理学 >>> 数学 信息科学与系统科学 物理学 化学 天文学 地球科学总论 大气科学 地球物理学 地理学 地质学 水文学 海洋科学 生物学 科学技术史
搜索结果: 1-15 共查到知识库 理学 security相关记录18条 . 查询时间(0.186 秒)
According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and prot...
Security of Personal Genome      Genome  Personal Genome       font style='font-size:12px;'> 2015/5/27
Our personal genome, which is the map of our DNA, is our ultimate source of identity, which should be given our highest concern for security. The primary approach used for securing any highly sensit...
Security of Personal Genome     Genome       font style='font-size:12px;'> 2015/1/9
Security of Personal Genome.
In order to analyse optical satellite images for maritime security issues in Near-Real-Time (NRT) an interactive graphical user interface (GUI) based on NASA World Wind was developed and is presented ...
We present new techniques for deriving preimage resistance bounds for block cipher based double-block-length, double-call hash functions. We give improved bounds on the preimage security of the three ...
Traditional network security protocols depend mainly on developing cryptographic schemes and on using biometric methods. These have led to several network security protocols that are unbreakable based...
This paper studies the throughput of large-scale decentralized wireless networks with informationtheoretic security constraints.
We deterministically crack the secure, statistical key exchange protocol based on feedback proposed by Pao-Lo Liu [ J. Lightwave Techology 27 (2009) pp. 5230-34]. The crack is ultimate and absolute be...
This paper provides a comprehensive review of the domain of physical layer security for wireless communications. The essential premise of physical-layer security is to enable the exchange of confiden...
The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example,...
We investigate fundamental properties of device independent security in quantum cryptography and show a one-to-one correspondence between extremal and secure probability distributions. This allows us ...
In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper.
In practical quantum key distribution (QKD) system, the state prepara-tion and measurement are imperfect comparing with the ideal BB84 proto-col, which are always state-dependent in practical realizat...
In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the HBB scheme presented by Hillery, Buˇzek and Berthiaume [Phys. Rev A 59, 1829 (1999)]. We ...
Motivated by how transaction amount constrain trading volume and price volatility in stock market, we, in this paper, study the relation between volume and price if amount of transaction is given. We ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...