期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Dynamic determination reserves of the underground gas storage
1
作者 谭羽非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第5期516-518,共3页
One of the key problems in the use of underground gas storage is frequent leakage. It can lead to the actual gas storage amount being less than that accounted for. Combining numerical simulation and parameter auto fit... One of the key problems in the use of underground gas storage is frequent leakage. It can lead to the actual gas storage amount being less than that accounted for. Combining numerical simulation and parameter auto fit, this paper ascertains the dynamic variation of the pressure in the storage reservoir, adjusts the actual injecting and producing gas to fit the accounted pressure with the tested pressure, obtains the gas leakage of the storage, and then determines the difference between accounted amount and leakage amount. The result is the actual reserves of the storage. The simulation result shows that the method presented can provide a theoretic foundation for estimating the leakage amount, thereby ensuring the actual reserves, searching the leakage route, and reducing leakage by adjusting the storage method. 展开更多
关键词 underground gas storage RESERVES fraction step solution numerical simulation parameter auto fit leakage problem
下载PDF
Cryptanalysis and improvement of several quantum private comparison protocols 被引量:1
2
作者 Zhao-Xu Ji Pei-Ru Fan +1 位作者 Huan-Guo Zhang Hou-Zhen Wang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2020年第8期57-62,共6页
Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant... Recently, Wu et al(2019 Int. J. Theor. Phys. 58 1854) found a serious information leakage problem in Ye and Ji’s quantum private comparison protocol(2017 Int. J. Theor. Phys. 561517), that is, a malicious participant can steal another’s secret data without being detected through an active attack means. In this paper, we show that Wu et al’s active attack is also effective for several other existing protocols, including the ones proposed by Ji et al and Zha et al(2016 Commun. Theor. Phys. 65 711;2018 Int. J. Theor. Phys. 57 3874). In addition,we propose what a passive attack means, which is different from Wu et al’s active attack in that the malicious participant can easily steal another’s secret data only by using his own secret data after finishing the protocol, instead of stealing the data by forging identities when executing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al, because it does not consume additional classical and quantum resources. 展开更多
关键词 quantum information security quantum cryptography quantum private comparison information leakage problem passive attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部