期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis
1
作者 Jing Xu Fei Xu +2 位作者 Xiao-Jun Chen Jin-Qiao Shi Cheng Qi 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期16-21,共6页
Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information leakage.This paper describes an information leakage detection system( ILDS) to detect sensitive... Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information leakage.This paper describes an information leakage detection system( ILDS) to detect sensitive information leakage caused by Trojan.In particular,the principles of the system are based on the analysis of net-flows in four perspectives: heartbeat behavior analysis,DNS abnormal analysis,uploaddownload ratio and content analysis.Heartbeat behavior analysis and DNS abnormal analysis are used to detect the existence of Trojans while upload-download ratio and content analysis can quickly detect when the information leakage happens.Experiments indicate that the system is reliable and efficient in detecting information leakage.The system can also help to collect and preserve digital evidence when information leakage incident occurs. 展开更多
关键词 information leakage heartbeat behavior Trojan detection digital forensics
下载PDF
Information leakage resistant quantum dialogue against collective noise 被引量:7
2
作者 YE TianYu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第12期2266-2275,共10页
In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective nois... In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack. 展开更多
关键词 quantum dialogue(QD) bidirectional quantum secure direct communication (BQSDC) information leakage collec-tive-dephasing noise collective-rotation noise
原文传递
Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States 被引量:1
3
作者 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第4期431-438,共8页
At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented ... At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented by using the entanglement swapping technology for two logical Bell states. One works well over a collective-dephasing noise channel, while the other takes effect over a collective-rotation noise channel. The negative influence of noise is erased by using logical Bell states as the traveling quantum states. The problem of information leakage is avoided by swapping entanglement between two logical Bell states. In addition, only Bell state measurements are used for decoding, rather than four-qubit joint measurements. 展开更多
关键词 quantum dialogue(QD) information leakage entanglement swapping logical Bell state collective-dephasing noise collective-rotation
原文传递
Information Leakage in Quantum Dialogue by Using Non-Symmetric Quantum Channel
4
作者 高干 李伟艳 王悦 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第5期507-510,共4页
In this paper [Commun. Theor. Phys. 53(2010) 648], Zhan et al. proposed a quantum dialogue protocol by using non-symmetric quantum channel. We study the security of the protocol and find that it has the drawback of in... In this paper [Commun. Theor. Phys. 53(2010) 648], Zhan et al. proposed a quantum dialogue protocol by using non-symmetric quantum channel. We study the security of the protocol and find that it has the drawback of information leakage. That is, Zhan et al.'s protocol is proved to be insecure by us. 展开更多
关键词 information leakage SECURITY quantum dialogue non-symmetric quantum channel
原文传递
The Study of the Recognizability of Electromagnetic Leakage Information Arising from Computer 被引量:5
5
作者 ZHANGHong-xin LUYing-hua +1 位作者 QIUYu-chun CHENDa-qing 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第2期80-85,共6页
The electromagnetic radiation will result in information leakage when computers work. This paper presents the recognition technology of information leakage caused by video signal electromagnetic radiation. To get the ... The electromagnetic radiation will result in information leakage when computers work. This paper presents the recognition technology of information leakage caused by video signal electromagnetic radiation. To get the intact and useful information of video signals conveniengtly, the pattern recognition method based on artificial neural networks is proposed. In the last part, the primary word image recovered from the electromagnetic leakage is recognized and reconstructed and the recognizability of the information leakage from computers is discussed. 展开更多
关键词 electromagnetic radiation information leakage pattern recognition TEMPEST
原文传递
Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad 被引量:2
6
作者 刘志昊 陈汉武 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第8期59-64,共6页
The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security iss... The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol.Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other's definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one. 展开更多
关键词 CRYPTANALYSIS quantum broadcast communication information leakage intercept-measure-resendattack CNOT-operation attack
下载PDF
A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States
7
作者 高干 王丽萍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第9期447-451,共5页
By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist.... By swapping the entanglement of genuine four-particle entangled states,we propose a bidirectional quantumsecure communication protocol.The biggest merit of this protocol is that the information leakage does not exist.Inaddition,the ideas of the 'two-step' transmission and the block transmission are employed in this protocol.In order toanalyze the security of the second sequence transmission,decoy states are used. 展开更多
关键词 Jbidirectional quantum secure communication x-type state information leakage
下载PDF
A Study on the EM Leakage Arising from Braided Shielding Cable
8
作者 ZHANG Hong-xin Lü Ying-hua BAO Yong-fang Lü Jian-gang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第3期67-70,共4页
To investigate the electromagnetic leakage caused by braided shidding cable, the finite-difference formulation of braided shielding cable for both the inner shield-conductor circuit and outer shield-ground circuit are... To investigate the electromagnetic leakage caused by braided shidding cable, the finite-difference formulation of braided shielding cable for both the inner shield-conductor circuit and outer shield-ground circuit are proposed. Then, the current in shield-ground circuit induced by the transmitting signal in the cable is computed in time-domain, and the shielding effectiveness of braided shield against trapezoid signals is studied. Further more, the video EM leakage in far zone is calculated. At last, the information leakage caused by EM radiation of braided cable is intercepted and recovered using the simulation platform. It is proved that EM radiation of braided cable can give rise to information leakage. It is a key factor that should be concerned in the information secure field. 展开更多
关键词 braided shielding cable electromagnetic radiation information leakage information secure
原文传递
Fault tolerant channel-encrypting quantum dialogue against collective noise 被引量:3
9
作者 YE TianYu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第4期1-10,共10页
In this paper,two fault tolerant channel-encrypting quantum dialogue(QD)protocols against collective noise are presented.One is against collective-dephasing noise,while the other is against collective-rotation noise.T... In this paper,two fault tolerant channel-encrypting quantum dialogue(QD)protocols against collective noise are presented.One is against collective-dephasing noise,while the other is against collective-rotation noise.The decoherent-free states,each of which is composed of two physical qubits,act as traveling states combating collective noise.Einstein-Podolsky-Rosen pairs,which play the role of private quantum key,are securely shared between two participants over a collective-noise channel in advance.Through encryption and decryption with private quantum key,the initial state of each traveling two-photon logical qubit is privately shared between two participants.Due to quantum encryption sharing of the initial state of each traveling logical qubit,the issue of information leakage is overcome.The private quantum key can be repeatedly used after rotation as long as the rotation angle is properly chosen,making quantum resource economized.As a result,their information-theoretical efficiency is nearly up to 66.7%.The proposed QD protocols only need single-photon measurements rather than two-photon joint measurements for quantum measurements.Security analysis shows that an eavesdropper cannot obtain anything useful about secret messages during the dialogue process without being discovered.Furthermore,the proposed QD protocols can be implemented with current techniques in experiment. 展开更多
关键词 quantum dialogue (QD) quantum encryption information leakage decoherent-free (DF) state collective-dephasingnoise collective-rotation noise
原文传递
Cryptanalysis and improvement of several quantum private comparison protocols 被引量:1
10
作者 Zhao-Xu Ji Pei-Ru Fan +1 位作者 Huan-Guo Zhang Hou-Zhen Wang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2020年第8期57-62,共6页
Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant... Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al(2016 Commun. Theor. Phys. 65 711;2018 Int. J. Theor. Phys. 57 3874). In addition,we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources. 展开更多
关键词 quantum information security quantum cryptography quantum private comparison information leakage problem passive attack
原文传递
Multi-Party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States
11
作者 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第9期280-290,共11页
Recently, Liu et al. proposed a two-party quantum private comparison(QPC) protocol using entanglement swapping of Bell entangled state(Commun. Theor. Phys. 57(2012) 583). Subsequently, Liu et al. pointed out that in L... Recently, Liu et al. proposed a two-party quantum private comparison(QPC) protocol using entanglement swapping of Bell entangled state(Commun. Theor. Phys. 57(2012) 583). Subsequently, Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole(Commun. Theor. Phys. 62(2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. 展开更多
关键词 multi-party quantum private comparison Bell entangled state entanglement swapping information leakage
原文传递
Security analysis of two recently proposed RFID authentication protocols
12
作者 Chao LV Hui LI +1 位作者 Jianfeng MA Meng ZHAO 《Frontiers of Materials Science》 SCIE CSCD 2011年第3期335-340,共6页
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authe... Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag's identification. 展开更多
关键词 radio frequency identification (RFID) protocol tag information leakage untraceability attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部