Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Huan-guo ZHANG"'
Publikováno v:
Symmetry, Vol 14, Iss 12, p 2480 (2022)
When subjected to a classical fluctuating field characterized by a Gaussian process, we examine the purity and coherence protection in a three-level quantum system. This symmetry of the three-level system is examined when the local random field is in
Externí odkaz:
https://doaj.org/article/aaf2b314afe54f9dbc18dc56cdc8cfee
Publikováno v:
网络与信息安全学报, Vol 3, Pp 25-34 (2017)
The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of th
Externí odkaz:
https://doaj.org/article/be96f3439fb44b4db53c3bdaf84cc172
Publikováno v:
Tongxin xuebao, Vol 38, Pp 65-75 (2017)
The virtual machine may face the problem of information leakage in live migration.Therefore,a dynamic memory protection technique SGX was introduced and a security enhancement live migration method based on KVM environment was proposed.Firstly,on bot
Externí odkaz:
https://doaj.org/article/7728493c56d049bfbcef81563b032474
Autor:
Guo-xiang HU, Huan-guo ZHANG
Publikováno v:
Tongxin xuebao, Vol 37, Pp 99-106 (2016)
The Hamming weight hierarchy of a linear [n,k;q] code c over GF(q)is the sequence(d1,d2,…,dk),where dr is the smallest support weight of an r-dimensional subcode of c.According to some new necessary conditions,the VI class Hamming weight hierarchie
Externí odkaz:
https://doaj.org/article/bd2d189012174791875a516872a98ced
Publikováno v:
Tongxin xuebao, Vol 36, Pp 66-77 (2015)
According to the characteristics of hierarchical event source-location privacy (SLP) in wireless sensor networks (WSN).Firstly,the effect of the cluster size and the statistical property of fake packet injection on the privacy,latency and network tra
Externí odkaz:
https://doaj.org/article/f517fc9b504f400388ff38a8b09540f6
Publikováno v:
Tongxin xuebao, Vol 35, Pp 99-111 (2014)
Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,wh
Externí odkaz:
https://doaj.org/article/195098efc2ab49d1be78b60700a8ba25
Autor:
Xi GUO, Huan-guo ZHANG
Publikováno v:
Tongxin xuebao, Vol 33, Pp 35-43 (2012)
Aim to the problem of status space explosion due to the growing number of status transition of large scale software system,a reduced test suite generation approach based on predicate abstraction was proposed,which divided the status space of the soft
Externí odkaz:
https://doaj.org/article/5de46123b5294c20a6172153fccbd9d7
Publikováno v:
Tongxin xuebao, Vol 33, Pp 30-35 (2012)
Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network enco
Externí odkaz:
https://doaj.org/article/e81b7c12b49b47ea8d4d7fea3186f39f
Publikováno v:
The European Physical Journal Plus. 137
Publikováno v:
Symmetry; Volume 14; Issue 12; Pages: 2480
When subjected to a classical fluctuating field characterized by a Gaussian process, we examine the purity and coherence protection in a three-level quantum system. This symmetry of the three-level system is examined when the local random field is in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a30f6d4980472c251c2ded0ce079a6fd
http://arxiv.org/abs/2107.13897
http://arxiv.org/abs/2107.13897