期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Guest Editorial Special Issue on Network and Communication Security
1
作者 Chin-Chen Chang Ming-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期193-194,共2页
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ... Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years. 展开更多
关键词 DATA Guest Editorial Special Issue on network and communication security very CHEN OVER
下载PDF
Announcing a Special Issue on Network and Communication Security
2
《Journal of Electronic Science and Technology》 CAS 2012年第1期93-93,共1页
Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and applicati... Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and application achievements in NCS. It is intended to highlight and summarize the major developments that have occurred over the past few years. Topic scopes to be covered include: 展开更多
关键词 Announcing a Special Issue on network and communication security WILL NCS
下载PDF
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
3
作者 Khattab M.Ali Alheeti Anna Gruebler Klaus McDonald-Maier 《Digital Communications and Networks》 SCIE 2017年第3期180-187,共8页
Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propos... Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoe networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DOS) and black hole attacks on vehicular ad hoe networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Diseriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection. 展开更多
关键词 Secure communication Vehicle ad hoc networks IDS Self-driving vehicles Linear and quadratic discriminant analysis
下载PDF
RAISE:A Resilient Anonymous Information Sharing Environment
4
作者 Ning Hu Ling Liu +2 位作者 Xin Liu Kaijun Wu Yue Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第12期2743-2759,共17页
With the widespread application of cloud computing and network virtualization technologies,more and more enterprise applications are directly deployed in the cloud.However,the traditional TCP/IP network transmission m... With the widespread application of cloud computing and network virtualization technologies,more and more enterprise applications are directly deployed in the cloud.However,the traditional TCP/IP network transmission model does not fully consider the information security issues caused by the uncontrollable internet environment.Network security communication solutions represented by encrypted virtual private networks(VPN)are facing multiple security threats.In fact,during the communication process,the user application needs to protect not only the content of the communication but also the behavior of the communication,such as the communication relationship,the communication protocol,and so on.Inspired by blockchain and software-defined networking technology,this paper proposes a resilient anonymous information sharing environment,RAISE.The RAISE system consists of user agents,a core switching network and a control cluster based on a consortium blockchain.User agents are responsible for segmenting,encrypting,and encapsulating user traffic.The core switching network forwards user traffic according to the rules issued by the controller,and the controller dynamically calculates the forwarding rules according to the security policy.Different from onion routing technology,RAISE adopts the controller to replace the onion routing model,which effectively overcomes the uncontrollability of nodes.The dispersed computing model is introduced to replace the TCP/IP pipeline transmission models,which overcomes the problems of anti-tracking and traffic hijacking that cannot be solved by VPNs.We propose a blockchain control plane framework,design the desired consensus algorithmand deploy a RAISE systemconsisting of 150 nodes in an internet environment.The experimental results show that the use of blockchain technology can effectively improve the reliability and security of the control plane.While maintaining high-performance network transmission,it further provides network communication security. 展开更多
关键词 Software-defined anonymous communication network blockchain network communication security
下载PDF
Covert voice over internet protocol communications based on spatial model 被引量:3
5
作者 HUANG YongFeng TANG ShanYu 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第1期117-127,共11页
This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without c... This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications. 展开更多
关键词 covert communication multimedia networking Vo IP data security
原文传递
A potential application in quantum networks-Deterministic quantum operation sharing schemes with Bell states 被引量:1
6
作者 Ke Jia Zhang Long Zhang +1 位作者 Ting Ting Song Ying Hui Yang 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2016年第6期41-48,共8页
In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme who... In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme whose messages are hidden in the entanglement correlation), "HIAO"(The scheme whose messages are hidden with the assistant operations) and "HIMB"(The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes. 展开更多
关键词 quantum operation sharing quantum secret sharing quantum secure direct communication quantum networks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部