共查询到20条相似文献,搜索用时 328 毫秒
1.
2.
历届大型运动会的经验表明,高水平的体育盛会,要有高科技作为支撑.中国电信在对"信息亚运"的建设中,也将高科技融入其中,利用科技的突破创新,实现亚运各项工程的数字信息化. 中国电信有关负责人表示,在实施"信息亚运"的进程中,技术的创新应用占据了重要比重,主要体现在当前流行的"物联网"、"云计算"、"三网融合"等等. 相似文献
3.
从"统计"到"理解",从"传输"到"认知" 总被引:3,自引:0,他引:3
今年是Shannon信息论问世的50周年.为了纪念这一伟大事件,本文回顾了它的杰出成就及其划时代贡献,也指出了这一理论不可避免的时代局限;着重评述了自Shannon信息论问世以来信息科学在世界范围内的主要进步,特别强调了这一领域的巨大变革和质的飞跃──从统计信息理论到全信息理论,从信息传输到信息认知,从通信理论到智能科学.作者认为,人们应当在科学上作好充分的准备,去迎接信息时代的新阶段──智能科学时代的到来. 相似文献
4.
90年代末,一部《蓝色生死恋》让无数的大陆观众第一次见识了韩剧的威力,舒缓的节奏、凄美的爱情、标致的俊男美女,不论你怎么换台,都还是想扭头再多看两眼.…… 相似文献
5.
6.
机顶盒与电视机的"分体"状态导致的遥控问题一直备受关注,能否让数字电视的遥控更加简化,是关系到下一代机顶盒市场表现的关键。本文针对如何在机顶盒上实现一体化遥控的技术要点作了一些提示,以期为数字电视用户端设备的生产和运营提供帮助,从而拉动机顶盒的消费市场。 相似文献
7.
记得去年第12期《视听技术》上,有一篇介绍加拿大“音乐天使”(La Pieta)女子乐团的文章。该乐团去年10月来华,在上海举办两场别开生面的演出。此后,推出了一款名叫“魔怪小提琴”(Infernal Violins)的CD、DVD专辑(碟号:AN28723)的专辑。这款由拿索斯旗下ANALEKTA公司出版的影音新品,无论演奏、表演和录音录像,都给我们留下鲜明的印象。 相似文献
8.
9.
10.
11.
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdroppers . In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50% ; while the presented protocol is 58% . At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 相似文献
12.
Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks. 相似文献
13.
14.
Jing Huey Khor Widad Ismail Mohammed I. Younis M. K. Sulaiman Mohammad Ghulam Rahman 《Wireless Personal Communications》2011,59(1):17-26
This paper focuses on the security and privacy threats being faced by the low-cost RFID communication system, the most challenging
of which relate to eavesdropping, impersonation, and tag cloning problems. The security issues can be improved and solved
by utilizing both prevention and detection strategies. Prevention technique is needed since it offers resistance capabilities
toward eavesdroppers and impersonators. Detection technique is vital to minimize the negative effects of tag cloning threats.
This paper proposes the use of both prevention and detection techniques to make RFID communication more secure. Lightweight
cryptographic algorithm, which conforms to the EPC Class-1 Generation-2 standard, is used in the proposed mutual authentication
protocol for RFID system to raise security levels. In addition, electronic fingerprinting system is deployed in the proposed
solution as a detection method to distinguish counterfeit and legitimate tags. 相似文献
15.
并行组合扩频通信的数据调制映射法和安全通信协议方式* 总被引:5,自引:0,他引:5
并行组合扩频通信是一种高效率的新型扩频通信方式.本文提出了并行组合扩频通信的数据调制映射法,并以此为基础,给出了一种安全通信协议方式,既可作身份认证又有好的保密能力。 相似文献
16.
文章基于一种模块化的安全协议设计方法,定义了基本消息和基件的概念后,从研究安全协议的基件开始,将不同的基件适当复合后可得到具有特殊安全属性的组件,并运用BAN类逻辑对这些组件进行了形式化的分析。这些具有特殊安全属性的组件,在满足协议需求的同时,从底层开始保证了协议能够达到预期的安全目标,为安全协议的设计奠定了基础。 相似文献
17.
Secure message transmission in mobile ad hoc networks 总被引:1,自引:0,他引:1
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the mobile ad hoc networking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. In the open, collaborative MANET environment, practically any node can maliciously or selfishly disrupt and deny communication of other nodes. In this paper, we propose the secure message transmission (SMT) protocol to safeguard the data transmission against arbitrary malicious behavior of network nodes. SMT is a lightweight, yet very effective, protocol that can operate solely in an end-to-end manner. It exploits the redundancy of multi-path routing and adapts its operation to remain efficient and effective even in highly adverse environments. SMT is capable of delivering up to 83% more data messages than a protocol that does not secure the data transmission. Moreover, SMT achieves up to 65% lower end-to-end delays and up to 80% lower delay variability, compared with an alternative single-path protocol––a secure data forwarding protocol, which we term secure single path (SSP) protocol. Thus, SMT is better suited to support quality of service for real-time communications in the ad hoc networking environment. The security of data transmission is achieved without restrictive assumptions on the network nodes’ trust and network membership, without the use of intrusion detection schemes, and at the expense of moderate multi-path transmission overhead only. 相似文献
18.
19.
为了提高密钥分发效率,利用量子密集编码的原理设计了一种基于W态和Bell态纠缠的量子确定性密钥分发方案(Quantum Deterministic Key Distribution, QDKD)。方案中,消息发送者Alice通过对持有粒子实施幺正操作实现确定性密钥的编码,接收方Bob利用粒子间联合测量获得确定性密钥。除去用于窃听检测的粒子,制备的粒子全部用于消息传输,每发送5个粒子可以实现5bits确定性密钥的分发。最后,利用信息论方法对方案进行安全性分析,结果表明,方案是安全可靠的,任何窃听行为能够被及时发现。 相似文献
20.
In this paper, we propose a novel privacy‐preserving registration protocol that combines the verifier local revocation group signature with mobile IP. The protocol could achieve strong security guarantee, such as user anonymity via a robust temporary identity, local user revocation with untraceability support, and secure key establishment against home server and eavesdroppers. Various kinds of adversary attacks can be prevented by the proposed protocol, especially that deposit‐case attack does not work here. Meanwhile, a concurrent mechanism and a dynamical revocation method are designed to minimize the handover authentication delay and the home registration signals. The theoretical analysis and simulation results show that the proposed scheme could provide high security level besides lightweight computational cost and efficient communication performance. For instance, compared with Yang's scheme, the proposed protocol could decrease the falling speed of handover authentication delay up to about 40% with privacy being preserved. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献