搜索结果: 1-15 共查到“知识库 理学 security”相关记录18条 . 查询时间(0.186 秒)
EVALUATION OF ECOLOGICAL ENVIRONMENT SECURITY IN CONTIGUOUS POVERTY ALLEVIATION AREA OF SICHUAN PROVINCE
Ecological Environment Safety Contiguous Poverty Alleviation Area Ecological Environment Safety Assessment Analytic Hierarchy Process
font style='font-size:12px;'>
2018/5/16
According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and prot...
Security of Personal Genome
Genome Personal Genome
font style='font-size:12px;'>
2015/5/27
Our personal genome, which is the map of our DNA, is our ultimate source of identity,
which should be given our highest concern for security. The primary approach used for
securing any highly sensit...
Security of Personal Genome
Genome
font style='font-size:12px;'>
2015/1/9
Security of Personal Genome.
An Interative Grahical User Interface for Maritime Security Services
Graphical User Interface (GUI) NASA Worldwind Geo-Mapping Geographical Information Systems (GIS) Earth Observation (EO) Data Visualization
font style='font-size:12px;'>
2014/4/22
In order to analyse optical satellite images for maritime security issues in Near-Real-Time (NRT) an interactive graphical user interface (GUI) based on NASA World Wind was developed and is presented ...
The Preimage Security of Double-Block-Length Compression Functions
Hash Function Preimage Resistance Block Cipher Beyond Birthday Bound Foundations
font style='font-size:12px;'>
2012/12/4
We present new techniques for deriving preimage resistance bounds for block cipher based double-block-length, double-call hash functions. We give improved bounds on the preimage security of the three ...
SNEED: Enhancing Network Security Services Using Network Coding and Joint Capacity
Network Security Services Network Coding Joint Capacity
font style='font-size:12px;'>
2011/3/3
The Throughput Cost of Information-Theoretic Security in Decentralized Wireless Networks
Throughput Cost of Information-Theoretic Security Decentralized Wireless Networks
font style='font-size:12px;'>
2011/2/24
This paper studies the throughput of large-scale decentralized wireless networks with informationtheoretic security constraints.
Ultimate crack and lack of any security in the statistical key exchange protocol with random signals and feedback
Ultimate crack Quantum Physics
font style='font-size:12px;'>
2010/11/8
We deterministically crack the secure, statistical key exchange protocol based on feedback proposed by Pao-Lo Liu [ J. Lightwave Techology 27 (2009) pp. 5230-34]. The crack is ultimate and absolute be...
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
Principles of Physical Layer Security Multiuser Wireless Networks
font style='font-size:12px;'>
2010/11/22
This paper provides a comprehensive review of the domain of physical layer security for wireless communications. The essential premise of physical-layer security is to enable the exchange of confiden...
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
A Cyber Security Study SCADA Energy Management System
font style='font-size:12px;'>
2010/11/15
The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example,...
Extremal Quantum Correlations and Cryptographic Security
Extremal Quantum Correlations Cryptographic Security
font style='font-size:12px;'>
2010/10/29
We investigate fundamental properties of device independent security in quantum cryptography and show a one-to-one correspondence between extremal and secure probability distributions. This allows us ...
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
Robust Beamforming for Security MIMO Wiretap Channels
font style='font-size:12px;'>
2010/12/3
In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper.
Security of quantum key distribution with state-dependent imperfections
quantum key distribution state-dependent imperfection security
font style='font-size:12px;'>
2010/10/18
In practical quantum key distribution (QKD) system, the state prepara-tion and measurement are imperfect comparing with the ideal BB84 proto-col, which are always state-dependent in practical realizat...
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
font style='font-size:12px;'>
2010/10/21
In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the HBB scheme presented by Hillery, Buˇzek and Berthiaume [Phys. Rev A 59, 1829 (1999)]. We ...
Does Security Transaction Volume-Price Behavior Resemble a Probability Wave?
Price volatility Volume kurtosis Volume-price behavior Coherence Probability wave
font style='font-size:12px;'>
2010/4/27
Motivated by how transaction amount constrain trading volume and price volatility in stock market, we, in this paper, study the relation between volume and price if amount of transaction is given. We ...