄伟 温巧燕 +1 位作者 刘斌 高飞 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第7期114-124,共11页
A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can acco... A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can accomplish quantum key distribution with the help of a serving center. Due to the utilization of the collective eavesdropping detection strategy, the users of the protocol just need to have the ability of performing certain unitary operations. Furthermore, we present three fault-tolerant versions of the proposed protocol, which can combat with the errors over different collective-noise channels.The security of all the proposed protocols is guaranteed by the theorems on quantum operation discrimination. 展开更多
关键词 quantum cryptography quantum key distribution collective eavesdropping detection collective noise
下载PDF
Eavesdropping on Quantum Secure Direct Communication with W State in Noisy Channel 被引量:3
6
作者 YUAN Hao LIU Yin-Min +1 位作者 ZHANG Wen ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第1期103-106,共4页
Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channe... Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward. 展开更多
关键词 eavesdropPING quantum secure direct communication quantum bit error rate noise
下载PDF
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers 被引量:3
7
作者 Bassma S.Alsulami Chandra Bajracharya Danda B.Rawat 《Digital Communications and Networks》 SCIE CSCD 2021年第3期327-334,共8页
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertain... Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches. 展开更多
关键词 Game theory based security Virtual wireless networks Jamming and eavesdropping
下载PDF
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI 被引量:1
8
作者 Weijia Lei Yang Zhou Xiuzhen Lin 《Digital Communications and Networks》 SCIE CSCD 2021年第3期352-361,共10页
We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null spa... We discuss the physical layer security scheme in the Full-Duplex(FD)MIMO point-to-point two-way communication system with residual self-interference,in which legitimate nodes send confidential information and null space Artificial Noise(AN)while receiving information.Because the Channel State Information(CSI)of the eavesdropper is unavailable,we optimize the covariance matrices of the information signal as well as the allocation of the antenna for transmitting and receiving to minimize the signal power consumption under the target rate constraint.As a result,the power of AN is maximized within the limit of total power,so the interception capability of the eavesdropper is suppressed as much as possible.Since self-interference cannot be completely eliminated,the optimization process of one legitimate node depends on the optimization result of the other.By substituting self-interference power in the secrecy rate formula with its average value,the joint optimization process at the two nodes is transformed into two separate and solvable optimization processes.Then,the Water-Filling Algorithm(WFA)and bisection algorithm are used to get the optimal covariance matrices of the signal.Furthermore,we derive the theoretical lower bound of ergodic achievable secrecy rate under rayleigh channels to evaluate the performance of the scheme.The simulation results show that the theoretical derivation is correct,and the actual achievable rate is very close to the target rate,which means that the approximation in the optimization is feasible.The results also show that secrecy transmission can be realized because a considerable secrecy rate can be achieved. 展开更多
关键词 Physical layer security Full-duplex SELF-INTERFERENCE eavesdropping CSI MULTI-ANTENNA
下载PDF
An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks 被引量:1
9
作者 WANG Yajun LIAO Tongqing WANG Chuanan 《China Communications》 SCIE CSCD 2016年第1期176-184,共9页
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim... In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping. 展开更多
关键词 transmission scheduling eavesdropping secrecy outage probability secrecy rate rayleigh fading
下载PDF
A two-stage amplifier of laser eavesdropping model based on waveguide fiber taper
10
作者 Mei-ting Wang Yan Zhu Yi-ning Mu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2019年第1期95-97,共3页
In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multistage amp... In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multistage amplifier laser eavesdropping model based on waveguide fiber taper. First of all, taking about four-quadrant (4QD) laser eavesdropping model as an example, from the theoretical view, analyses factors that, currently, laser eavesdropping system face many restrictive factors during practical applications. Besides, from the receiving FOV and ability of amplification about arrival angle of incoming optical axis angles, systematically analyses advantages of multi-stage amplifier model. What’s more,through constructing laser eavesdropping test platform, we demonstrate Signal to Noise Ratio(SNR) of two stage amplification model is eventually promoted to 6-10 dB compared with one amplifying model,especially in low and high audio level, the advantages is more obvious. 展开更多
关键词 LASER eavesdropPING WAVEGUIDE FIBER TAPER 4QD
下载PDF
An Anti-Eavesdropping Method in Data Collection of Smart Meter
11
作者 Weiwei Dong Yong Wang +2 位作者 Lin Zhou Kanghua Cao Haiming Li 《Journal of Computer and Communications》 2019年第9期38-49,共12页
At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were ta... At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were taken into account. Plaintext is used in the protocol for data transmission, as a result, attackers can easily sniff the information and cause information leakage. In this paper, man-in-the-middle attack was used to verify that the smart meter data acquisition process was vulnerable when facing third-party attacks, and this can result in data eavesdropping. In order to resist such risks and prevent information being eavesdropped, a real ammeter communication experimental environment was built, it realized two-way identity authentication between data acquisition center and ammeter data center. At the same time, RSA (Rivest-Shamir-Adleman) was used to encrypt the meter data, which encrypted the collection, storage process of meter data and ensured the confidentiality and integrity of the meter data transmission. Compared with other methods, this method had obvious advantages. The analysis showed that this method can effectively prevent the data of smart meters from being eavesdropped. 展开更多
关键词 Smart METER Data ACQUISITION Transmission eavesdropPING RSA Two-Way AUTHENTICATION
下载PDF
A Spectrum Sharing Model that Counters Eavesdropping:An Energy Efficiency View
12
作者 Yee-Loo Foo 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2021年第2期47-54,共8页
Wireless transmission is subject to eavesdropping.When wireless transmission ceases,the assigned frequency channel is unused,wasting the spectral opportunity given.In this study,a spectrum sharing model that reduces s... Wireless transmission is subject to eavesdropping.When wireless transmission ceases,the assigned frequency channel is unused,wasting the spectral opportunity given.In this study,a spectrum sharing model that reduces spectral wastage and protects against eavesdropping is proposed.First,cognitive radio(CR)shares the channel access with primary user(PU).When the CR senses that the channel is idle,CR can seize the unoccupied channel for its own use.If the channel is detected to be occupied by PU,CR transmits artificial noise to jam any potential eavesdropper.To what extent is this operation beneficial to the CR?The main concern of this study is the energy efficiency(μ)of CR,i.e.,the ratio of channel throughput to its energy consumption.The relationship betweenμand the percentage of frame duration allocated for sensing(τ)was investigated.This study contributes a novel theoretical expression that allows us to find the optimalμandτvalues,denoted byμ∗andτ∗.With the availability of this expression,the relationships between(μ∗,τ∗)and other important system parameters can be understood thoroughly.Our investigation reveals that strong CR signal will result in highμ∗without the need of increasingτ∗.On the other hand,a strong primary signal allows a shortτ∗and it improvesμ∗.High sampling rate for sensing may be unnecessary,as it does not improveμ∗significantly.A more demanding target probability of detection requires a higher sensing duration,but it has insignificant impact onμ∗. 展开更多
关键词 spectrum sharing cognitive radio physical layer security eavesdropPING jamming THROUGHPUT energy efficiency
下载PDF
A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
13
作者 赵楠 朱畅华 权东晓 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期22-26,共5页
We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercep... We propose a novel strategy numed basis-splitting scheme to split the intercepted quanta into several portions based on different bases, for eavesdropping in the process of quantum cryptography. Compared with intercept- resend strategy, our simulation results of the basis-splitting scheme under the non-ideal condition show a greater performance, especially with the increase of the length of shifted bits. Consequently our scheme can aid eaves- dropper to gather much more useful information. 展开更多
关键词 A Novel Basis Splitting eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol BB
下载PDF
Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system
14
作者 Na LI Yuanyuan GAO +4 位作者 Kui XU Xiaochen XIA Huazhi HU Yang LI Yueyue ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第4期500-512,共13页
We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of li... We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of limited pilot resources,a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation.Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers,based on the local partial zero-forcing precoding scheme,a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency.Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security. 展开更多
关键词 CELL-FREE Colluding eavesdropping Limited pilot resources Access point selection Security rate
原文传递
Humans identify negative (but not positive) arousal in silver fox vocalizations: implications for the adaptive value of interspecific eavesdropping 被引量:2
15
作者 Piera FILIPPI Svetlana S. GOGOLEVA +2 位作者 Elena V. VOLODINA Ilya A. VOLODIN Bart de BOER 《Current Zoology》 SCIE CAS CSCD 2017年第4期445-456,共12页
The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, par- ticularly be... The ability to identify emotional arousal in heterospecific vocalizations may facilitate behaviors that increase survival opportunities. Crucially, this ability may orient inter-species interactions, par- ticularly between humans and other species. Research shows that humans identify emotional arousal in vocalizations across multiple species, such as cats, dogs, and piglets. However, no previ- ous study has addressed humans" ability to identify emotional arousal in silver foxes. Here, we adopted low- and high-arousal calls emitted by three strains of silver fox--Tame, Aggressive, and Unselected--in response to human approach. Tame and Aggressive foxes are genetically selected for friendly and attacking behaviors toward humans, respectively. Unselected foxes show aggres- sive and fearful behaviors toward humans. These three strains show similar levels of emotional arousal, but different levels of emotional valence in relation to humans. This emotional information is reflected in the acoustic features of the calls. Our data suggest that humans can identify high- arousal calls of Aggressive and Unselected foxes, but not of Tame foxes. Further analyses revealed that, although within each strain different acoustic parameters affect human accuracy in identifying high-arousal calls, spectral center of gravity, harmonic-to-noise ratio, and F0 best predict humans' ability to discriminate high-arousal calls across all strains. Furthermore, we identified in spectral center of gravity and F0 the best predictors for humans' absolute ratings of arousal in each call. Implications for research on the adaptive value of inter-specific eavesdropping are discussed. 展开更多
关键词 eavesdropPING emotional arousal emotional valence inter-species communication silver foxes vocal communication.
原文传递
Method for determining the best frequency band for eavesdropping the display image of a PC
16
作者 DU Yu-lei Lü Ying-hua +1 位作者 ZHANG Jin-ling ZHANG Nan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第4期93-98,共6页
The display image of the video display unit (VDU) can be reconstructed by receiving and analyzing the unexpected electromagnetic noise emanated from a personal computer system. This fact is one of the information le... The display image of the video display unit (VDU) can be reconstructed by receiving and analyzing the unexpected electromagnetic noise emanated from a personal computer system. This fact is one of the information leakage threats in information security. Therefore, in order to choose the best frequency range for receiving the electromagnetic compromising emanations form a PC display effectively and quickly, a method based on the correlation power analysis (CPA) and the common equipments is proposed. Firstly, the frequency spectrum of 10 MHz to 1 GHz is measured about 10 times respectively when the PC is displaying the white-black vertical strips image and black image. The frequency range which contains the display information can be obtained through the CPA. And then, the special image signal is searched around the dot frequency and harmonics. If the special signal disappears when displaying the total black image, it can be judged to be the real special signal. Finally, the best receiving frequency range can be chosen by comprehensive considering the results of CPA and the signal to noise ratio (SNR) of the special image signal. In order to check the validity of the chosen frequency range, eavesdropping experiments are carried out. The results demonstrate that the selected frequency range can retrieve the higher quality image than other frequency bands. 展开更多
关键词 electromagnetic secure compromising emanations CPA eavesdropPING TEMPEST
原文传递
Eavesdropping the display image from conducted emission on network cable of a PC
17
作者 DU Yu-lei LU Ying-hua ZHANG Jin-ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2013年第3期78-84,共7页
The display image of a PC can be reconstructed by using the conducted emission on the PC's network cable. The relevant signals which be used to reconstruct the original image are coupling from the radiation of the sw... The display image of a PC can be reconstructed by using the conducted emission on the PC's network cable. The relevant signals which be used to reconstruct the original image are coupling from the radiation of the switching of red, green, blue (RGB) signals in PC. These pertinent signals are partly contained in the frequency region higher than 30 MHz in the conducted emission. From these findings, the near-field coupling principle from PC to the network cable is analyzed firstly. And then, a multi-conductor transmission model for the RGB signals which transmit in the network cable is proposed. In addition, the maximum safe distance is estimated by using this model. In order to check the validity of the estimating distance, the eavesdropping experiment is carried out to reconstruct the original display image. The results demonstrate that the blurred display image can be retrieved at the place of 29.5 m. 展开更多
关键词 electromagnetic secure conducted emission unshielded twisted pair cables eavesdropPING multi-conductor transmission model
原文传递
Novel virtual user scheme to increase data confidentiality against eavesdropping in OCDMA network
18
作者 Vishav Jyoti R.S.Kaler 《Chinese Optics Letters》 SCIE EI CAS CSCD 2011年第12期46-50,共5页
We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using thi... We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using this technique, an eavesdropper will never find an isolated authorized user's signal. When authorized users and virtual users transmit data synchronously and asynehronously, network security increases by 25% and 37.5%, respectively. 展开更多
关键词 OCDMA code Novel virtual user scheme to increase data confidentiality against eavesdropping in OCDMA network data
原文传递
Eavesdropping with a Mirror
19
作者 JENNIFER LIM 《Women of China》 1994年第10期35-35,共1页
It was a custom in Yidu that on New Year’s Eve, people eavesdropped outside other people’s homes with a bronze mirror hidden in the bosom after reciting a rhyme to it. People believed that what they had heard would ... It was a custom in Yidu that on New Year’s Eve, people eavesdropped outside other people’s homes with a bronze mirror hidden in the bosom after reciting a rhyme to it. People believed that what they had heard would often fortell good or bad luck. A family named Zheng once lived in Yidu. The two sons of this family were both considered intellectuals, But the older son was eager to learn while the younger was lazy and sluggish. Their parents only liked the older son. Because of this, the old couple’s attitudes toward their two daughters-in-law were 展开更多
关键词 eavesdropping with a Mirror
原文传递
Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol 被引量:5
20
作者 LI Jian JIN HaiFei JING Bo 《Chinese Science Bulletin》 SCIE CAS 2012年第34期4434-4441,共8页
In order to improve the eavesdropping detection efficiency in a two-step quantum direct communication protocol, an improved eavesdropping detection strategy using the four-particle cluster state is proposed, in which ... In order to improve the eavesdropping detection efficiency in a two-step quantum direct communication protocol, an improved eavesdropping detection strategy using the four-particle cluster state is proposed, in which the four-particle cluster state is used to detect eavesdroppers. During the security analysis, the method of the entropy theory is introduced, and two detection strategies are compared quantitatively using the constraint between the information that the eavesdropper can obtain and the interference that has been introduced. If the eavesdroppers intend to obtain all information, the eavesdropping detection rate of the original two-step quantum direct communication protocol using EPR pair block as detection particles will be 50%; while the proposed strategy's detection rate will be 75%. In the end, the security of the proposed protocol is discussed. The analysis results show that the eavesdropping detection strategy presented is more secure. 展开更多
关键词 检测策略 通信协议 窃听 量子 团簇 粒子 安全性分析 基础
原文传递
上一页 1 2 11 下一页 到第
使用帮助 返回顶部