期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
High Security Identity Tags Using Spiral Resonators
1
作者 Anju Pradeep S.Mridula P.Mohanan 《Computers, Materials & Continua》 SCIE EI 2016年第6期187-197,共11页
A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper.Spirals are well known metamaterial structures and thus capable of sharp resonance,and hence Spiral R... A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper.Spirals are well known metamaterial structures and thus capable of sharp resonance,and hence Spiral Resonators can serve as a good candidate for RF Identity Tags.The bit capacity of the proposed tag is 10 bits per sqcm.The prototype of the tag is fabricated on a low-cost substrate of dielectric constant 4.4 and loss tangent 0.02.The overall dimension of tag is 15.4 x 3 x 1.6mm3.Two methods for reading the tags are also discussed in this paper.Scope for bit enhancement is also provided. 展开更多
关键词 high security tag METAMATERIAL spiral resonator reader antenna
在线阅读 下载PDF
Achieving high-security and massive-capacity optical communications based on orbital angular momentum configured chaotic laser
2
作者 Yanwei Cui Jianguo Zhang +2 位作者 Zhongquan Nie Anbang Wang Yuncai Wang 《Advanced Photonics Nexus》 2024年第4期92-100,共9页
Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challen... Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challenging to meet the demand for high-speed increasing communication rate.We theoretically propose and experimentally demonstrate a conceptual paradigm for orbital angular momentum(OAM)configured chaotic laser(OAM-CCL)that allows access to high-security and massivecapacity optical communications.Combining 11 OAM modes and an all-optical feedback chaotic laser,we are able to theoretically empower a well-defined optical communication system with a total transmission capacity of 100 Gb∕s and a bit error rate below the forward error correction threshold 3.8×10^(-3).Furthermore,the OAM-CCL-based communication system is robust to 3D misalignment by resorting to appropriate mode spacing and beam waist.Finally,the conceptual paradigm of the OAM-CCL-based communication system is verified.In contrast to existing systems(traditional free-space optical communication or chaotic optical communication),the OAM-CCL-based communication system has threein-one characteristics of high security,massive capacity,and robustness.The findings demonstrate that this will promote the applicable settings of chaotic laser and provide an alternative promising route to guide high-security and massive-capacity optical communications. 展开更多
关键词 chaotic secure communication orbital angular momentum configured chaotic laser high security massive capacity MISALIGNMENT
在线阅读 下载PDF
Design of secure operating systems with high security levels 被引量:5
3
作者 QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2 School of Software and Microelectronics, Peking University, Beijing 102600, China 3 Institute of Computing Technology, Navy, Beijing 100841, China 《Science in China(Series F)》 2007年第3期399-418,共20页
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process. 展开更多
关键词 secure operating systems with high security levels ARCHITECTURE security model covert channel analysis
原文传递
A hybrid biometric identification framework for high security applications 被引量:1
4
作者 Xuzhou LI Yilong YIN +2 位作者 Yanbin NING Gongping YANG Lei PAN 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第3期392-401,共10页
Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions... Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions and leaves this as a challenging issue. This work provides a systematic analy- sis and identification of the problems to be solved in order to meet the performance requirements for high security applica- tions, a double low problem. A hybrid ensemble framework is proposed to solve this problem. Setting an adequately high threshold for each matcher can guarantee a zero false accep- tance rate (FAR) and then use the hybrid ensemble framework makes the false reject rate (FRR) as low as possible. Three ex- periments are performed to verify the effectiveness and gener- alization of the framework. First, two fingerprint verification algorithms are fused. In this test only 10.55% of fingerprints are falsely rejected with zero false acceptance rate, this is sig- nificantly lower than other state of the art methods. Second, in face verification, the framework also results in a large re- duction in incorrect classification. Finally, assessing the per- formance of the framework on a combination of face and gait verification using a heterogeneous database show this frame- work can achieve both 0% false rejection and 0% false accep- tance simultaneously. 展开更多
关键词 biometric verification hybrid ensemble frame-work high security applications
原文传递
New capacity steadily commissioned, security management highly strengthened
5
《Electricity》 1998年第3期5-5,共1页
关键词 New capacity steadily commissioned security management highly strengthened
在线阅读 下载PDF
Three-dimensional dynamic probabilistic shaping high-security transmission scheme based on dual physical layer encryption for seven-core fibers
6
作者 Yaya Mao Bo Liu +7 位作者 Jingrui Huang Jianxin Ren Shuaidong Chen Xiangyu Wu Yongfeng Wu Xiumin Song Zhipeng Qi Jie Cui 《Chinese Optics Letters》 2025年第3期14-20,共7页
In this paper,a carrier-less amplitude and phase modulation passive optical network(CAP-PON)scheme is proposed based on dynamic probabilistic shaping(DPS)and Rubik’s cube encryption in optical access networks.The key... In this paper,a carrier-less amplitude and phase modulation passive optical network(CAP-PON)scheme is proposed based on dynamic probabilistic shaping(DPS)and Rubik’s cube encryption in optical access networks.The key is generated from a novel five-dimensional entangled chaos model for dynamic probabilistic shaping and Rubik’s cube encryption.To verify the performance of the encryption scheme,an experimental demonstration of 70 Gb/s(7×10 Gb/s)encrypted DPS-3D-CAP signal transmission over 2 km weakly coupled 7-core fiber is performed.The key space of the new five-dimensional entangled chaos model reaches 10173,and the interference level reaches 100%.Experimental results show that the receiver sensitivity increases by 1.47 dB compared to the conventional uniform 3D-CAP due to the introduction of dynamic probabilistic shaping. 展开更多
关键词 CAP-PON probabilistic shaping high security chaotic encryption
原文传递
High-security three-dimensional CAP modulation technique integrating end-to-end constellation optimization and four-level masking
7
作者 Juntao Zhang Bo Liu +9 位作者 Jianxin Ren Yaya Mao Xiangyu Wu Rahat Ullah Jie Cui Yilan Ma Jianye Zhao Dongdong Xu Shuaidong Chen Shuyu Zhou 《Chinese Optics Letters》 2025年第3期8-13,共6页
In this paper,a high-security three-dimensional carrierless amplitude and phase(3D-CAP)modulation technique is proposed,integrating deep learning with four-level masking.The 3D constellation geometry is optimized usin... In this paper,a high-security three-dimensional carrierless amplitude and phase(3D-CAP)modulation technique is proposed,integrating deep learning with four-level masking.The 3D constellation geometry is optimized using an autoencoder(AE)with an additive white Gaussian noise(AWGN)channel model,reducing complexity by 40%compared to a variational autoencoder(VAE).Experimental validation on a 2 km seven-core fiber intensity modulation/direct detection(IM/DD)system shows a 1 dB improvement in receiver sensitivity.A 3D chaotic oscillator model is used for chaotic selective mapping,polynomial-like masking,constellation rotation,and subcarrier masking.The encrypted 3D-CAP signal achieves a key space of up to 10^(103),with strong anti-noise and confidentiality performance. 展开更多
关键词 autoencoder geometric shaping high security:chaotic encryption
原文传递
Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State 被引量:5
8
作者 纪兆旭 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期711-715,共5页
Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the ... Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP. 展开更多
关键词 quantum private comparison highly entangled six-qubit genuine state security
原文传递
Photoisomerization manipulation for security covert photonic barcodes
9
作者 Kun Ge Juan Kang +1 位作者 Yi Li Le Wang 《Chinese Optics Letters》 2025年第9期74-78,共5页
Microscale covert photonic barcodes demonstrate exceptional potential in anti-counterfeiting and information security applications due to their advanced security characteristics.However,the current methods suffer from... Microscale covert photonic barcodes demonstrate exceptional potential in anti-counterfeiting and information security applications due to their advanced security characteristics.However,the current methods suffer from spectral overlap and low concealment of security,restricting encoding capacity and requiring a high security level.These inherent drawbacks significantly restrict both the encoding capacity and the achievable security level.Here,we proposed a strategy to construct the high-security photonic barcodes via photomerization manipulation based on an excited-state intramolecular proton transfer(ESIPT)process in dye-doped whispering gallery mode(WGM)microcavities.The WGM microcavity is composed of highly polarized organic intramolecular charge-transfer(ICT)dye molecules,which have two cooperative gain states.Moreover,the light-manipulated covert photonic barcodes have further been obtained through an ESIPT energy-level process between the trans-excited state and cis-excited state.The WGM lasing spectrum constitutes the fingerprint of the corresponding microsphere,which can be modulated through tuning the dimensions of the microspheres.These results offer a promising route for exploring the light-manipulated security platform for advanced information anticounterfeiting. 展开更多
关键词 photoisomerization manipulation high security covert photonic barcode whispering gallery mode anticounterfeiting
原文传递
High-rate self-referenced continuous-variable quantum key distribution over a high-loss free-space channel
10
作者 XIAOJUAN LIAO YUEHAN XU +4 位作者 QIJUN ZHANG PENG HUANG TAO WANG KAIZHI WANG GUIHUA ZENG 《Photonics Research》 2025年第9期2603-2617,共15页
The advent of quantum computers has significantly challenged the security of traditional cryptographic systems,prompting a surge in research on quantum key distribution(QKD).Among various QKD approaches,continuousvari... The advent of quantum computers has significantly challenged the security of traditional cryptographic systems,prompting a surge in research on quantum key distribution(QKD).Among various QKD approaches,continuousvariable QKD(CVQKD)offers superior resilience against background noise.However,the local local oscillator(LLO)CVQKD scheme faces substantial physical limitations in scenarios with high channel attenuation,and the large attenuation CVQKD remains unrealized.Bottleneck challenges include ensuring stable low-noise transmission and accurately estimating parameters under fluctuating channel conditions.We propose a continuousmode theoretical framework that provides an analytical method for time-varying quantum systems within a freespace channel.This framework can achieve high-fidelity LLO-CVQKD in free space without the need for complex,real-time frequency locking and transmittance calibration equipment.It can also enable free-space QKD under large attenuation and high repetition frequency.Through experimental validation,we first demonstrate high-rate secure quantum key distribution over high-loss free-space channels.Specifically,we achieve asymptotic key rates of 76.366 kbps and 403.896 kbps in 25 dB attenuation free-space channels without turbulence and 21.5 dB average attenuation free-space channels with turbulence,respectively.Additionally,we confirm the feasibility of experiments on mildly turbulent atmospheric channels spanning at least 10.5 km using current equipment.Our scheme provides direct insight into constructing an integrated air-ground quantum communication network. 展开更多
关键词 quantum key distribution qkd high loss free space channel high rate secure communication quantum key distribution quantum computers continuous variable qkd local oscillator atmospheric turbulence
原文传递
Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network
11
作者 C. Bennila Thangammal D. Praveena P. Rangarajan 《Circuits and Systems》 2016年第8期1190-1198,共9页
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices... In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix. 展开更多
关键词 ENCRYPTION DECRYPTION Non-Square Matrices Low Energy high Secured Data Transmission
在线阅读 下载PDF
High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states 被引量:2
12
作者 FangZhou Wu GuoJian Yang +4 位作者 HaiBo Wang Jun Xiong Faris Alzahrani Aatef Hobiny FuGuo Deng 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第12期19-25,共7页
This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of phot... This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits.Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication.The QSDC protocol has good applications in the future quantum communication because of all these features. 展开更多
关键词 quantum secure direct communication high capacity hyperentanglement two-photon six-qubit systems decoy photons
原文传递
Single-Cycle Bit Permutations with MOMR Execution
13
作者 李佩露 杨骁 史志杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第5期577-585,共9页
Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of ope... Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations. 展开更多
关键词 PERMUTATION bit permutations CRYPTOGRAPHY cryptographic acceleration security multi-word operation datarich execution MOMR instruction set architecture ISA PROCESSOR high performance secure computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部