咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 5 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 计算机科学与技术...
    • 2 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 核科学与技术
  • 6 篇 理学
    • 6 篇 物理学
    • 3 篇 天文学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 4 篇 军事学
    • 4 篇 军队指挥学

主题

  • 8 篇 eavesdropping de...
  • 3 篇 protocol securit...
  • 2 篇 "ping-pong" prot...
  • 2 篇 xor operation
  • 1 篇 butterfly networ...
  • 1 篇 secure quantum d...
  • 1 篇 five-particle cl...
  • 1 篇 ghz state
  • 1 篇 quantum key dist...
  • 1 篇 quantum key agre...
  • 1 篇 "ping-pong " pro...
  • 1 篇 classical xor op...
  • 1 篇 deterministic se...
  • 1 篇 qsdc
  • 1 篇 security analysi...
  • 1 篇 quantum cryptogr...
  • 1 篇 quantum network ...
  • 1 篇 quantum informat...
  • 1 篇 deterministic qu...
  • 1 篇 bell states

机构

  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 college of compu...
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 college of infor...
  • 1 篇 jiangsu collabor...
  • 1 篇 school of comput...
  • 1 篇 state key lab of...
  • 1 篇 school of electr...
  • 1 篇 technical assess...

作者

  • 3 篇 li jian
  • 2 篇 李剑
  • 2 篇 景博
  • 1 篇 郭晓静
  • 1 篇 guo xiaojing
  • 1 篇 li dan
  • 1 篇 jing bo
  • 1 篇 li leilei
  • 1 篇 昌燕
  • 1 篇 huang wei
  • 1 篇 song danjie
  • 1 篇 zhexi zhang
  • 1 篇 jin haifei
  • 1 篇 zhang yu
  • 1 篇 yang jiayu
  • 1 篇 金海菲
  • 1 篇 liu bin
  • 1 篇 闫丽丽
  • 1 篇 wen shuang
  • 1 篇 zhiguo qu

语言

  • 8 篇 英文
检索条件"主题词=eavesdropping detection"
8 条 记 录,以下是1-10 订阅
排序:
Controlling the key by choosing the detection bits in quantum cryptographic protocols
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 200-210页
作者: LIU Bin GAO Fei HUANG Wei LI Dan WEN QiaoYan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications College of Computer Science Chongqing University
eavesdropping detection is an indispensable process of most quantum cryptographic protocols. By publishing and comparing part of the shared bits, called as detection bits, the participants can check whether there exis... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Improved Security detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis
收藏 引用
China Communications 2011年 第3期8卷 170-179页
作者: 李剑 金海菲 景博 School of Computer Beijing University of Posts and Telecommunications Department of Computer Science Beijing Institute of Applied Meteorology
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [***.89,187902(2002) ].But the protocol was p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Deterministic Quantum Secure Direct Communication and Authentication Protocol Based on W-Class State
收藏 引用
Chinese Journal of Electronics 2018年 第2期27卷 276-280页
作者: LI Leilei ZHANG Yu WEN Shuang LI Na YANG Jiayu LI Jian School of Computer Science Beijing University of Posts and Telecommunications School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture
A Quantum secure direct communication(QSDC) and authentication protocol based on the W-class state is presented to enhance the efficiency of eavesdropping detection. In this protocol, the W-class state is used to tran... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Controlled Deterministic Secure Quantum Communication Protocol Based on Three-Particle GHZ States in X-Basis
收藏 引用
Communications in Theoretical Physics 2015年 第3期63卷 285-290页
作者: 昌燕 张仕斌 闫丽丽 韩桂华 College of Information Security Engineering Chengdu University of Information Technology
A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in *** X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are required,which m... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation
收藏 引用
Chinese Physics C 2012年 第1期36卷 31-36页
作者: 李剑 宋丹劼 郭晓静 景博 School of Computer Beijing University of Posts and Telecommunications Department of Computer Science Beijing Institute of Applied Meteorology
In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is *** five-particle cluster state is used to detect eavesdroppers... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2011年 第9期54卷 1612-1618页
作者: LI Jian JIN HaiFei JING Bo State Key Lab of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science Beijing Institute of Applied Meteorology Beijing 100029 China
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State
收藏 引用
China Communications 2012年 第1期9卷 111-116页
作者: Li Jian Guo Xiaojing Song Danjie Xie Feng Peng Yong School of Computer Beijing University of Posts and Telecommunications Beijing 100876 P. R. China Technical Assessment Research Laboratory China Information Technology Security Evaluation Center Beijing 100085 P R. China
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model
收藏 引用
Journal of Quantum Computing 2019年 第2期1卷 89-109页
作者: Zhexi Zhang Zhiguo Qu Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
How to establish a secure and efficient quantum network coding algorithm isone of important research topics of quantum secure communications. Based on thebutterfly network model and the characteristics of easy prepara... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论