In recent years, several new TCP congestion control algorithms have been proposed to improve TCP performance for networks of high bandwidth delay products. Satellite-HAP networks providing high-speed data transmission...
详细信息
Single-photon entanglement(SPE) is an important source in quantum communication. In this paper, we put forward a single-photon-assisted noiseless linear amplification protocol to protect the SPE of an arbitrary polari...
详细信息
Single-photon entanglement(SPE) is an important source in quantum communication. In this paper, we put forward a single-photon-assisted noiseless linear amplification protocol to protect the SPE of an arbitrary polarization–time-bin qudit from the photon transmission loss caused by the practical channel noise. After the amplification, the fidelity of the SPE can be effectively increased. Meanwhile, the encoded polarization–time-bin features of the qudit can be well preserved. The protocol can be realized under the current experimental conditions. Moreover, the amplification protocol can be extended to resist complete photon loss and partial photon loss during the photon transmission. After the amplification, we can not only increase the fidelity of the target state, but also solve the decoherence problem simultaneously. Based on the above features, our amplification protocol may be useful in future quantum communication.
Existing Ethernet Passive Optical network (EPON) Dynamic Bandwidth Allocation (DBA) algorithms suffer from the disadvantage of idle time loss, which lower the upstream bandwidth utilization. This letter proposes an im...
详细信息
This paper presents an efficient service similarity matchmaking method that considers complex QoS structures and attributes because sole consideration of QoS constraint becomes insufficient to handle sophisticated con...
详细信息
As a frequently used query operation for online applications,secure k-nearest neighbors(k-NN)computation on encrypted cloud data has received much *** this paper,we focus on the problem of supporting efficient k-NN co...
详细信息
ISBN:
(纸本)9781509012572
As a frequently used query operation for online applications,secure k-nearest neighbors(k-NN)computation on encrypted cloud data has received much *** this paper,we focus on the problem of supporting efficient k-NN computation over encrypted cloud data while data owner cannot share his secret keys with query *** give a security analysis of the scheme proposed by Zhu et al.[16],and the analysis shows the scheme cannot provide query privacy at *** we design a new efficient construction to support efficient k-NN computation over encrypted cloud data without key ***,security analysis is presented to demonstrate the new scheme can provide data privacy and query privacy in the Known Ciphertext Model.
DTN is developed as an emerging networktechnology which is mainly used in network with long waiting time, intermittent connectivity, and other extreme environments network. It has be favored in the military, transpor...
详细信息
One of the basic problems in cryptography is the generation of a common secret key between two legitimate parties in order to prevent eavesdropping. In this paper, we develop an information-theoretic secret key genera...
详细信息
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle wirelesssensornetworks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an...
详细信息
We carry out a proof-of-principle demonstration of three-state uncharacterized measurement-device-independent quantum key distribution over 170 km, achieving the longest transmission distance under the same security l...
详细信息
Target tracking is currently a hot research topic in Computer Vision and has a wide range of use in many research fields. However, due to factors such as occlusion, fast motion, blur and scale variation, tracking meth...
详细信息
暂无评论