期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
《通信技术》征稿启示
1
《信息安全与通信保密》 2015年第3期88-,共1页
《通信技术》是国内创办时间长、影响大的IT专业媒体,由中国电子科技集团公司主管、中国电子科技集团公司第三十研究所主办,主要报道信源处理、传输、业务与系统、网络、移动通信、信息安全等方面的先进技术、理论研究成果和最新动态。... 《通信技术》是国内创办时间长、影响大的IT专业媒体,由中国电子科技集团公司主管、中国电子科技集团公司第三十研究所主办,主要报道信源处理、传输、业务与系统、网络、移动通信、信息安全等方面的先进技术、理论研究成果和最新动态。自1967年创刊以来,《通信技术》一直以促进民族通信事业的发展为已任,搭建了一个联系编读交流。 展开更多
关键词 通信技术 集团公司主管 征稿启示 信源处理 通信事业 移动通信 创办时间 研究成果 信息安全 通信保
下载PDF
《通信技术》征稿启示
2
《信息安全与通信保密》 2015年第4期104-,共1页
《通信技术》是国内创办时间长、影响大的IT专业媒体,由中国电子科技集团公司主管、中国电子科技集团公司第三十研究所主办,主要报道信源处理、传输、业务与系统、网络、移动通信、信息安全等方面的先进技术、理论研究成果和最新动态。... 《通信技术》是国内创办时间长、影响大的IT专业媒体,由中国电子科技集团公司主管、中国电子科技集团公司第三十研究所主办,主要报道信源处理、传输、业务与系统、网络、移动通信、信息安全等方面的先进技术、理论研究成果和最新动态。自1967年创刊以来,《通信技术》一直以促进民族通信事业的发展为已任,搭建了一个联系编读交流、展示通信技术发展的良好平台。在强化品质、不断创新的基础上,《通信技术》将以崭新的面貌出现在您的面前——更新颖的内容、更美观的版面、更精美的印刷。 展开更多
关键词 通信技术 集团公司主管 征稿启示 信源处理 创办时间 通信事业 移动通信 研究成果 信息安全 通信保
下载PDF
可食性膜在食品保鲜中的应用现状及研究进展 被引量:2
3
作者 曾仪雯 周恩弛 +3 位作者 黄高瓴 冯静秋 李丹 张春红 《保鲜与加工》 CAS 2023年第4期62-67,共6页
在食品保鲜领域,可食用天然抗菌保鲜膜是一种重要的可生物降解膜,具有易降解、成本低、来源广等特点。介绍了多糖膜、蛋白膜和脂质膜3种可食性涂膜在食品保鲜中的应用现状,综述了复合成膜技术、纳米颗粒制备技术及添加植物精油在制备可... 在食品保鲜领域,可食用天然抗菌保鲜膜是一种重要的可生物降解膜,具有易降解、成本低、来源广等特点。介绍了多糖膜、蛋白膜和脂质膜3种可食性涂膜在食品保鲜中的应用现状,综述了复合成膜技术、纳米颗粒制备技术及添加植物精油在制备可食性涂膜中的研究进展,以期为可食性包装材料在保鲜领域中的进一步研究提供参考借鉴。 展开更多
关键词 可食性膜 包装 多糖 蛋白质 纳米材料 食品
下载PDF
Secure Communication via Chaotic Masking *
4
作者 纪飚 陆佶人 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期12-16,共5页
A novel secure communication approach via chaotic masking is proposed. At the transmitter, a message sequence is added to a chaotic masking sequence and is,at the same time, also involved in the generation of the mask... A novel secure communication approach via chaotic masking is proposed. At the transmitter, a message sequence is added to a chaotic masking sequence and is,at the same time, also involved in the generation of the masking sequence. At the receiver, a non dynamical system which adopts the same nonlinear functions as what is adopted at transmitter is used to retrieve the masking sequence from the received signal and then the message sequence is recovered through subtraction. The results of the theoretical analysis and computer simulation show that the chaotic digital secure communication system presented in this paper has the fine security, high reliability and can be implemented easily. 展开更多
关键词 CHAOS nonlinear discrete dynamical system secure communication
下载PDF
Admission Control Based on QoS for Third Generation Broadband Mobile Communication Systems
5
作者 侯春萍 常倩 +1 位作者 曹达仲 范仲方 《Transactions of Tianjin University》 EI CAS 2002年第2期110-113,共4页
In this paper, a novel admission scheme is proposed which provides high degrees of quality of service (QoS) guarantees for multimedia traffic carried in mobile networks. The proposed scheme combines the admission cont... In this paper, a novel admission scheme is proposed which provides high degrees of quality of service (QoS) guarantees for multimedia traffic carried in mobile networks. The proposed scheme combines the admission control and bandwidth reservation to guarantee QoS requirements. It considers both local information and remote information to determine whether to accept or reject a connection. In order to embody the characteristics of the algorithms proposed in the article, two traditional algorithms of admission control are used for comparison. In the end of the paper the simulation analyses are given and the results show that the proposed algorithm can adjust the bandwidth according to the current status of networks and decrease the probability of connections forcibly dropped. The most important thing is that the algorithm is based on the multimedia communications and can guarantee the QoS of real time connections through decreasing the bandwidth of non real time connections. 展开更多
关键词 broadband mobile networks admission control quality of service guarantee
下载PDF
Research on Assessment Model of Information System Security Based on Various Security Factors 被引量:5
6
作者 林梦泉 朱赟 +1 位作者 王强民 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第3期405-409,共5页
With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system securit... With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM. 展开更多
关键词 information system security factors five-attribute model(FAM) risk assessment
下载PDF
Guaranteeing Wireless Communication Secrecy via a WFRFT-Based Cooperative System 被引量:18
7
作者 Fang Xiaojie Sha Xuejun Mei Lin 《China Communications》 SCIE CSCD 2015年第9期76-82,共7页
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti... In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity. 展开更多
关键词 weighted fractional Fourier trans-form(WFRFT) physical layer(PHY) security secrecy capacity
下载PDF
自治区人民政府办公厅关于印发自治区防震减灾领导小组应对地震灾害工作方案的通知
8
《宁夏回族自治区人民政府公报》 2010年第26期22-26,共5页
宁政办发[2010]130号各市、县(区)人民政府,自治区政府各部门、直属机构:《自治区防震减灾领导小组应对地震灾害工作方案》已经自治区人民政府同意,现印发给你们,请结合本地区、本部门实际,认真组织实施。
关键词 地震灾害 领导小组 次生灾害 震后应急 灾害损失评估 生命线工程 避震 城乡建设厅 抢险救灾 通信保
下载PDF
A NEW GROUP-ORIENTED PUBLICLY VERIABLETHRESHOLD SIGNCRYPTION SCHEME 被引量:1
9
作者 Chen Shangdi Bian Guangxu 《Journal of Electronics(China)》 2013年第6期567-573,共7页
Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes,it is found that the improved scheme can effectively resist conspiracy attack and forgery attack,but does not... Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes,it is found that the improved scheme can effectively resist conspiracy attack and forgery attack,but does not have semantic security and public verification function,and sends threshold signcryption by the secret secure channel,which increases the communication costs and potential safety hazards of the system.A new group-oriented publicly verifiable threshold signcryption scheme is proposed on the basis of the improved scheme,the new scheme overcomes the drawbacks of the improved scheme,which not only provides with semantic security and public verification function,but also can send threshold signcryption by the public channel. 展开更多
关键词 Group-oriented Threshold signcryption Public verifiable Semantic security
下载PDF
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications 被引量:1
10
作者 蒋军 何晨 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期399-404,共6页
In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-respo... In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols. 展开更多
关键词 Mutual authentication Number Theory Research Unit (NTRU) Public key cryptography Wireless communications
下载PDF
Dynamics and circuit implementation of three simplified chaotic systems 被引量:1
11
作者 孙克辉 王艳丽 朱从旭 《Journal of Central South University》 SCIE EI CAS 2013年第3期663-669,共7页
To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological s... To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological structure.Complex dynamical behaviors of the systems including chaos and periodic orbits were verified by numerical simulations,Lyapunov exponents and bifurcation diagrams.Interestingly,the three systems were integrated in a common circuit,and their dynamical behaviors were easily observed by adjusting regulable resistors R28,R14 and R17,respectively,and the relations between the variable resistor and the system parameter were deduced.The circuit experiment results agree well with the simulation results.Finally,a secure communication scheme based on chaos shift keying(CSK) was presented,which lays an experiment foundation for chaotic digital secure communication. 展开更多
关键词 CHAOS single-parameter system circuit realization secure communication chaos shift keying
下载PDF
NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS 被引量:8
12
作者 Chen Xiaofeng Zhang Fangguo Kwangjo Kim 《Journal of Electronics(China)》 2006年第6期892-900,共9页
We argue that traditional identity-based systems from pairings seem unsuitable for designing group signature schemes due to the problem of key escrow. In this paper we first propose new ID-based public key systems wit... We argue that traditional identity-based systems from pairings seem unsuitable for designing group signature schemes due to the problem of key escrow. In this paper we first propose new ID-based public key systems without trusted PKG (Private Key Generator) from bilinear pairings. In our new ID-based systems, if the dishonest PKG impersonates an honest user to communicate with others, the user can provide a proof of treachery of the PKG afterwards, which is similar to certificate-based systems. Therefore, our systems reach the Girault’s trusted level 3. We then propose a group signature scheme under the new ID-based systems, the security and performance of which rely on the new systems. The size of the group public key and the length of the signature are independent on the numbers of the group. 展开更多
关键词 Group signature Bilinear pairings Identity-based cryptography
下载PDF
Quantum Privacy Amplification for a Sequence of Single Qubits 被引量:6
13
作者 DENG Fu-Guo 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第3X期443-446,共4页
We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are perform... We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are performed with the unitary gate operation, and a measurement is made on one photon and the other one is retained. The retained qubit carries the state information of the discarded one. In this way, the information leakage is reduced. The procedure can be performed repeatedly so that the information leakage is reduced to any arbitrarily low level. With this QPA scheme, the quantum secure direct communication with single qubits can be implemented with arbitrarily high security. We also exploit this scheme to do privacy amplification on the single qubits in quantum information sharing for long-distance communication with quantum repeaters. 展开更多
关键词 quantum privacy amplification quantum secure direct communication
下载PDF
Study on DeviceNet communication mechanism and its application in protection measurement and control system 被引量:1
14
作者 佟为明 Li Zhongwei +1 位作者 Sun Fanjin Cheng Shukang 《High Technology Letters》 EI CAS 2007年第1期1-5,共5页
To fit in with the developing requirement of int and communication of protective relays, a protection egrated functions of protection measurement, control measurement and control system based on DeviceNet fieldbus is ... To fit in with the developing requirement of int and communication of protective relays, a protection egrated functions of protection measurement, control measurement and control system based on DeviceNet fieldbus is designed. The communication mechanism of DeviceNet is studied and data trigger modes, communication connection, message types and other key technologies are analyzed. The object modeling and device description of the device are realized too. Results of network test, dynamic simulation and test in the field indicate that this system can accomplish all the communication tasks in real time and can make precise response to every kind of faults of the motor, transformer, line and capacitor. Moreover, this system has higher measurement precision and better control capability. 展开更多
关键词 communication mechanism protection measurement and control system FIELDBUS DEVICENET
下载PDF
Cryptanalysis of an image encryption scheme based on the Hill cipher
15
作者 Cheng-qing Dan ZHANG Guan-rong CHEN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1118-1123,共6页
This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al., 2006) and reports its following problems: (1) There is a simple necessary and sufficient condition that makes a nu... This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al., 2006) and reports its following problems: (1) There is a simple necessary and sufficient condition that makes a number of secret keys invalid; (2) It is insensitive to the change of the secret key; (3) It is insensitive to the change of the plain-image; (4) It can be broken with only one known/chosen plaintext; (5) It has some other minor defects. The proposed cryptanalysis discourages any use of the scheme in practice. 展开更多
关键词 CRYPTANALYSIS ENCRYPTION Hill cipher Known-plaintext attack Chosen-plahltext attack
下载PDF
Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation 被引量:2
16
作者 WANG Jian ZHANG Quan TANG Chao-Jing 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第3期454-458,共5页
We present an (n, n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender e... We present an (n, n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation. The receivers can recover the secret message by combining their measurement results with the sender's result. Ira perfect quantum channel is used, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. We also show our scheme is secure for noise quantum channel. 展开更多
关键词 quantum secret sharing quantum teleportation
下载PDF
Comment:Comments on “How to repair the Hill cipher”
17
作者 Y.RANGEL-ROMERO R.VEGA-GARCíA +7 位作者 A.MENCHACA-MéNDEZ D.ACOLTZI-CERVANTES L.MARTíNEZ-RAMOS M.MECATE-ZAMBRANO F.MONTALVO-LEZAMA J.BARRóN-VIDALES N.CORTEZ-DUARTE F.RODRíGUEZ-HENRíQUEZ 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第2期211-214,共4页
A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006),who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced... A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006),who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key gen-eration mechanism.That mechanism produces one different encryption key for each one of the plaintext blocks.Nevertheless,we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme. 展开更多
关键词 Hill cipher Symmetric encryption Image encryption
下载PDF
A Password-Based Secure Communication Scheme in Battlefields for Internet of Things 被引量:1
18
作者 张华 高飞 +1 位作者 温巧燕 金正平 《China Communications》 SCIE CSCD 2011年第1期72-78,共7页
Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et ... Mobile Ad hoc NETwork (MANET) is a part of the Internet of Things (IoT). In battlefield communication systems, ground soldiers, tanks, and unmanned aerial vehicles comprise a heterogeneous MANET. In 2006, Byun et al. proposed the first constant-round password-based group key ex- change with different passwords for such net- works. In 2008, Nam et al. discovered the short- comings of the scheme, and modified it. But the works only provide the group key. In this paper, we propose a password-based secure communication scheme for the loT, which could be applied in the battlefield communication systems and support dy- namic group, in which the nodes join or leave. By performing the scheme, the nodes in the heteroge- neous MANET can realize secure broadcast, secure unicast, and secure direct communication across realms. After the analyses, we demonstrate that the scheme is secure and efficient. 展开更多
关键词 Internet of Things PASSWORD BROADCAST UNICAST direct communication across realms
下载PDF
TWO TYPES OF NEW SUBLIMINAL CHANNELS
19
作者 DongQingkuan ChenYuan XiaoGuozhen 《Journal of Electronics(China)》 2004年第6期467-470,共4页
Two types of new subliminal channels are constructed respectively based on provable secure public key cryptosystems and identity recognition in some network applications. Research shows that there are some new charact... Two types of new subliminal channels are constructed respectively based on provable secure public key cryptosystems and identity recognition in some network applications. Research shows that there are some new characteristics which are in favor of covert communication in our constructions. It is hard to make the subliminal channels free, and the channels have large capacity and high transmission efficiency. We also point out that the hardness to make the channels free is disadvantageous to the warden who tries to thwart the covert communication. 展开更多
关键词 Information hiding Subliminal channels Provably secure cryptosystems
下载PDF
Quantum Communication Scheme Using Non-symmetric Quantum Channel
20
作者 CAO Hai-Jing CHEN Zhong-Hua SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第8期379-382,共4页
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel,quantum key distribu... A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel,quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme.The scheme is secure and has high source capacity.At last,we generalize the quantum communication scheme to d-dimensional quantum channel. 展开更多
关键词 quantum key distribution quantum secure direct communication unitary operations measuringbasis
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部