期刊文献+
共找到208篇文章
< 1 2 11 >
每页显示 20 50 100
China’s Sea Lines of Communication Security: A Perspective from a Holistic Approach to National Security
1
作者 Wang Xu 《China International Studies》 2025年第4期31-68,共38页
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ... Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens. 展开更多
关键词 holistic approach economic securitythe citizen safety sea lines communication slocs security national security sea lines communication security economic security
在线阅读 下载PDF
A Communication Security Protocol of Mobile Agent System
2
作者 GUAN Huanmei ZHANG Huanguo +1 位作者 MENG Xuejun ZHANG Jingwei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第2期117-120,共4页
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication secu... The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent. 展开更多
关键词 mobile agent communication security multifactorauthentication encryption transmission
原文传递
vip Editorial Special Issue on Network and Communication Security
3
作者 Chin-Chen Chang Ming-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期193-194,共2页
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ... Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years. 展开更多
关键词 DATA vip Editorial Special Issue on Network and communication security very CHEN OVER
在线阅读 下载PDF
Announcing a Special Issue on Network and Communication Security
4
《Journal of Electronic Science and Technology》 CAS 2012年第1期93-93,共1页
Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and applicati... Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and application achievements in NCS. It is intended to highlight and summarize the major developments that have occurred over the past few years. Topic scopes to be covered include: 展开更多
关键词 Announcing a Special Issue on Network and communication security WILL NCS
在线阅读 下载PDF
Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security
5
作者 V.Sridhar K.V.Ranga Rao +4 位作者 Saddam Hussain Syed Sajid Ullah Roobaea Alroobaea Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2023年第1期1693-1708,共16页
NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic... NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods. 展开更多
关键词 Mobile network multivariate renkonen regression weighted preference bootstrap aggregation resource-aware secure data communication NOMA
在线阅读 下载PDF
Achieving high-security and massive-capacity optical communications based on orbital angular momentum configured chaotic laser
6
作者 Yanwei Cui Jianguo Zhang +2 位作者 Zhongquan Nie Anbang Wang Yuncai Wang 《Advanced Photonics Nexus》 2024年第4期92-100,共9页
Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challen... Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challenging to meet the demand for high-speed increasing communication rate.We theoretically propose and experimentally demonstrate a conceptual paradigm for orbital angular momentum(OAM)configured chaotic laser(OAM-CCL)that allows access to high-security and massivecapacity optical communications.Combining 11 OAM modes and an all-optical feedback chaotic laser,we are able to theoretically empower a well-defined optical communication system with a total transmission capacity of 100 Gb∕s and a bit error rate below the forward error correction threshold 3.8×10^(-3).Furthermore,the OAM-CCL-based communication system is robust to 3D misalignment by resorting to appropriate mode spacing and beam waist.Finally,the conceptual paradigm of the OAM-CCL-based communication system is verified.In contrast to existing systems(traditional free-space optical communication or chaotic optical communication),the OAM-CCL-based communication system has threein-one characteristics of high security,massive capacity,and robustness.The findings demonstrate that this will promote the applicable settings of chaotic laser and provide an alternative promising route to guide high-security and massive-capacity optical communications. 展开更多
关键词 chaotic secure communication orbital angular momentum configured chaotic laser high security massive capacity MISALIGNMENT
在线阅读 下载PDF
RIS Enabled Simultaneous Transmission and Key Generation with PPO:Exploring Security Boundary of RIS Phase Shift
7
作者 FAN Kaiqing YAO Yuze +2 位作者 GAO Ning LI Xiao JIN Shi 《ZTE Communications》 2025年第1期11-17,共7页
Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and... Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods. 展开更多
关键词 reconfigurable intelligent surfaces physical layer key generation integrated communications and security one-time pad deep reinforcement learning
在线阅读 下载PDF
Irregular IRS-aided SWIPT secure communication system with imperfect CSI
8
作者 Chunlong He Guanhai Lin +1 位作者 Chiya Zhang Xingquan Li 《Digital Communications and Networks》 2025年第3期878-885,共8页
The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of chan... The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS. 展开更多
关键词 Irregular intelligent reflecting surface Simultaneous wireless information and power TRANSFER Secure communication Topology optimization
在线阅读 下载PDF
Continuous-variable quantum secure direct communication based on N-APSK with Boltzmann-Maxwell distribution
9
作者 Zheng-Wen Cao Yu-Jie Zhang +4 位作者 Geng Chai Zhang-Tao Liang Xin-Lei Chen Lei Wang Yu-Jie Wang 《Chinese Physics B》 2025年第3期85-93,共9页
Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature... Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature components of the quantum states.Hence,high-speed random number generators are required to satisfy this demand,which is difficult to implement in practical applications.CVQSDC with discrete modulation(DM),correspondingly,employs a finite number of quantum states to achieve encoding,which can circumvent the shortcomings of the GM scheme.Based on the advantages of DM,the issue of attaining the most optimal secrecy capacity and communication distance remains to be resolved.Here,we propose a CVQSDC protocol based on N-symbol amplitude phase shift keying(N-APSK),which exploits the Boltzmann-Maxwell distribution assisted probability shaping technique.In comparison with the uniform distribution,according to 32-APSK CVQSDC,the proposed scheme extends the communication distance by about 38%,while obtaining a higher secrecy capacity at the same communication distance.Furthermore,increasing the value of N will concurrently increase the quantity of rings in the constellation,thereby facilitating enhancements of communication distance.This work incorporates the modulation approaches prevalently employed in classical communication into the realm of quantum communication,attaining gratifying advancements in communication distance and secrecy capacity,and concurrently facilitating the integrated development of quantum communication and classical communication. 展开更多
关键词 quantum secure direct communication discrete-modulation amplitude phase shift keying Boltzmann-Maxwell distribution
原文传递
Semantic Secure Communication Based on the Joint Source-Channel Coding
10
作者 Yifeng Lin Yuer Yang +2 位作者 Jianxiang Xie Tong Ji Peiya Li 《Computers, Materials & Continua》 2025年第8期2865-2882,共18页
Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the c... Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported. 展开更多
关键词 Secure semantic communication joint source-channel coding(JSCC) automaticed joint source-channel coding algorithm
在线阅读 下载PDF
Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppers
11
作者 Huang Hailong Mohsen Eskandari +1 位作者 Andrey V.Savkin Wei Ni 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期537-543,共7页
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco... We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations. 展开更多
关键词 Unmanned aerial systems(UASs) Unmanned aerial vehicle(UAV) communication security Eaves-dropping Reconfigurable intelligent surfaces(RIS) Autonomous navigation and placement Path planning Model predictive control
在线阅读 下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
12
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access communications security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
在线阅读 下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
13
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The security Analysis of Two-Step Quantum Direct communication Protocol in Collective-Rotation Noise Channel EPR
原文传递
Improving the security of secure deterministic communication scheme based on quantum remote state preparation
14
作者 秦素娟 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第2期73-76,共4页
The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all t... The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all the secret messages without being detected by an intercept-and-resend attack strategy. Furthermore, a possible improvement on this protocol is presented. It makes the modified protocol secure against this kind of attack. 展开更多
关键词 quantum secure direct communication CRYPTANALYSIS quantum cryptography security
原文传递
ZTE Communications Special Issue on Security and Privacy in Communications
15
《ZTE Communications》 2015年第3期41-41,共1页
Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communica... Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communication also introduces new challenges for the security of systems and processes and the privacy of individuals. There is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integ- rity, and availability of resources in modern communication. 展开更多
关键词 security ZTE communications Special Issue on security and Privacy in communications
在线阅读 下载PDF
System Design Of Security Evaluation For Data Link Communications
16
作者 Feng Haixun ZangYong 《International Journal of Technology Management》 2014年第7期46-47,共2页
Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal ... Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal communication functions.In this paper the author on the basis of many years of work experience, first discussed the establishment of a risk assessment system data link,then focused on the problem of index weight assessment.To data communication security, this research article will provide some references. 展开更多
关键词 Data link communications security AHP
在线阅读 下载PDF
Security for Industrial Communication Systems
17
《可编程控制器与工厂自动化(PLC FA)》 2006年第8期31-33,共3页
B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maint... B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be 展开更多
关键词 DCOM IEC 61850 In OPC security for Industrial communication Systems
在线阅读 下载PDF
Security for Industrial Communication Systems
18
《可编程控制器与工厂自动化(PLC FA)》 2006年第7期29-31,共3页
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti... B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi- 展开更多
关键词 security for Industrial communication Systems WORK PRO NODE
在线阅读 下载PDF
Security for Industrial Communication Systems
19
《可编程控制器与工厂自动化(PLC FA)》 2006年第9期26-27,共2页
D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sen... D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available. 展开更多
关键词 security for Industrial communication Systems In LINE
在线阅读 下载PDF
Physical Layer Security for Wireless and Quantum Communications
20
作者 Jinhong Yuan Yixian Yang Nanrun Zhou 《ZTE Communications》 2013年第3期1-2,共2页
his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issu... his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications. 展开更多
关键词 security Physical Layer security for Wireless and Quantum communications
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部