Zobrazeno 1 - 10
of 320
pro vyhledávání: '"Zhang Huanguo"'
Autor:
ZHANG Huanguo, DU Ruiying
Publikováno v:
网络与信息安全学报, Vol 5, Iss 3, Pp 4-18 (2019)
With rapidly development of electronic information technology and industry, human society comes into information age. In the information age human lives and works in cyberspace. There for, it is the base requirement for human to ensure cyberspace sec
Externí odkaz:
https://doaj.org/article/21924e71943041238c23318b316ee3b8
Publikováno v:
IEEE Access, Vol 6, Pp 70820-70830 (2018)
Attackers exploit vulnerabilities to change RET gadget chains and control the order of program execution, threatening the security of software implementations. For example, memory overflow attacks and remote shellcode attacks will lead to the leak of
Externí odkaz:
https://doaj.org/article/d1617944956e4e22a18de9d8c4552fa2
Publikováno v:
In Computer Standards & Interfaces January 2025 91
Quantum information contained in single-particle states can be masked by mapping them to entangled states. In this paper, we consider entanglement swapping under the masking of quantum information. Our work can pave the way for developing the applica
Externí odkaz:
http://arxiv.org/abs/2111.08474
Entanglement and coherence protection are investigated using the dynamical map of three non-interacting qubits that are initially prepared as maximally entangled GHZ-like states coupled to external fields in solid-state and superconducting materials.
Externí odkaz:
http://arxiv.org/abs/2111.01747
We reconsider and modify the second secure multi-party quantum addition protocol proposed in our original work. We show that the protocol is an anonymous multi-party quantum addition protocol rather than a secure multi-party quantum addition protocol
Externí odkaz:
http://arxiv.org/abs/2110.13648
Publikováno v:
Zangi, S. M., Ji, Z. X., Ali, H., & Zhang, H. G. (2022). Decoherence Effects in a Three-Level System under Gaussian Process. Symmetry, 14(12), 2480
When subjected to a classical fluctuating field characterized by a Gaussian process, we examine the {purity} and coherence protection in a three-level quantum system. This symmetry of the three-level system is examined when the local random field is
Externí odkaz:
http://arxiv.org/abs/2107.13897
The purpose of quantum private comparison (QPC) is to solve "Tierce problem" using quantum mechanics laws, where the "Tierce problem" is to judge whether the secret data of two participants are equal under the condition of protecting data privacy. He
Externí odkaz:
http://arxiv.org/abs/2101.02054
Entanglement-measurement attack is a well-known attack in quantum cryptography. In quantum cryptography protocols, eavesdropping checking can resist this attack. There are two known eavesdropping checking methods. One is to use decoy photon technolog
Externí odkaz:
http://arxiv.org/abs/2012.14275