Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m...Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.展开更多
The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid imple...The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid implementation of new network protocols.However,in order to improve the scalability of the control plane at present,some control functionalities are added to the data plane,which is probably to impact on the generality of the data plane.The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane.We propose some basic principles that both control and data planes should comply with,based on the evolutionary trend of SDN.Moreover,we take two approaches for reference according to the principles,viewed from the control messages in OpenFlow-based SDN.Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane.展开更多
To overcome the traditional disadvantages, an improved FPGA-core based real-time video image acqui- sition and storage system is designed. The modular designed by Verilog programming is used for video decoding of A/D ...To overcome the traditional disadvantages, an improved FPGA-core based real-time video image acqui- sition and storage system is designed. The modular designed by Verilog programming is used for video decoding of A/D configuration, video image capturing logic control and image storage logic control modules. And IDE in- terface bard disk as storage medium and FAT32 file system as record form are used for real-time image storage. Experimental results show that the system has the advantages of strong real-time capability, high integration, powerful storage, easy expansibility and so on.展开更多
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared....To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized.展开更多
In Wireless Sensor Networks(WSNs),polling can obviously improve the throughput and decrease average access delay by allocating bandwidth efficiently and reasonably.In this paper,a Dynamic Polling Media Access Control ...In Wireless Sensor Networks(WSNs),polling can obviously improve the throughput and decrease average access delay by allocating bandwidth efficiently and reasonably.In this paper,a Dynamic Polling Media Access Control (DPMAC) scheme designed according to WSNs' features is proposed.DPMAC is a priority based access control protocol with the characteristics that its polling table is dynamically refreshed depending on whether the sensor node is active and that the bandwidth is dynamically allocated according to the traffic types.The access priorities are determined by the emergency levels of events and the scheduler proposed in our MAC is preemptive based on the deadline of the events.Simulation results show that DPMAC can efficiently utilize bandwidth and decrease average access delay and response time for emergency events with different access priorities in WSNs.展开更多
OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Trans...OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Transmission Prot ocol) based OAM, i.e., SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its tran sport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experim ental results prove the proposed SOAM system achieves better performance on sign aling transmission compared with conventional TCP based OAM system.展开更多
Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol ...Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.展开更多
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio...With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack.展开更多
As the ability of a single agent is limited while information and resources in multi-agent systems are distributed, cooperation is necessary for agents to accomplish a complex task. In the open and changeable environm...As the ability of a single agent is limited while information and resources in multi-agent systems are distributed, cooperation is necessary for agents to accomplish a complex task. In the open and changeable environment on the Internet, it is of great significance to research a system flexible and capable in dynamic evolution that can find a collaboration method for agents which can be used in dynamic evolution process. With such a method, agents accomplish tasks for an overall target and at the same time, the collaborative relationship of agents can be adjusted with the change of environment. A method of task decomposition and collaboration of agents by improved contract net protocol is introduced. Finally, analysis on the result of the experiments is performed to verify the improved contract net protocol can greatly increase the efficiency of communication and collaboration in multi-agent system.展开更多
Peace is a key concept in the Jewish tradition; it has a long history. It is also an extremely broad concept. The present article takes on the subject of contemporary peace between Israel and her neighbors, addressing...Peace is a key concept in the Jewish tradition; it has a long history. It is also an extremely broad concept. The present article takes on the subject of contemporary peace between Israel and her neighbors, addressing the issue from the vantage point of Judaism. While opinions on many issues are divided in Judaism today, all streams within the Jewish tradition uphold the concept of peace. Even so, each stream supports a somewhat different version of this ideal, subject to different limitations or reservations. One of the most serious challenges which Judaism today faces in connection with the State of Israel is the issue of exchanging territories for peace. The goal of the present paper is to show that while most approaches rooted in traditional Judaism have opposed such an exchange, Israel's religious political parties have endorsed it, advancing different arguments in support of their view. The method followed in the present paper is to study the arguments which have been used in support of peace agreements based on return or exchange of land. In light of the arguments put forth in the paper, to be counted among the accomplishments is a greater degree of openness--even on the part of the religious sector in Israel--toward the effort to achieve peace between Israel and her neighbors.展开更多
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo...Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.展开更多
The macadamia tree (macadamia integrifolia maiden & betche), originally from Australia, has smooth and rounded fruits, this walnut produces richly flavoured nuts, which are used "in natura" accompanying appetizer...The macadamia tree (macadamia integrifolia maiden & betche), originally from Australia, has smooth and rounded fruits, this walnut produces richly flavoured nuts, which are used "in natura" accompanying appetizers, in the manufacture of candies, being well accepted by the population. This paper analysed the production process of the agro industrial cooperative producers of macadamia nut (Coopmac), located in the town of Sao Mateus-ES/Brazil, and responsible for the production and marketing benefits for the states of Espirito Santo and Bahia. This analysis was performed in order to identify new opportunities for developing new products. The following steps were explored: analysis of the current procedure, ideas generation, analysis of potential ideas, development of a product concept and development of a prototype product. In cooperative, macadamia oil was only extracted. It was decided to develop a potential product from this oil. Initially, chemical analyzes were performed with this oil and opted for the production of soaps, liquid and bar. During this step, the methodology of design of experiments was used to develop the prototype. Sensory analysis, based on the LAM type hedonic scale, was used in the tests. The data were analyzed and could be distinguished the best formulation and the main effects for each assessed parameter. In this step, the statistical analysis software was used. From the value of the overall quality of the sample, greater acceptance for liquid soaps was obtained for a formulation with lower oil volume and higher volume of amphoteric. When concerning the sample bar soaps, the best formulation had the lower ratio of oil volume, the higher volume of amphoteric and lower mass of clay. The authors expect to contribute to generation of scientific and technological knowledge in order to effectively meet the practical needs of efforts directed to the production of macadamia nuts in the state of Espirito Santo.展开更多
A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are require...A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are required,which makes the scheme more convenient than others in practical applications.By distributing a random key between both sides of the communication and performing classical XOR operation,we realize a one-time-pad scheme,therefore our protocol achieves unconditional secure.Because only user with legitimate identity string can decrypt the secret,our protocol can resist man-in-the middle attack.The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping.The detection rate reaches 75% per qubit.展开更多
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e...By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail.展开更多
CO_2 incorporation into C-H bonds is an important and interesting topic. Herein a sequential protocol for C(sp)-H carboxylation by employing a metal-free C-H activation/catalytic silylation reaction in conjunction wit...CO_2 incorporation into C-H bonds is an important and interesting topic. Herein a sequential protocol for C(sp)-H carboxylation by employing a metal-free C-H activation/catalytic silylation reaction in conjunction with KO^tBu-mediated carboxylation with CO_2 was established, in which KO^t Bu catalyzes silylation of terminal alkynes to form alkynylsilanes at low temperature, and simultaneously mediates carboxylation of the alkynesilanes with atmospheric CO_2. Importantly, the carboxylation further promotes the silylation, which makes the whole reaction proceed very rapidly. Moreover, this methodology is simple and scalable, which is characterized by short reaction time, wide substrate scope, excellent functional-group tolerance and mild reaction conditions,affording a range of corresponding propiolic acid products in excellent yields in most cases. In addition, it also allows for a convenient ^(13)C-labeling through the use of ^(13)CO_2.展开更多
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.
文摘The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid implementation of new network protocols.However,in order to improve the scalability of the control plane at present,some control functionalities are added to the data plane,which is probably to impact on the generality of the data plane.The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane.We propose some basic principles that both control and data planes should comply with,based on the evolutionary trend of SDN.Moreover,we take two approaches for reference according to the principles,viewed from the control messages in OpenFlow-based SDN.Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane.
基金Supported by the Research Fund of Shaanxi University of Technology(SLG0619)~~
文摘To overcome the traditional disadvantages, an improved FPGA-core based real-time video image acqui- sition and storage system is designed. The modular designed by Verilog programming is used for video decoding of A/D configuration, video image capturing logic control and image storage logic control modules. And IDE in- terface bard disk as storage medium and FAT32 file system as record form are used for real-time image storage. Experimental results show that the system has the advantages of strong real-time capability, high integration, powerful storage, easy expansibility and so on.
基金Project(61225012)supported by the National Science Foundation for Distinguished Young Scholars of ChinaProjects(61070162,71071028,70931001)supported by the National Natural Science Foundation of China+4 种基金Project(20120042130003)supported by the Specialized Research Fund of the Doctoral Program of Higher Education for the Priority Development Areas,ChinaProjects(20100042110025,20110042110024)supported by the Specialized Research Fund for the Doctoral Program of Higher Education,ChinaProject(2012)supported by the Specialized Development Fund for the Internet of Things from the Ministry of Industry and Information Technology of ChinaProject(N110204003)supported by the Fundamental Research Funds for the Central Universities of ChinaProject(L2013001)supported by the Scientific Research Fund of Liaoning Provincial Education Department,China
文摘To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized.
基金supported by the National Natural Science Foundation of China under Grants No.61172068,61003300the Key Program of NSFC Guangdong Union Foundation under Grant No.U0835004+2 种基金the National Grand Fundamental Research 973 Program of China under Grant No.A001200907the Fundamental Research Funds for the Central Universities under Grant No.K50511010003Program for New Century Excellent Talents in University under Grant No.NCET-11-0691
文摘In Wireless Sensor Networks(WSNs),polling can obviously improve the throughput and decrease average access delay by allocating bandwidth efficiently and reasonably.In this paper,a Dynamic Polling Media Access Control (DPMAC) scheme designed according to WSNs' features is proposed.DPMAC is a priority based access control protocol with the characteristics that its polling table is dynamically refreshed depending on whether the sensor node is active and that the bandwidth is dynamically allocated according to the traffic types.The access priorities are determined by the emergency levels of events and the scheduler proposed in our MAC is preemptive based on the deadline of the events.Simulation results show that DPMAC can efficiently utilize bandwidth and decrease average access delay and response time for emergency events with different access priorities in WSNs.
基金High-Tech Research and DevelopmentProgram of China (No. 2003AA123310)
文摘OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Transmission Prot ocol) based OAM, i.e., SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its tran sport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experim ental results prove the proposed SOAM system achieves better performance on sign aling transmission compared with conventional TCP based OAM system.
基金Project supported by the Hi-Tech Research and Development Program (863) of China (No. 2002AA1Z2306) and HP Embedded Laboratory of Zhejiang University, China
文摘Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.
文摘With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack.
基金Projects(61173026,61373045,61202039)supported by the National Natural Science Foundation of ChinaProjects(K5051223008,BDY221411)supported by the Fundamental Research Funds for the Central Universities of ChinaProject(2012AA02A603)supported by the High-Tech Research and Development Program of China
文摘As the ability of a single agent is limited while information and resources in multi-agent systems are distributed, cooperation is necessary for agents to accomplish a complex task. In the open and changeable environment on the Internet, it is of great significance to research a system flexible and capable in dynamic evolution that can find a collaboration method for agents which can be used in dynamic evolution process. With such a method, agents accomplish tasks for an overall target and at the same time, the collaborative relationship of agents can be adjusted with the change of environment. A method of task decomposition and collaboration of agents by improved contract net protocol is introduced. Finally, analysis on the result of the experiments is performed to verify the improved contract net protocol can greatly increase the efficiency of communication and collaboration in multi-agent system.
文摘Peace is a key concept in the Jewish tradition; it has a long history. It is also an extremely broad concept. The present article takes on the subject of contemporary peace between Israel and her neighbors, addressing the issue from the vantage point of Judaism. While opinions on many issues are divided in Judaism today, all streams within the Jewish tradition uphold the concept of peace. Even so, each stream supports a somewhat different version of this ideal, subject to different limitations or reservations. One of the most serious challenges which Judaism today faces in connection with the State of Israel is the issue of exchanging territories for peace. The goal of the present paper is to show that while most approaches rooted in traditional Judaism have opposed such an exchange, Israel's religious political parties have endorsed it, advancing different arguments in support of their view. The method followed in the present paper is to study the arguments which have been used in support of peace agreements based on return or exchange of land. In light of the arguments put forth in the paper, to be counted among the accomplishments is a greater degree of openness--even on the part of the religious sector in Israel--toward the effort to achieve peace between Israel and her neighbors.
基金Supported by the National High-Tech Research,Development Plan of China under Grant Nos.2006AA01Z440,2009AA012441,2009AA012437National Basic Research Program of China (973 Program 2007CB311100)+4 种基金the National Natural Science Foundation of China under Grant Nos.60873191 and 60821001Specialized Research Fund for the Doctoral Program of Higher Education under Grant Nos.20091103120014,20090005110010Beijing Natural Science Foundation under Grant Nos.1093015,1102004the Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No.KM200810005004the ISN Open Foundation
文摘Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.
文摘The macadamia tree (macadamia integrifolia maiden & betche), originally from Australia, has smooth and rounded fruits, this walnut produces richly flavoured nuts, which are used "in natura" accompanying appetizers, in the manufacture of candies, being well accepted by the population. This paper analysed the production process of the agro industrial cooperative producers of macadamia nut (Coopmac), located in the town of Sao Mateus-ES/Brazil, and responsible for the production and marketing benefits for the states of Espirito Santo and Bahia. This analysis was performed in order to identify new opportunities for developing new products. The following steps were explored: analysis of the current procedure, ideas generation, analysis of potential ideas, development of a product concept and development of a prototype product. In cooperative, macadamia oil was only extracted. It was decided to develop a potential product from this oil. Initially, chemical analyzes were performed with this oil and opted for the production of soaps, liquid and bar. During this step, the methodology of design of experiments was used to develop the prototype. Sensory analysis, based on the LAM type hedonic scale, was used in the tests. The data were analyzed and could be distinguished the best formulation and the main effects for each assessed parameter. In this step, the statistical analysis software was used. From the value of the overall quality of the sample, greater acceptance for liquid soaps was obtained for a formulation with lower oil volume and higher volume of amphoteric. When concerning the sample bar soaps, the best formulation had the lower ratio of oil volume, the higher volume of amphoteric and lower mass of clay. The authors expect to contribute to generation of scientific and technological knowledge in order to effectively meet the practical needs of efforts directed to the production of macadamia nuts in the state of Espirito Santo.
基金Supported by the National Natural Science Foundation of China under Grant No.61402058Science and Technology,Sichuan Province of China under Grant No.2013GZX0137+1 种基金Fund for Young Persons Project of Sichuan Province of China under Grant No.12ZB017the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No.szjj2014-074
文摘A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are required,which makes the scheme more convenient than others in practical applications.By distributing a random key between both sides of the communication and performing classical XOR operation,we realize a one-time-pad scheme,therefore our protocol achieves unconditional secure.Because only user with legitimate identity string can decrypt the secret,our protocol can resist man-in-the middle attack.The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping.The detection rate reaches 75% per qubit.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61170272, 61272514, 61003287, and 61070163Asia Foresight Program under National Natural Science Foundation of China under Grant No.61161140320+4 种基金the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20100005120002the Fok Ying Tong Education Foundation under Grant No.131067the Shandong Provincial Natural Science Foundation, China under Grant No.ZR2011FM023the Shandong Province Outstanding Research Award Fund for Young Scientists of China under Grant No.BS2011DX034the Fundamental Research Funds for the Central Universities under Grant No.BUPT2012RC0221
文摘By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail.
基金supported by the National Natural Science Foundation of China(21503239,21533011,21402208,21403252)
文摘CO_2 incorporation into C-H bonds is an important and interesting topic. Herein a sequential protocol for C(sp)-H carboxylation by employing a metal-free C-H activation/catalytic silylation reaction in conjunction with KO^tBu-mediated carboxylation with CO_2 was established, in which KO^t Bu catalyzes silylation of terminal alkynes to form alkynylsilanes at low temperature, and simultaneously mediates carboxylation of the alkynesilanes with atmospheric CO_2. Importantly, the carboxylation further promotes the silylation, which makes the whole reaction proceed very rapidly. Moreover, this methodology is simple and scalable, which is characterized by short reaction time, wide substrate scope, excellent functional-group tolerance and mild reaction conditions,affording a range of corresponding propiolic acid products in excellent yields in most cases. In addition, it also allows for a convenient ^(13)C-labeling through the use of ^(13)CO_2.