期刊文献+
共找到579篇文章
< 1 2 29 >
每页显示 20 50 100
QoS-Guaranteed Secure Multicast Routing Protocol for Satellite IP Networks Using Hierarchical Architecture 被引量:1
1
作者 Zhizhong Yin Long Zhang +2 位作者 Xianwei Zhou Peng Xu Yu Deng 《International Journal of Communications, Network and System Sciences》 2010年第4期355-363,共9页
Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite netwo... Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite network architecture including Geostationary Earth Orbit (GEO), Highly Elliptical Orbit (HEO), and Low Earth Orbit (LEO) satellite layers, which provides the near-global coverage with 24 hour uninterrupted over the areas varying from 75° S to 90° N. On the basis of the hierarchical architecture, we propose a QoS-guaranteed secure multicast routing protocol (QGSMRP) for satellite IP networks using the logical location concept to isolate the mobility of LEO and HEO satellites. In QGSMRP, we employ the asymmetric cryptography to secure the control messages via the pairwise key pre-distribution, and present a least cost tree (LCT) strategy to construct the multicast tree under the condition that the QoS constraints are guaranteed, aiming to minimize the tree cost. Simulation results show that the performance benefits of the proposed QGSMRP in terms of the end-to-end tree delay, the tree cost, and the failure ratio of multicasting connections by comparison with the conventional shortest path tree (SPT) strategy. 展开更多
关键词 SATELLITE networks security MULTICAST ROUTING Quality of Service HIERARCHICAL architecture
在线阅读 下载PDF
Research on IPv6 Transition Evolvement and Security Architecture of Smart Distribution Grid Data Communication System
2
作者 Xin Miao Xi Chen 《Journal of Energy and Power Engineering》 2012年第1期146-149,共4页
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe... Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems. 展开更多
关键词 Smart distribution grid data communication network IPV6 transition evolvement safety threaten security architecture.
在线阅读 下载PDF
Study of An Integrated Security Solution for Network Information System
3
作者 Yangqing Zhu 《通讯和计算机(中英文版)》 2006年第3期35-39,56,共6页
在线阅读 下载PDF
Cloud-Network-End Collaborative Security for Wireless Networks:Architecture,Mechanisms,and Applications
4
作者 Xiangyu Wang Jianfeng Ma 《Tsinghua Science and Technology》 2025年第1期18-33,共16页
The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advance... The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advancement of mobile networks,cloud computing,and Internet of Things,communication-computing integration and cloud-network integration have been important technical routes.As a result,the main application requirements of wireless networks have changed from data transmission to cloud-based information services.Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era,and secure semantic communication has become an important model.To address this issue,we propose a cloud-network-end collaborative security architecture.Firstly,we clarify security mechanisms for end system security,network connection security,and cloud services security,respectively.Next,based on the above three aspects,we elaborate on the connotation of cloud-network-end collaborative security.By giving example applications,including heterogeneous network secure convergence framework,unmanned system collaborative operations security framework,and space-air-ground integrated network security framework,we demonstrate the universality of the proposed architecture.Finally,we review the current research on end system security,network connection security,and cloud services security,respectively. 展开更多
关键词 wireless network security information services security secure semantic communication model cloud-network-end collaborative security architecture heterogeneous network secure convergence
原文传递
The Analysis of the Structure and Security of Home Control Subnet
5
作者 Chengyi WANG Yun ZHANG 《Wireless Sensor Network》 2009年第1期56-60,共5页
A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-... A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-atic analysis of the structure and function of home control subnet based on the general model of home net-work. The paper has also analyzed two types of major equipment, namely sub-gateways and terminal equip-ment. The major networking technology used in home control subnet is summarized and concluded. In com-bination with relationship among home control subnet, home network, as well as the outside main network, the paper has systematically studied various safety problems related to home control gateways and the possi-ble solutions to those problems have been made. 展开更多
关键词 HOME network HOME Control SUBNET network architecture network security
暂未订购
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
6
作者 Tala Talaei Khoei Hadjar Ould Slimane Naima Kaabouch 《Communications and Network》 2022年第4期119-170,共52页
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba... One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions. 展开更多
关键词 Smart Grid architecture Cyber-Attacks network security CONFIDENTIALITY Integrity Availability ACCOUNTABILITY Countermeasures Detection Techniques
在线阅读 下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
7
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security architecture
在线阅读 下载PDF
Navigating the Digital Twin Network landscape:A survey on architecture,applications,privacy and security 被引量:1
8
作者 Akshita Maradapu Vera Venkata Sai Chenyu Wang +1 位作者 Zhipeng Cai Yingshu Li 《High-Confidence Computing》 2024年第4期129-149,共21页
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization ... In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security. 展开更多
关键词 Digital Twin networks network architecture Privacy and security Federated learning Blockchain Internet of Vehicles 6G Supply chain
在线阅读 下载PDF
H-R网络安全系统结构
9
作者 李涛 李之棠 《计算机工程与科学》 CSCD 2003年第3期40-43,47,共5页
文章首先分析了等级式+环形体系结构的特点,并在此基础上提出分布式安全体系结构方案:H R网络安全系统结构。通过使用等级式结构,保证整个体系良好的可扩展性;通过使用安全令牌环协议(运行在环型结构中),提高体系结构的健壮性,并简单介... 文章首先分析了等级式+环形体系结构的特点,并在此基础上提出分布式安全体系结构方案:H R网络安全系统结构。通过使用等级式结构,保证整个体系良好的可扩展性;通过使用安全令牌环协议(运行在环型结构中),提高体系结构的健壮性,并简单介绍了安全令牌环协议的实现。最后对该体系结构进行了分析。 展开更多
关键词 h-r网络 网络安全系统 系统结构 计算机网络 防火墙
在线阅读 下载PDF
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth 被引量:2
10
作者 Lance Cleghorn 《Journal of Information Security》 2013年第3期144-149,共6页
The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many suppo... The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations. 展开更多
关键词 DEFENSE in DEPTH DEFENSE in BREADTH network DEFENSE security architecture DEFENSE METHODOLOGY Information ASSURANCE
暂未订购
A Secure Communication Framework for Drone Swarms in Autonomous Surveillance Operations
11
作者 Ahad Alotaibi Chris Chatwin Phil Birch 《Journal of Computer and Communications》 2024年第11期1-25,共25页
Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robu... Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robust security measures to protect against potential threats and ensure the integrity of operations. This research presents a novel secure architecture for a swarm of drones deployed on surveillance missions. Leveraging a reliable foundation established through Delaunay triangulation for communication among drones, this work introduces advanced security protocols to enhance the protection and integrity of the network. The architecture employs a mesh network topology connecting six drones, each configured for specific surveillance tasks, including perimeter monitoring, area scanning, thermal imaging, traffic observation, communication relay, and incident response. The mesh network design ensures extended coverage, redundancy, load balancing, and self-configuration, significantly improving reliability and resilience. Security validation was conducted using GNS3 and Ettercap, simulating various vulnerability scenarios. Comparative performance analysis between a classic drone network and the proposed secure mesh network demonstrates superior traffic management and robustness against potential attacks. The results underscore the architecture’s suitability for secure and reliable operations in critical surveillance environments. 展开更多
关键词 Drone Swarm security Mesh network architecture Surveillance Missions Vulnerability Testing GNS3 Simulation
在线阅读 下载PDF
云计算环境下多模态异构网络数据安全存储方法 被引量:4
12
作者 李晓静 杨秀杰 《现代电子技术》 北大核心 2025年第6期63-67,共5页
为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建... 为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建包括客户端、服务器端、云存储服务插件、元数据存储的私有云存储架构。私有云存储架构采用虚拟化加解密方式,运行基于匿名广播加密的数据加密算法,引入拉格朗日插值方法,利用数据对应的会话密钥实现多模态异构网络数据的安全存储。实验结果表明,所提方法能够高效地存储多模态异构网络数据,数据传输的吞吐量高于3 Mb/s,加解密耗时低,存储的完整性高。 展开更多
关键词 云计算环境 多模态 异构网络 数据安全 存储方法 匿名广播加密 云存储架构
在线阅读 下载PDF
SRv6与零信任融合的网络安全架构研究 被引量:1
13
作者 王强 杨宏 杨南 《通信技术》 2025年第6期651-660,共10页
随着网络技术的不断发展,网络安全面临着越来越多的挑战。传统的网络安全防护机制已经难以满足当前复杂多变的网络环境需求。基于IPv6的段路由(Segment Routing IPv6,SRv6)作为一种新型的网络协议,具有灵活的路径控制和可编程性等优势,... 随着网络技术的不断发展,网络安全面临着越来越多的挑战。传统的网络安全防护机制已经难以满足当前复杂多变的网络环境需求。基于IPv6的段路由(Segment Routing IPv6,SRv6)作为一种新型的网络协议,具有灵活的路径控制和可编程性等优势,为网络提供了更高效的路由和流量控制能力。零信任作为一种全新的安全理念,强调永不信任、持续验证和最小权限原则,颠覆了传统基于边界的安全模式。将两者结合,可构建更强大、灵活且适应动态环境的网络安全防护体系。通过分析其技术途径、设计方案、应用场景和面临的挑战,为未来网络安全的发展提供有益的参考。 展开更多
关键词 SRv6 零信任 网络安全架构 策略动态协同
在线阅读 下载PDF
6G网络安全架构展望
14
作者 马红兵 姚戈 +1 位作者 张曼君 徐雷 《中兴通讯技术》 北大核心 2025年第3期56-61,共6页
安全是保障网络稳定可靠的基石,在构建下一代移动通信网络的过程中,设计全面且先进的6G安全架构至关重要。分析了移动通信网安全演进规律和6G网络安全新需求,总结并归纳对于6G网络安全架构设计的启示,系统性设计了6G网络的安全域模型和... 安全是保障网络稳定可靠的基石,在构建下一代移动通信网络的过程中,设计全面且先进的6G安全架构至关重要。分析了移动通信网安全演进规律和6G网络安全新需求,总结并归纳对于6G网络安全架构设计的启示,系统性设计了6G网络的安全域模型和安全架构,为后续进一步探讨6G安全关键技术、推动6G安全产业发展提供指引和参考。 展开更多
关键词 6G网络 安全域 安全架构
在线阅读 下载PDF
无人集群的网络安全挑战与应对
15
作者 姜永广 许里 +1 位作者 丁锐 肖飞 《信息安全与通信保密》 2025年第3期68-76,共9页
无人集群在未来军事作战领域具有良好的应用前景,但同时也会面临强对抗的网络安全风险。首先,简述了常规无人装备的网络安全概念和防护措施,从无人集群的应用特点出发,详细分析了其在网络安全领域面临的低成本、易失控、网络复杂及运维... 无人集群在未来军事作战领域具有良好的应用前景,但同时也会面临强对抗的网络安全风险。首先,简述了常规无人装备的网络安全概念和防护措施,从无人集群的应用特点出发,详细分析了其在网络安全领域面临的低成本、易失控、网络复杂及运维困难4项新挑战;其次,提出了面向无人集群的网络安全防护框架,该框架包含了对控制站、通信网络和无人平台的防护功能部署和实施策略,继而分析了此框架下的两项亟待研究突破的重要关键技术;最后,对后续无人集群装备的网络安全技术发展提出了相关建议。 展开更多
关键词 无人集群 网络安全 无人机通信网络 安全防护架构
在线阅读 下载PDF
基于SDN的智慧校园自适应安全架构研究
16
作者 黄超 封旭 《软件》 2025年第6期18-21,共4页
随着智慧校园建设的推进,网络安全威胁展现出动态化与多样化交织的显著特征。传统的网络安全架构由于其静态化特征以及设备协同能力不足等问题,在应对实时变化的安全风险时存在明显困难。本文构建了一种基于软件定义网络(SDN)的智慧校... 随着智慧校园建设的推进,网络安全威胁展现出动态化与多样化交织的显著特征。传统的网络安全架构由于其静态化特征以及设备协同能力不足等问题,在应对实时变化的安全风险时存在明显困难。本文构建了一种基于软件定义网络(SDN)的智慧校园自适应安全架构。该架构借助SDN所具备的集中控制与可编程特性,实现安全策略的动态生成以及自动调整。从架构组成来看,其涵盖了基础设施层、智能控制层、安全服务层和应用层四个主要层次。通过对网络流量状况和安全态势的动态变化进行实时分析,该架构能够自适应地对安全策略做出相应调整,有效地提升了智慧校园网络的安全防护水平,为智慧校园的网络安全防护提供了具有创新性的解决方案。 展开更多
关键词 软件定义网络(SDN) 智慧校园 自适应安全架构 网络安全
在线阅读 下载PDF
新疆地震预警信息系统等保网络安全技术构架设计与实现
17
作者 王范霞 朱翔国 +2 位作者 刘东亚 马睿 赵立涵 《内陆地震》 2025年第1期53-61,共9页
依据等保2.0标准三级安全防护“一个中心,三重防护”的要求,分析新疆地震预警信息系统的安全防护需求以及可能面临的安全风险。提出新疆地震预警信息系统分区分域设计的网络安全技术构架设计方案。设计方案满足等保建设需求,体现新疆地... 依据等保2.0标准三级安全防护“一个中心,三重防护”的要求,分析新疆地震预警信息系统的安全防护需求以及可能面临的安全风险。提出新疆地震预警信息系统分区分域设计的网络安全技术构架设计方案。设计方案满足等保建设需求,体现新疆地震预警信息系统的综合网络安全防御能力。为保障新疆地震预警信息系统稳定运行,设计方案实际落地运行发挥网络安全防护效能。针对数据接入区、预警核心数据区、安全管理区以及地震预警信息紧急发布(DMZ)区等不同区域,给出安全策略配置建议。 展开更多
关键词 新疆地震预警信息系统 等级保护 网络安全技术 安全构架
在线阅读 下载PDF
基于零信任架构的高职院校校园网安全访问控制方法
18
作者 张超 《电脑与信息技术》 2025年第4期56-59,101,共5页
校园网的直接映射方式导致暴露的端口增多,且用户的身份状态是动态变化的,这增加了访问攻击的途径和校园网的风险值。为此,提出基于零信任架构的高职院校校园网安全访问控制方法。首先,根据零信任架构的设计理念,将校园网业务纳入统一管... 校园网的直接映射方式导致暴露的端口增多,且用户的身份状态是动态变化的,这增加了访问攻击的途径和校园网的风险值。为此,提出基于零信任架构的高职院校校园网安全访问控制方法。首先,根据零信任架构的设计理念,将校园网业务纳入统一管理,减少直接暴露在公网的业务系统数量,并通过构建用户身份认证机制,实现对用户身份的严格验证和动态管理。然后,根据用户的身份、职务和访问需求,评估校园网访问权限并做出动态调整,结合细粒度的权限管控策略,确保用户只能访问其权限范围内的资源。最后,执行校园网多层次安全访问控制,保证网络运行安全。实验结果表明,应用该方法后,校园网访问安全评估值介于0.90和0.98之间,说明该方法使校园网的安全性得到了显著提升。 展开更多
关键词 零信任架构 校园网 安全访问控制 用户身份
在线阅读 下载PDF
面向垂直行业应用的5G网络安全标准:现状与展望 被引量:3
19
作者 朱日丹 张子涵 +3 位作者 李文政 李嘉杰 许洪东 夏明华 《无线电通信技术》 北大核心 2025年第3期427-436,共10页
随着5G无线通信技术的快速发展,垂直行业应用正迎来前所未有的智能化转型机遇。5G技术凭借其高速率、低延迟和大规模连接的特性,为垂直行业的广泛应用提供了强大支持,暴露了在安全保护、信任模型以及系统开放能力等方面的潜在风险。深... 随着5G无线通信技术的快速发展,垂直行业应用正迎来前所未有的智能化转型机遇。5G技术凭借其高速率、低延迟和大规模连接的特性,为垂直行业的广泛应用提供了强大支持,暴露了在安全保护、信任模型以及系统开放能力等方面的潜在风险。深入分析了5G赋能垂直行业应用过程中面临的主要安全问题;详细梳理了5G网络安全架构的演进过程,重点讨论了从4G到5G的安全新特性以及3GPP安全标准体系的最新进展;提出了针对5G在垂直行业应用中的安全标准解决方案,旨在为行业提供科学、系统的安全保障框架;对未来基于AI的6G网络安全架构进行了展望。通过对现行网络安全标准的态势分析与对未来网络安全架构的技术展望,为5G技术的垂直行业应用提供了安全解决方案,为未来6G网络安全标准的制定提供了参考依据,有助于推动行业智能化转型过程中网络安全能力的提升。 展开更多
关键词 3GPP安全标准体系 5G无线通信 3GPP安全保障规范文档族 5G网络安全架构 内生安全
在线阅读 下载PDF
6G网络安全的架构与关键技术 被引量:1
20
作者 罗涵一 崔宝江 仝鑫 《中兴通讯技术》 北大核心 2025年第3期50-55,共6页
6G网络安全面临严峻挑战,尤其需应对5G固有的安全缺陷以及异构环境与量子计算带来的新型威胁。通过详细阐述6G网络安全需求及关键技术,系统性地梳理并分析了可信内生安全三层架构理念及其融合区块链、量子密钥分发与人工智能(AI)智能编... 6G网络安全面临严峻挑战,尤其需应对5G固有的安全缺陷以及异构环境与量子计算带来的新型威胁。通过详细阐述6G网络安全需求及关键技术,系统性地梳理并分析了可信内生安全三层架构理念及其融合区块链、量子密钥分发与人工智能(AI)智能编排等关键技术的应用,为构建面向未来的安全、可信的6G网络提供理论参考。 展开更多
关键词 6G网络 安全架构 量子通信 区块链
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部