期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
缓冲区溢出攻击及保护
1
作者 陆军 丁雪梅 《东北农业大学学报》 CAS CSCD 2004年第3期361-365,共5页
阐述缓冲区溢出攻击的原理以及一些实例,探讨与缓冲区溢出相关的安全性编码原则,特别是编程人员常用但容易忽略其安全性的一些函数。对于提高广大编程人员的安全编码意识具有一定指导意义。
关键词 缓冲区溢出 格式化字符串 安全性编码
下载PDF
Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement 被引量:4
2
作者 顾斌 黄余政 +1 位作者 方夏 陈玉林 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第10期659-663,共5页
We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be... We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal.The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently.Compared with other QSDC network protocols,our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information.Also,we discuss the security of our QSDC network protocol and its feasibility with current techniques. 展开更多
关键词 quantum secure direct communication NETWORK BIDIRECTIONAL hyperentanglement high capacity
下载PDF
Low-Complexity Secure Network Coding Against Wiretapping Using Intra/Inter-generation Coding 被引量:9
3
作者 LIU Guangjun LIU Binyue +2 位作者 LIU Ximeng LI Fang GUO Wangmei 《China Communications》 SCIE CSCD 2015年第6期116-125,共10页
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions... Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation coding.The basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear transformation.This method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network coding.We show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively. 展开更多
关键词 network coding security wiretap-ping attacks algebraic coding ENCRYPTION
下载PDF
Secure Network Coding Based on Lattice Signature 被引量:2
4
作者 SHANG Tao PEI Hengli LIU Jianwei 《China Communications》 SCIE CSCD 2014年第1期138-151,共14页
To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- u... To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation. 展开更多
关键词 secure network coding pollution attack lattice signature fixed length vector problem
下载PDF
The Study on Wireless Mesh Networks Security based on Improved Coding Scheme
5
作者 He Rongyi 《International English Education Research》 2014年第3期134-136,共3页
In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect fi'om multiple failures in... In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect fi'om multiple failures in wireless mesh networks to achieve high throughput where the redundancy is considered for the average number of failures. Our coding scheme is designed to protect fi'om the average number of failures to increase the network throughput. When the number of failures is more than the average case, the destination will have to walt for more coded packets in the following time slots. 展开更多
关键词 Network Security link failure survivability.
下载PDF
The Study on Wireless Mesh Networks Security based on Improved Coding Scheme
6
《International English Education Research》 2014年第1期10-12,共3页
In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect from multiple failures in w... In a multi-hop wireless mesh network, wireless links are vulnerable due to severe channel fading, interference and physical damage. In this paper, we will provide a coding scheme to protect from multiple failures in wireless mesh networks to achieve high throughput where the redundancy is considered for the average number of failures. Our coding scheme is designed to protect from the average number of failures to increase the network throughput. When the number of failures is more than the average case, the destination will have to wait for more coded packets in the following time slots. 展开更多
关键词 Network Security link failure survivability.
下载PDF
A New Method to Construct Secret Sharing Schemes Based on Linear Codes
7
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期89-94,共6页
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin... Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme. 展开更多
关键词 Linear code parity-check matrix secret sharing scheme minimal codeword minimal access set.
下载PDF
Deterministic quantum communication using the symmetric W state 被引量:9
8
作者 TSAI Chia-Wei HWANG Tzonelih 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2013年第10期1903-1908,共6页
This study proposes a new coding function for the symmetric W state. Based on the new coding function, a theoretical protocol of deterministic quanama communication (DQC) is proposed. The sender can use the proposed... This study proposes a new coding function for the symmetric W state. Based on the new coding function, a theoretical protocol of deterministic quanama communication (DQC) is proposed. The sender can use the proposed coding function to encode his/her message, and the receiver can perform the imperfect Bell measurement to obtain the sender's message. In comparison to the existing DQC protocols that also use the W class state, the proposed protocol is more efficient and also more practical within today's technology. Moreover, the security of this protocol is analyzed to show that any eavesdropper will be detected with a very high probability under both the ideal and the noisy quantum channel. 展开更多
关键词 deterministic quantum communication symmetric W state imperfect Bell measurement
原文传递
Quasi-3-D Au mushrooms with programmable morphology for high-capacity flexible plasmonic encoding 被引量:1
9
作者 Dong Li Yinghui Sun +7 位作者 Yawen Wang Bo Zhao Wenkai Liang Yuanlan Liu Heng Gao Yaqi Ye Jiating Li Lin Jiang 《Science China Materials》 SCIE EI CAS CSCD 2022年第8期2227-2234,共8页
Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasm... Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasmonic encoding patterns because of the technical difficulty of assembling multiplex nanostructures on a single platform,which cannot satisfy the requirements of high encoding capacity for increasing information security.Herein,we developed a strategy based on plasma etching combined with in-situ growth to fabricate patterned arrays of quasi-three-dimensional(3-D)plasmonic Au nano-mushrooms with controlled morphologies,and successfully realized ideal high-capacity plasmonic encoding by arranging Au nano-mushrooms on one platform.On this basis,such multiplex encoding patterns have been transferred to the flexible substrate to realize the triple-mode encryption of the Morse code of"FUNSOM",indicating great prospects in the applications of information encryption and data storage. 展开更多
关键词 PLASMONIC ENCODING high capacity FLEXIBLE information protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部