咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 理学
    • 5 篇 物理学
    • 4 篇 数学
    • 1 篇 统计学(可授理学、...
  • 8 篇 工学
    • 5 篇 信息与通信工程
    • 5 篇 计算机科学与技术...
    • 3 篇 光学工程
    • 2 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 quantum cryptogr...
  • 1 篇 capacity
  • 1 篇 computer science
  • 1 篇 filters
  • 1 篇 multidimensional...
  • 1 篇 smartphones
  • 1 篇 computational co...
  • 1 篇 quantum algorith...
  • 1 篇 variational ineq...
  • 1 篇 key predistribut...
  • 1 篇 malware (compute...
  • 1 篇 signature signer...
  • 1 篇 quantum optics a...
  • 1 篇 wireless communi...
  • 1 篇 computer securit...
  • 1 篇 laboratories
  • 1 篇 optimization
  • 1 篇 social networks
  • 1 篇 search methods
  • 1 篇 fuzzy systems

机构

  • 4 篇 key lab of netwo...
  • 3 篇 school of mathem...
  • 2 篇 state key labora...
  • 1 篇 key lab of netwo...
  • 1 篇 beijing electron...
  • 1 篇 key lab of netwo...
  • 1 篇 school of mathem...
  • 1 篇 key lab. of netw...
  • 1 篇 key lab. of netw...
  • 1 篇 key lab of netwo...
  • 1 篇 school of math. ...
  • 1 篇 key lab of netwo...
  • 1 篇 department of co...
  • 1 篇 and key lab of n...
  • 1 篇 college of compu...
  • 1 篇 china academy of...
  • 1 篇 college of commu...
  • 1 篇 key lab. of netw...

作者

  • 3 篇 chen zhide
  • 3 篇 xu li
  • 2 篇 liu xiaofen
  • 2 篇 lin song
  • 2 篇 guo gongde
  • 2 篇 刘晓芬
  • 2 篇 林崧
  • 2 篇 song lin
  • 2 篇 wang meng
  • 2 篇 pan rijing
  • 2 篇 chen licong
  • 2 篇 xiao-fen liu
  • 2 篇 gong-de guo
  • 1 篇 gongde guo
  • 1 篇 qi yuan
  • 1 篇 yu chaohua
  • 1 篇 chunguang ma
  • 1 篇 tianqiang huang
  • 1 篇 liu xiao-fen
  • 1 篇 huang xuming

语言

  • 13 篇 英文
检索条件"机构=Key Lab of Network Security and Cryptography"
13 条 记 录,以下是1-10 订阅
排序:
Arbitrated quantum signature scheme based on reusable key
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2014年 第11期57卷 2079-2085页
作者: YU ChaoHua GUO GongDe LIN Song School of Mathematics and Computer Science Fujian Normal University Key Lab of Network Security and Cryptography Fujian Normal University
An arbitrated quantum signature scheme without using entangled states is *** the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be *** is shown that the pro... 详细信息
来源: 评论
Cryptanalysis and Improvement of Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations
收藏 引用
Chinese Physics Letters 2009年 第12期26卷 35-38页
作者: 林崧 温巧燕 刘晓芬 Key Lab of Network Security and Cryptography Fujian Normal University Fuzhou 350007 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
In a recent paper [Yan F L et al. ***. 25(2008)1187], a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented. We analyze the security of... 详细信息
来源: 评论
Quantum Secure Direct Communication with Five-Qubit Entangled State
收藏 引用
Chinese Physics Letters 2011年 第3期28卷 17-20页
作者: LIN Song GAO Fei LIU Xiao-Fen School of Mathematics and Computer Science Fujian Normal UniversityFuzhou 350007 Key Lab of Network Security and Cryptography Fujian Normal UniversityFuzhou 350007 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum... 详细信息
来源: 评论
Improving the security of n-user quantum key distribution with n quantum channels
Improving the security of n-user quantum key distribution wi...
收藏 引用
2012 2nd International Conference on Computer Application and System Modeling, ICCASM 2012
作者: Liu, Xiaofen Chen, Licong Pan, Rijing Key Lab of Network Security and Cryptography School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China
In a recent paper [C.H. Hong et al., Opt. Commun. 283 (2010) 2644], a n-user quantum key distribution protocol with n quantum channels was presented. By analyzing its security, it is shown that this protocol is insecu... 详细信息
来源: 评论
Worm propagation model in mobile network
Worm propagation model in mobile network
收藏 引用
作者: Chen, Zhide Wang, Meng Xu, Li Wu, Wei Key Lab of Network Security and Cryptography School of Mathematics and Computer Science Fujian Normal University Fujian Province Fuzhou China
With the popularity of mobile smart devices and functional diversification, the infection ways of mobile smartphones worm also become diverse. In mobile networks, mobile devices are suffering from the threat of worms ... 详细信息
来源: 评论
Service price discrimination in wireless network
Service price discrimination in wireless network
收藏 引用
International Conference on Computational Science and Engineering
作者: Chen, Zhide Xu, Li Key Lab. of Network Security and Cryptography School of Mathematics and Computer Science Fujian Normal University Fujian Province Fuzhou China
This paper discusses the price discrimination in wireless service allocation on the basis of game theory. The wireless service providers can supply the service with different prices. Two service price discrimination m... 详细信息
来源: 评论
Optimization of key Predistribution Protocol Based on Supernetworks Theory in Heterogeneous WSN
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 333-343页
作者: Qi Yuan Chunguang Ma Xiaorui Zhong Gang Du Jiansheng Yao College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China College of Communication and Electronic Engineering Qiqihar UniversityQiqihar 161006China Key Lab of Network Security and Cryptography of Fujian Province China Academy of Electronics and Information Technology Beijing 100041China
This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential ... 详细信息
来源: 评论
Quantum anonymous ranking based on the Chinese remainder theorem
收藏 引用
Physical Review A 2016年 第1期93卷 012318-012318页
作者: Song Lin Gong-De Guo Feng Huang Xiao-Fen Liu and Key Lab of Network Security and Cryptography Fujian Normal University Fuzhou 350007 China
In this paper, an efficient quantum anonymous ranking protocol with single particles is proposed. A semitrusted server is introduced to help multiple users achieve this secure task. At the end of the protocol, each us... 详细信息
来源: 评论
Improving the security of N-user Quantum key distribution with N Quantum Channels
Improving the Security of N-user Quantum Key distribution wi...
收藏 引用
2012年计算机应用与系统建模国际会议
作者: Liu Xiaofen Chen Licong Pan Rijing School of Mathematics and Computer Science Key Lab of Network Security and Cryptography Fujian Normal University
In a recent paper [C.H. Hong et al., Opt. Commun. 283 (2010) 2644], a n-user quantum key distribution protocol with n quantum channels was presented. By analyzing its security, it is shown that this protocol is insecu... 详细信息
来源: 评论
Data reduction and classification based on multiple classifier behavior
Data reduction and classification based on multiple classifi...
收藏 引用
2008 International Conference on Data Mining, DMIN 2008
作者: Zhao, Chunying Guo, Gongde Huang, Xuming Huang, Tianqiang Neagu, Daniel School of Math. and Computer Science Fujian Normal Univ. China Key Lab. of Network Security and Cryptography Fujian Normal Univ. China Department of Computing University of Bradford United Kingdom
A novel method, multiple classifier behavior-based data reduction and classification algorithm, called DRC, is proposed in this paper. It arrived at the transformation of the data-space by suing of the multiple classi... 详细信息
来源: 评论