We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The...We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The Doppler broad- ening effect is also noted on the propagation of the birefringent pulses. The dispersions of the birefringence beams are oppositely manipulated for delay and advancement of time at a Doppler width of 10Y. A time gap is created between the birefringence beams, which protects from hacking of information. The time gap is then closed to restore the pulse into the original form by a reverse manipulation of the dispersion of the birefringence beams, i.e., introducing another medium whose transfer function is the complex conjugate of that of the original medium. The results are useful for secure communication technology.展开更多
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ...We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.展开更多
Information security often involves the development and application of so</span><span style="font-family:Verdana;">phisticated software to protect sensitive information stored in corporate</sp...Information security often involves the development and application of so</span><span style="font-family:Verdana;">phisticated software to protect sensitive information stored in corporate</span><span style="font-family:Verdana;"> computers. Yet, in this example of corporate espionage, a clever person, a cellphone and some readily available software were all it took to crack through one company’s advanced security barriers. By reading this article it is hoped that employees at all levels of an organization’s hierarchy will become more aware of—and recognize—how: 1) bits and pieces of seemingly harmless and easy-to-acquire information can be used for sinister purposes;2) building rapport and trust with a person can make them more likely to become unknowing co-conspirators in a devious undertaking;and 3) how one must be constantly alert not to give out information without carefully considering the authenticity and justification of the source requesting it.展开更多
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ...Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.展开更多
文摘We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The Doppler broad- ening effect is also noted on the propagation of the birefringent pulses. The dispersions of the birefringence beams are oppositely manipulated for delay and advancement of time at a Doppler width of 10Y. A time gap is created between the birefringence beams, which protects from hacking of information. The time gap is then closed to restore the pulse into the original form by a reverse manipulation of the dispersion of the birefringence beams, i.e., introducing another medium whose transfer function is the complex conjugate of that of the original medium. The results are useful for secure communication technology.
基金supported by the National Basic Research Program of China(Grant No.2013CB338002)the National Natural Science Foundation of China(Grant Nos.11304397 and 61505261)
文摘We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.
文摘Information security often involves the development and application of so</span><span style="font-family:Verdana;">phisticated software to protect sensitive information stored in corporate</span><span style="font-family:Verdana;"> computers. Yet, in this example of corporate espionage, a clever person, a cellphone and some readily available software were all it took to crack through one company’s advanced security barriers. By reading this article it is hoped that employees at all levels of an organization’s hierarchy will become more aware of—and recognize—how: 1) bits and pieces of seemingly harmless and easy-to-acquire information can be used for sinister purposes;2) building rapport and trust with a person can make them more likely to become unknowing co-conspirators in a devious undertaking;and 3) how one must be constantly alert not to give out information without carefully considering the authenticity and justification of the source requesting it.
文摘Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.