期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
附録 蒙古字韻跋
1
作者 羅常培 《中国典籍与文化论丛》 2015年第1期301-305,共5页
蒙古字韻二卷~②,元朱宗文撰,四庫全書所著録者,爲兩淮鹽政採進本~③。提要九~④,經部小學類存目二云:“宗文字彦章,信安人,前有劉更序,又稱爲朱巴顏,蓋宗文嘗充蒙古字學弟子,故别以蒙古語命名也。……宗文以蒙古字韻字與聲合,而諸家漢... 蒙古字韻二卷~②,元朱宗文撰,四庫全書所著録者,爲兩淮鹽政採進本~③。提要九~④,經部小學類存目二云:“宗文字彦章,信安人,前有劉更序,又稱爲朱巴顏,蓋宗文嘗充蒙古字學弟子,故别以蒙古語命名也。……宗文以蒙古字韻字與聲合,而諸家漢韻率多譌誤,莫知取舍,因重爲校正。 展开更多
关键词 信安人 聲合 存目 文字 弟子 蒙古 經部 誤字 諸家
原文传递
Secure connectivity analysis in unmanned aerial vehicle networks 被引量:4
2
作者 Xin YUAN Zhi-yong FENG +2 位作者 Wen-jun XU Zhi-qing WEI Ren-ping LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第3期409-422,共14页
The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and thr... The distinctive characteristics of unmanned aerial vehicle networks (UAVNs), including highly dynamic network topology, high mobility, and open-air wireless environments, may make UAVNs vulnerable to attacks and threats. In this study, we propose a novel trust model for UAVNs that is based on the behavior and mobility pattern of UAV nodes and the characteristics of inter-UAV channels. The proposed trust model consists of four parts: direct trust section, indirect trust section, integrated trust section, and trust update section. Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when there is both a physical link and a trust link between two UAVs. Moreover, the metrics of both the physical connectivity probability and the secure connectivity probability between two UAVs are adopted to analyze the connectivity of UAVNs. We derive accurate and analytical expressions of both the physical connectivity probability and the secure connectivity probability using stochastic geometry with or without Doppler shift. Extensive simulations show that compared with the physical connection probability with or without malicious attacks, the proposed trust model can guarantee secure communication and reliable connectivity between UAVs and enhance network performance when UAVNs face malicious attacks and other security risks. 展开更多
关键词 Unmanned aerial vehicle networks(UAVNs) Trust model Secure connectivity Doppler shift
原文传递
Quantum Private Comparison Protocol Based on Bell Entangled States 被引量:3
3
作者 刘文 王永滨 崔巍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第4期583-588,共6页
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c... In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 展开更多
关键词 quantum private comparison protocol Bell entangled state PRIVATE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部