期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Deepening National Security Reforms to Guarantee Consistent Advancement in Chinese Modernization
1
作者 Chen Xiangyang 《Contemporary International Relations》 2024年第6期4-24,共21页
Persistent efforts are needed to fully implement the guiding principles of the third plenary session of the 20th Communist Party of China(CPC)Central Committee and advance the reform of China's national security w... Persistent efforts are needed to fully implement the guiding principles of the third plenary session of the 20th Communist Party of China(CPC)Central Committee and advance the reform of China's national security work on the new journey that lies ahead.All of us in the Party should never forget our original aspiration.Since the advent of the new era,China has pushed forward and made remarkable achievements in reforming its national security work,undergoing a process of constant evolvement and continuous improvement.The third plenary session of the 18th CPC Central Committee could be deemed the starting point of comprehensively deepening reform in the new era,opening a new epoch for reforming and innovating China's national security work.It identified modernizing China's system and capacity for governance as the overall goal of further deepening reform comprehensively and,most significantly,made a historic decision to establish the National Security Commission,having far-reaching impacts.General Secretary Xi Jinping stressed pursuing a holistic approach to national security,which provides us with fundamental guidance for further reform.The new version of the National Security Law of the People's Republic of China fully covers China's national security system and will guide the improvement of its legal system for national security in the new era.The fourth plenary session of the 19th CPC Central Committee called for improving China's national security system in efforts to modernize the country's system and capacity for governance.The 20th CPC National Congress clarified the Party's central task on the new journey and made strategic plans for safeguarding Chinese modernization through modernizing the country's national security system and capacity.The third plenary session of the 20th CPC Central Committee carried forward the spirit of the above meetings,from the third plenary session of the 18th CPC Central Committee to the 20th CPC National Congress,reiterating the importance of further deepening reform comprehensively on the new journey,emphasizing national security as the foundation for advancing Chinese modernization,and setting out the road map and agenda for modernizing China's national security system and capacity in the next five years.Therefore,we must study and implement the guiding principles of the third plenary session of the 2Oth CPC Central Committee. 展开更多
关键词 Chinese modernization deepening reform comprehensively modernizing China's national security system and capacity third plenary session of the 20th CPC Central Committee
在线阅读 下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
2
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
在线阅读 下载PDF
A Wire-Line Secure Communication System Based on CCFD Self-Interference Cancellation
3
作者 LU Wenjian LIU Sanjun LAI Guohong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第6期507-512,共6页
This paper presents a design scheme of wire-line telephone system using self-interference(SI)cancellation technology in co-frequency co-time full-duplex(CCFD)system to realize absolute secure communication at the phys... This paper presents a design scheme of wire-line telephone system using self-interference(SI)cancellation technology in co-frequency co-time full-duplex(CCFD)system to realize absolute secure communication at the physical layer.This scheme can hide the target signal by skillfully releasing the high-power artificial noise to the whole link at the receiving node,and then make use of the receiver’s knowledge of the SI signal to achieve high dB SI cancellation with the help of analog domain SI cancellation technology in CCFD domain,so that the signal-to-noise ratio(SNR)received by the eavesdropper at any position of the link is far lower than that of the legitimate receiver,so as to realize the absolutely secure communication in the sense of Wyner principle.This paper not only puts forward the specific design scheme of absolutely secure communication telephone,but also analyzes the calculation of security capacity under different eavesdropping positions,different SI cancellation capability and different system parameters according to Shannon theory. 展开更多
关键词 co-frequency co-time full-duplex(CCFD) physical layer security self-interference cancellation security capacity wire-line communication
原文传递
Guaranteeing Wireless Communication Secrecy via a WFRFT-Based Cooperative System 被引量:19
4
作者 Fang Xiaojie Sha Xuejun Mei Lin 《China Communications》 SCIE CSCD 2015年第9期76-82,共7页
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti... In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity. 展开更多
关键词 weighted fractional Fourier trans-form(WFRFT) physical layer(PHY) security secrecy capacity
在线阅读 下载PDF
High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states 被引量:2
5
作者 FangZhou Wu GuoJian Yang +4 位作者 HaiBo Wang Jun Xiong Faris Alzahrani Aatef Hobiny FuGuo Deng 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第12期19-25,共7页
This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of phot... This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits.Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication.The QSDC protocol has good applications in the future quantum communication because of all these features. 展开更多
关键词 quantum secure direct communication high capacity hyperentanglement two-photon six-qubit systems decoy photons
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部