Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly consider the two typical attack models: query sampling attack and query homogeneity attack. Th...
详细信息
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200...
详细信息
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two.
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum...
详细信息
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum secure direct communication protocol with this state,and prove that it is secure in ideal *** the protocol,the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the *** receiver then performs projective determinate measurement to decode the secret message ***,this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity.
In this paper, we consider a power-aware multimedia communications over internet of things (IoT). Specifically, we consider a generic IoT scenario where a multimedia server provides heterogeneous applications without ...
详细信息
ISBN:
(纸本)9781457720529
In this paper, we consider a power-aware multimedia communications over internet of things (IoT). Specifically, we consider a generic IoT scenario where a multimedia server provides heterogeneous applications without knowing the application's quality of experience (QoE) model and playout period. Our objective aims at dynamically adjusting the power allocation for each application over a uncertain period to maximize the system overall mean opinion score (MOS). Note that the practical QoE model can be observed over time, but the underlying functional relationship between the power and MOS is unknown. The highlight of this paper is to develop a dynamic powering algorithm, in which one learns the satisfaction function and optimizes power-aware user satisfaction with on-line operation. More precisely, the proposed algorithm performance is measured in terms of loss which denotes the MOS loss compared to the optimal one. Numerical simulation results validate the efficiency of the proposed algorithm.
Standard TCP perform poorly in satellite networks since the long delay, high bit error ratio and other characters. A new TCP variant, called BIPR for satellite networks is presented in this paper. Using the binary inc...
详细信息
Most existing approaches of Web service selection with user preferences are either quantitative or qualitative. However, using a qualitative or quantitative approach alone cannot handle all the non-functional properti...
详细信息
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe...
详细信息
This paper proposes a novel genetic clustering algorithm, called a real-valued quantum genetic niching clustering algorithm (RQGN), which is based on the concept and principles of quantum computing, such as the qubits...
详细信息
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of spacetime. Most researchers are only concerned about the learner's cognitive and construct a great amoun...
详细信息
暂无评论