咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 2 篇 仪器科学与技术
    • 2 篇 计算机科学与技术...
    • 1 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学

主题

  • 6 篇 communication se...
  • 1 篇 autonomous navig...
  • 1 篇 path planning
  • 1 篇 threshold crypto...
  • 1 篇 multifactorauthe...
  • 1 篇 impulsive delaye...
  • 1 篇 generalized hala...
  • 1 篇 key management
  • 1 篇 encryption trans...
  • 1 篇 cryptography
  • 1 篇 model predictive...
  • 1 篇 transform domain...
  • 1 篇 unmanned aerial ...
  • 1 篇 mobile agent
  • 1 篇 chaotic system
  • 1 篇 eaves-dropping
  • 1 篇 threshold signat...
  • 1 篇 global exponenti...
  • 1 篇 ad hoc network
  • 1 篇 mobile adhoc net...

机构

  • 1 篇 network center w...
  • 1 篇 institute of big...
  • 1 篇 computer center ...
  • 1 篇 the department o...
  • 1 篇 state key labora...
  • 1 篇 state key labora...
  • 1 篇 school of electr...
  • 1 篇 network center j...
  • 1 篇 school of comput...
  • 1 篇 data61 csiro aus...

作者

  • 1 篇 liyun xu
  • 1 篇 meng xuejun
  • 1 篇 wei ni
  • 1 篇 huang hailong
  • 1 篇 guo wei xiong zh...
  • 1 篇 xiong zhongwei
  • 1 篇 mohsen eskandari
  • 1 篇 andrey v.savkin
  • 1 篇 state key labora...
  • 1 篇 guo wei
  • 1 篇 guan huanmei
  • 1 篇 tong zhang
  • 1 篇 chao wen
  • 1 篇 zhang huanguo
  • 1 篇 zhang jingwei

语言

  • 4 篇 英文
  • 2 篇 中文
检索条件"主题词=communication security"
6 条 记 录,以下是1-10 订阅
排序:
Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppers
收藏 引用
Defence Technology(防务技术) 2024年 第1期31卷 537-543页
作者: Huang Hailong Mohsen Eskandari Andrey V.Savkin Wei Ni The Department of Aeronautical and Aviation Engineering The Hong Kong Polytechnic UniversityHong KongChina School of Electrical Engineering and Telecommunications University of New South WalesSydney2052Australia Data61 CSIROAustralia
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A communication security Protocol of Mobile Agent System
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第2期15卷 117-120页
作者: GUAN Huanmei ZHANG Huanguo MENG Xuejun ZHANG Jingwei Computer Center Wuhan University Wuhan 430072Hubei China School of Computer Wuhan University Wuhan 430072Hubei China State Key Laboratory of Software Engineering WuhanUniversity Wuhan 430072 Hubei China Network Center Wuhan University Wuhan 430072 HubeiChina
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication secu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Speech Encryption in Linear Canonical Transform Domain Based on Chaotic Dynamic Modulation
收藏 引用
Journal of Beijing Institute of Technology 2021年 第3期30卷 295-304页
作者: Liyun Xu Tong Zhang Chao Wen Institute of Big Data Science and Industry School of Computer and Information TechnologyShanxi UniversityTaiyuan 030006China
In order to transmit the speech information safely in the channel,a new speech encryp-tion algorithm in linear canonical transform(LCT)domain based on dynamic modulation of chaot-ic system is proposed.The algorithm fi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Enhance Confidentiality of Threshold Signature for MANET
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1533-1536页
作者: GUO Wei XIONG Zhongwei Network Center Jianghan University Wuhan 430056 Hubei China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China
The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the thr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Complex Threshold Key Management for Ad Hoc Network
Complex Threshold Key Management for Ad Hoc Network
收藏 引用
The 1st Chinese Conference on Trusted Computing and Information security
作者: GUO Wei, XIONG Zhong-wei, LI Zhi-tang College of Computer Science and Technology , Huazhong University of Science Technology, Wuhan 430074, Hubei, China State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, Hubei, China
<正> A complex threshold key management framework has been proposed, which can address the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation of the controller and participation no... 详细信息
来源: cnki会议 评论
An Extended Halanay Inequality and Its Applications in Secure communication
An Extended Halanay Inequality and Its Applications in Secur...
收藏 引用
第三十届中国控制会议
作者: WU Quanjun~(1,2),ZHANG Hua~(1,4),XIANG Lan~3,ZHOU Jin~1 1.Shanghai Institute of Applied Mathematics and Mechanics,Shanghai University,Shanghai 200072,P.R.China 2.Department of Mathematics and Physics,Shanghai University of Electric Power,Shanghai 200090,P.R.China 3.Department of Physics,School of Science,Shanghai University,Shanghai,200444,P.R.China 4.Department of Mathematics and Computer Science,Tongren College,Tongren 554300,P.R.China
<正>The main objective of this paper is to extend previous results on Halanay inequality for impulsive delayed dynamical systems.Based on the Razumikhin technique,a generalized Halanay differential inequality on imp... 详细信息
来源: cnki会议 评论