首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1篇
  免费   2篇
无线电   2篇
自动化技术   1篇
  2012年   1篇
  2011年   2篇
排序方式: 共有3条查询结果,搜索用时 15 毫秒
1
1.
李剑  金海菲  景博 《中国通信》2011,8(3):170-179
In order to transmit the secure messages, a deterministic secure quantum direct communication protocol, called the “Ping pong” protocol was proposed by Bostrm and Felbinger \[Phys. Rev. Lett. 89, 187902 (2002)\]. But the protocol was proved to have many vulnerabilities, and can be attacked by eavesdroppers. To overcome the problem, an improved security detection strategy which inserts the 0〉,1〉,+〉 and-〉 particles into the messages as the decoy particles randomly in the “Ping pong” protocol is presented. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced. Because of the presence of the trap particles+〉and-〉, the detection rate will be no less than 25% when Eve attacks the communication. The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two, so the detection strategy in the protocol can ensure that the “Ping pong” protocol is more secure.  相似文献   
2.
3.
下一代网络安全问题战略对策研究   总被引:7,自引:7,他引:0  
文章为了全面分析下一代网络中的安全隐患,并提出相应的对策和建议,对下一代网络关键技术进行了全面深入地分析。在下一代网络潜在隐患的分析过程中,重点探讨了IPv6在PKI系统、IPv6协议自身的和IPv4向IPv6过渡过程中以及移动IPv6可能出现的隐患和风险,并分别提出了相应的对策和建议,从而保障中国下一代网路部署的顺利进行,维护国家安全。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号