期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
High-Capacity Quantum Secure Communication with Authentication Using Einstein-Podolsky-Rosen Pairs
1
作者 肖敏 徐洪卫 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第5期1-4,共4页
A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon.... A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. Tile security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security. 展开更多
关键词 XOR High-Capacity Quantum secure Communication with Authentication using Einstein-Podolsky-Rosen Pairs
下载PDF
Security Simulation of Continuous-Variable Quantum Key Distribution over Air-to-Water Channel Using Monte Carlo Method 被引量:1
2
作者 Cai-Lang Xie Ying Guo +2 位作者 Yi-Jun Wang Duan Huang Ling Zhang 《Chinese Physics Letters》 SCIE CAS CSCD 2018年第9期10-13,共4页
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of... Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of the absorp- tion and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously. Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle. 展开更多
关键词 QKD Security Simulation of Continuous-Variable Quantum Key Distribution over Air-to-Water Channel using Monte Carlo Method CV
下载PDF
Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data
3
作者 In-Ho Lee Myungjin Cho 《Chinese Optics Letters》 SCIE EI CAS CSCD 2015年第1期22-26,共5页
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi... We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme. 展开更多
关键词 DATA Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data
原文传递
Comparison of SETAM with Security Use Case and Security Misuse Case:A Software Security Testing Study
4
作者 HUI Zhanwei HUANG Song 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期516-520,共5页
A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security func... A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security functions and latent typical misuse behaviors,but also with the interaction of them.In this paper,we analyze the differences between SETAM with security use case and security misuse case in different types of security test requirements.To illustrate the effectiveness of SETAM,we compare them in a practical case study by the number of test cases and the number of faults detected by them.The results show that SETAM could decrease about 34.87% use cases on average,and the number of faults detected by SETAM increased by 71.67% in average,which means that our model can detect more faults with fewer test cases for software security testing. 展开更多
关键词 security testing security use case security misuse case software security testing behavior model security testing requirement
原文传递
SECURITY OF USE RIGHT FOR FOREST LAND AND COMMUNITY FORESTRY-A Case Study of the CompensatedTransfer of Use Right over CollectiveWasteland in Yao'an County
5
《Forestry and Society Newsletter》 1999年第2期10-14,共5页
1Background1.1BasicsituationofstudysiteYao'ancountyislocatedinthenorthwesternpartofcentralYunnanplateau.ItisoneoftheimportantgrainProductionbasecountiesofYunnanProvince.HanandYiarethemainethnicgroupsinthisprovince... 1Background1.1BasicsituationofstudysiteYao'ancountyislocatedinthenorthwesternpartofcentralYunnanplateau.ItisoneoftheimportantgrainProductionbasecountiesofYunnanProvince.HanandYiarethemainethnicgroupsinthisprovince.BanliuAdministrativeVillagebelongsto... 展开更多
关键词 OVER SECURITY OF USE RIGHT FOR FOREST LAND AND COMMUNITY FORESTRY-A Case Study of the CompensatedTransfer of Use Right over CollectiveWasteland in Yao’an County CASE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部