期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
露天采矿维修企业风险评估与安全管理 被引量:1
1
作者 任宇航 《露天采矿技术》 CAS 2014年第7期86-89,共4页
神华哈尔乌素露天煤矿设备维修中心每年年底开展一次基准风险评估,对设备和环境的高频风险列入安技措项目,对不可承受风险通过事前、事中控制并采用安全技术降低或消除风险,逐步提高设备设施和环境的安全可靠性,实现风险能控、可控。
关键词 风险评估 安技措 安全技术
下载PDF
Secure Communication Based on Quantum Key 被引量:1
2
作者 SONG Jie XIA Yan SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第3期635-638,共4页
We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the... We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient. 展开更多
关键词 secure communication EPR pairs unitary operation
下载PDF
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
3
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
下载PDF
Research on computer network security measures
4
作者 CHEN Jie 《International English Education Research》 2015年第10期1-3,共3页
With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security is... With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security issues have received more and more attention of the communities. In the face of the problems of the security hidden trouble in the computer network, it is essential to take the relevant measures to ensure the safety of the computer network. With the computer network security as the breakthrough point, this paper discusses the precautionary measures of the computer network security based on the analysis of the computer network security, in order to illustrate the importance of the computer network security, to provide references for ensuring the security of the computer network. 展开更多
关键词 COMPUTER network security PROBLEM precautionary measures
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部