Zobrazeno 1 - 10
of 176
pro vyhledávání: '"Yi-xian YANG"'
Publikováno v:
Frontiers in Physics, Vol 10 (2022)
Quantum multicast is a significant transmission mode in a multiparty communication scenario. Multisource collaboration can further enhance the efficient multicast. However, it remains a challenge to realize quantum multicast with a cooperative way in
Externí odkaz:
https://doaj.org/article/1201ce8811cf470180d06264f2be8981
Publikováno v:
IEEE Access, Vol 7, Pp 2811-2822 (2019)
We present an asymmetric controlled bidirectional remote preparation scheme under the control of Charlie, where Alice transmits an arbitrary single-qubit equatorial state to Bob and Bob transmits an arbitrary three-qubit equatorial state to Alice. Fi
Externí odkaz:
https://doaj.org/article/3eb16b05b6d844179997f8a5fbd41e4b
Publikováno v:
IEEE Access, Vol 7, Pp 13634-13642 (2019)
In this paper, we propose a scheme using a new kind of quantum walk to realize quantum communication well. In our scheme, obviously, there are three advantages. First, the initial states can be transferred from the source to the target by finite step
Externí odkaz:
https://doaj.org/article/a982d3f1647e4b45a608d6f45e7f8b66
Publikováno v:
IEEE Access, Vol 6, Pp 27205-27213 (2018)
Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computing attack seriously threatens the security of blockchain, and related research is still less. Targe
Externí odkaz:
https://doaj.org/article/cdc1d6e3e73e408b9ca44826ec38227c
Publikováno v:
Tongxin xuebao, Vol 38, Pp 102-112 (2017)
In order to take an active part in network attack and defense,a moving target defense solution on network layer based on OpenFlow was proposed,using the flexibility of network brought by OpenFlow network architecture.On the network layer,through mapp
Externí odkaz:
https://doaj.org/article/7de83022d2334fd6be1494f1ca134a75
Publikováno v:
Tongxin xuebao, Vol 38, Pp 64-75 (2017)
How to effectively protect the security of data sharing in WBAN was a key problem to be solved urgently.The traditional CP-ABE mechanism had a 〝one to many〝 data security communication function which was suitable for access control in WBAN,but it
Externí odkaz:
https://doaj.org/article/3a31cdba1ea34b4e881f227337a86d92
Publikováno v:
Tongxin xuebao, Vol 37, Pp 169-184 (2016)
Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the
Externí odkaz:
https://doaj.org/article/407c2b2db9fa4fbb893a1608ace649b8
Publikováno v:
Tongxin xuebao, Vol 37, Pp 87-95 (2016)
A privacy-preserving point-in-polygon protocol was proposed under semi-honest model, to deal with the prob-lem of high complexity and limitation of the existing protocols. First, an blivious point-line protocol was designed by extending the tradition
Externí odkaz:
https://doaj.org/article/cade8a2d86fd4ddbb0755aae9e318dbd
Publikováno v:
Tongxin xuebao, Vol 36, Pp 110-118 (2015)
In order to solve some existing problems on detecting malicious tampering by video watermarking based on H.264/AVC video compression standard,a semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy was proposed.To further imp
Externí odkaz:
https://doaj.org/article/67890b0fe8cf40a1a5639a97ab867078
Publikováno v:
Tongxin xuebao, Vol 36, Pp 135-144 (2015)
Current attack graph-based alert correlation cannot deal with graph relation between alerts properly,and a large number of redundant attack paths may arise when trying to find out missing alerts and predict future attacks.A multi-source alert analyzi
Externí odkaz:
https://doaj.org/article/738fce7f5f044ef6bdb28922a918c43f