期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
基于流域经济与环境保护协调发展的路径探讨 被引量:2
1
作者 刘天阳 《环境与发展》 2018年第1期230-231,共2页
本文首先简要分析了流域协调的最终目标,探讨了流域协调的二元特性及制约因素,最后提出了构建流域协调机制的有效途径,望能以此为相关研究提供些许参考。
关键词 流域经济 环境保护 调发展 路径
下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
2
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
下载PDF
Interference Coordination for Secrecy Enhancement in Random Wireless Networks
3
作者 BAI Juan TAO Xiaofeng XU Jin 《China Communications》 SCIE CSCD 2014年第8期28-36,共9页
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m... The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs. 展开更多
关键词 interference coordination poissonpoint process secrecy transmission capacity random wireless networks
下载PDF
Guaranteeing Wireless Communication Secrecy via a WFRFT-Based Cooperative System 被引量:18
4
作者 Fang Xiaojie Sha Xuejun Mei Lin 《China Communications》 SCIE CSCD 2015年第9期76-82,共7页
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti... In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity. 展开更多
关键词 weighted fractional Fourier trans-form(WFRFT) physical layer(PHY) security secrecy capacity
下载PDF
规范行业管理 杜绝企业人才无序流动
5
作者 唐水淼 《工会信息》 2014年第22期20-22,共3页
随着经济的快速发展,技术革新的深入推进,企业间的人才价值越来越得到彰显,人才竞争越来越激烈,出现企业间人才无序流动、反复跳槽或跳槽泄露原用人单位商业秘密等现象屡见不鲜,严重地影响了企业的生产经营,制约了区域经济发展。以柯桥... 随着经济的快速发展,技术革新的深入推进,企业间的人才价值越来越得到彰显,人才竞争越来越激烈,出现企业间人才无序流动、反复跳槽或跳槽泄露原用人单位商业秘密等现象屡见不鲜,严重地影响了企业的生产经营,制约了区域经济发展。以柯桥区为例,如何规范行业管理杜绝企业人才无序流动,已成为促进柯桥区企业转型升级。 展开更多
关键词 无序流动 人才流动 用人单位 区域经济 “跳槽” 桥区 诚信守法 人才评价体系 薪酬激励机制 保密协
原文传递
Three-step semiquantum secure direct communication protocol 被引量:12
6
作者 ZOU XiangFu QIU DaoWen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第9期1696-1702,共7页
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only w... Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only when both parties are quantum.In this paper,we construct a three-step semiquantum secure direct communication(SQSDC)protocol based on single photon sources in which the sender Alice is classical.In a semiquantum protocol,a person is termed classical if he(she)can measure,prepare and send quantum states only with the fixed orthogonal quantum basis{|0,|1}.The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption.Therefore,the proposed SQSDC protocol is also completely robust.Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol.In the proposed protocol,we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed.Moreover,the proposed SQSDC protocol can be implemented with the existing techniques.Compared with many quantum secure direct communication protocols,the proposed SQSDC protocol has two merits:firstly the sender only needs classical capabilities;secondly to check Eves disturbing after the transmission of quantum states,no additional classical information is needed. 展开更多
关键词 quantum secure direct communication semiquantum complete robustness security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部