期刊文献+
共找到208篇文章
< 1 2 11 >
每页显示 20 50 100
China’s Sea Lines of Communication Security: A Perspective from a Holistic Approach to National Security
1
作者 Wang Xu 《China International Studies》 2025年第4期31-68,共38页
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ... Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens. 展开更多
关键词 holistic approach economic securitythe citizen safety sea lines communication slocs security national security sea lines communication security economic security
在线阅读 下载PDF
Irregular IRS-aided SWIPT secure communication system with imperfect CSI
2
作者 Chunlong He Guanhai Lin +1 位作者 Chiya Zhang Xingquan Li 《Digital Communications and Networks》 2025年第3期878-885,共8页
The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of chan... The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS. 展开更多
关键词 Irregular intelligent reflecting surface Simultaneous wireless information and power TRANSFER Secure communication Topology optimization
在线阅读 下载PDF
A fractional-order chaotic Lorenz-based chemical system:Dynamic investigation,complexity analysis,chaos synchronization,and its application to secure communication
3
作者 Haneche Nabil Hamaizia Tayeb 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第12期223-235,共13页
Synchronization of fractional-order chaotic systems is receiving significant attention in the literature due to its applications in a variety of fields,including cryptography,optics,and secure communications.In this p... Synchronization of fractional-order chaotic systems is receiving significant attention in the literature due to its applications in a variety of fields,including cryptography,optics,and secure communications.In this paper,a three-dimensional fractional-order chaotic Lorenz model of chemical reactions is discussed.Some basic dynamical properties,such as stability of equilibria,Lyapunov exponents,bifurcation diagrams,Poincarémap,and sensitivity to initial conditions,are studied.By adopting the Adomian decomposition algorithm(ADM),the numerical solution of the fractional-order system is obtained.It is found that the lowest derivative order in which the proposed system exhibits chaos is q=0.694 by applying ADM.The result has been validated by the existence of one positive Lyapunov exponent and by employing some phase diagrams.In addition,the richer dynamics of the system are confirmed by using powerful tools in nonlinear dynamic analysis,such as the 0-1 test and C_(0)complexity.Moreover,modified projective synchronization has been implemented based on the stability theory of fractional-order systems.This paper presents the application of the modified projective synchronization in secure communication,where the information signal can be transmitted and recovered successfully through the channel.MATLAB simulations are provided to show the validity of the constructed secure communication scheme. 展开更多
关键词 chaotic system Adomian decomposition method modified projective synchronization secure communication
原文传递
Achieving high-security and massive-capacity optical communications based on orbital angular momentum configured chaotic laser
4
作者 Yanwei Cui Jianguo Zhang +2 位作者 Zhongquan Nie Anbang Wang Yuncai Wang 《Advanced Photonics Nexus》 2024年第4期92-100,共9页
Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challen... Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challenging to meet the demand for high-speed increasing communication rate.We theoretically propose and experimentally demonstrate a conceptual paradigm for orbital angular momentum(OAM)configured chaotic laser(OAM-CCL)that allows access to high-security and massivecapacity optical communications.Combining 11 OAM modes and an all-optical feedback chaotic laser,we are able to theoretically empower a well-defined optical communication system with a total transmission capacity of 100 Gb∕s and a bit error rate below the forward error correction threshold 3.8×10^(-3).Furthermore,the OAM-CCL-based communication system is robust to 3D misalignment by resorting to appropriate mode spacing and beam waist.Finally,the conceptual paradigm of the OAM-CCL-based communication system is verified.In contrast to existing systems(traditional free-space optical communication or chaotic optical communication),the OAM-CCL-based communication system has threein-one characteristics of high security,massive capacity,and robustness.The findings demonstrate that this will promote the applicable settings of chaotic laser and provide an alternative promising route to guide high-security and massive-capacity optical communications. 展开更多
关键词 chaotic secure communication orbital angular momentum configured chaotic laser high security massive capacity MISALIGNMENT
在线阅读 下载PDF
A Communication Security Protocol of Mobile Agent System
5
作者 GUAN Huanmei ZHANG Huanguo +1 位作者 MENG Xuejun ZHANG Jingwei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第2期117-120,共4页
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication secu... The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent. 展开更多
关键词 mobile agent communication security multifactorauthentication encryption transmission
原文传递
System Design Of Security Evaluation For Data Link Communications
6
作者 Feng Haixun ZangYong 《International Journal of Technology Management》 2014年第7期46-47,共2页
Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal ... Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal communication functions.In this paper the author on the basis of many years of work experience, first discussed the establishment of a risk assessment system data link,then focused on the problem of index weight assessment.To data communication security, this research article will provide some references. 展开更多
关键词 Data link communications security AHP
在线阅读 下载PDF
RIS Enabled Simultaneous Transmission and Key Generation with PPO:Exploring Security Boundary of RIS Phase Shift
7
作者 FAN Kaiqing YAO Yuze +2 位作者 GAO Ning LI Xiao JIN Shi 《ZTE Communications》 2025年第1期11-17,共7页
Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and... Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods. 展开更多
关键词 reconfigurable intelligent surfaces physical layer key generation integrated communications and security one-time pad deep reinforcement learning
在线阅读 下载PDF
Secure communication for UAV two-way relay networks
8
作者 Tong ZHANG Bo LI +1 位作者 Guanyi CHEN Gang WANG 《Chinese Journal of Aeronautics》 2025年第10期71-83,共13页
Non-Orthogonal Multiple Access(NOMA)in Unmanned Aerial Vehicle(UAV)-assisted communications is a promising technique in future wireless networks.However,for UAV-assisted communication systems,secure and covert communi... Non-Orthogonal Multiple Access(NOMA)in Unmanned Aerial Vehicle(UAV)-assisted communications is a promising technique in future wireless networks.However,for UAV-assisted communication systems,secure and covert communication is crucial for maintaining confidentiality in battlefield environments.This study focuses on a novel two-way relaying system assisted by the UAV,leveraging Power Domain NOMA(PD-NOMA),trajectory design,and power allocation strategies to enhance secure communication rates.A PD-NOMA scheme is proposed for the half-duplex two-way UAV relay,utilizing the advantage of Air-to-Ground(A2G)channel.The covert communication scheme is proposed based on the proposed NOMA scheme.A method using permutation matrices is proposed to dynamically adjust the NOMA decoding order based on the UAV trajectory and communication power levels,to reduce complexity while ensuring information causality constraints.A low-interference jamming strategy is proposed for the system for covertness communication.Because of the non-convexity of the problem,the power allocation and trajectory design problem are solved with Difference of Convex(DC)programming and Successive Convex Approximation(SCA).The schemes of jointly designing the NOMA order,allocating the communication power,and designing the trajectory are proposed to maximize the minimum secure communication data rate.Simulation results show that the proposed NOMA-UAV secure communication schemes outperform the benchmarks of the conventional Orthogonal Multiple Access(OMA)method. 展开更多
关键词 Secure communication Multiple access interference Unmanned Aerial Vehicle(UAV) Power management TELEcommunication
原文传递
Special Issue:Secure and Covert-UAV-aided Communication
9
《Chinese Journal of Aeronautics》 2025年第10期I0001-I0001,共1页
Unmanned Aerial Vehicle(UAV)-aided communication holds great potential to enhance the transmission performance.However,the information security remains a fundamental requirement due to the high possibilities of line-o... Unmanned Aerial Vehicle(UAV)-aided communication holds great potential to enhance the transmission performance.However,the information security remains a fundamental requirement due to the high possibilities of line-of-sight links and the broadcast nature. 展开更多
关键词 unmanned aerial vehicle broadcast nature information security enhance transmission performancehoweverthe uav aided communication secure communication covert communication line sight links
原文传递
Security for Industrial Communication Systems
10
《可编程控制器与工厂自动化(PLC FA)》 2006年第9期26-27,共2页
D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sen... D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available. 展开更多
关键词 security for Industrial communication systems In LINE
在线阅读 下载PDF
Continuous-variable quantum secure direct communication based on N-APSK with Boltzmann-Maxwell distribution
11
作者 Zheng-Wen Cao Yu-Jie Zhang +4 位作者 Geng Chai Zhang-Tao Liang Xin-Lei Chen Lei Wang Yu-Jie Wang 《Chinese Physics B》 2025年第3期85-93,共9页
Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature... Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature components of the quantum states.Hence,high-speed random number generators are required to satisfy this demand,which is difficult to implement in practical applications.CVQSDC with discrete modulation(DM),correspondingly,employs a finite number of quantum states to achieve encoding,which can circumvent the shortcomings of the GM scheme.Based on the advantages of DM,the issue of attaining the most optimal secrecy capacity and communication distance remains to be resolved.Here,we propose a CVQSDC protocol based on N-symbol amplitude phase shift keying(N-APSK),which exploits the Boltzmann-Maxwell distribution assisted probability shaping technique.In comparison with the uniform distribution,according to 32-APSK CVQSDC,the proposed scheme extends the communication distance by about 38%,while obtaining a higher secrecy capacity at the same communication distance.Furthermore,increasing the value of N will concurrently increase the quantity of rings in the constellation,thereby facilitating enhancements of communication distance.This work incorporates the modulation approaches prevalently employed in classical communication into the realm of quantum communication,attaining gratifying advancements in communication distance and secrecy capacity,and concurrently facilitating the integrated development of quantum communication and classical communication. 展开更多
关键词 quantum secure direct communication discrete-modulation amplitude phase shift keying Boltzmann-Maxwell distribution
原文传递
Semantic Secure Communication Based on the Joint Source-Channel Coding
12
作者 Yifeng Lin Yuer Yang +2 位作者 Jianxiang Xie Tong Ji Peiya Li 《Computers, Materials & Continua》 2025年第8期2865-2882,共18页
Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the c... Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported. 展开更多
关键词 Secure semantic communication joint source-channel coding(JSCC) automaticed joint source-channel coding algorithm
在线阅读 下载PDF
Optimization for UA V-mounted active RIS assisted multi-user communication in the presence of multiple eavesdroppers
13
作者 Qiangqiang YANG Zhiyu HUANG +3 位作者 Yufeng CHEN Hongwen YU Zhichao SHENG Yong FANG 《Chinese Journal of Aeronautics》 2025年第10期230-244,共15页
This paper explores a UAV-mounted active Reconfigurable Intelligent Surface(aRIS)network designed to enhance secure downlink communication for multiple users while mitigating the impact of multiple Eavesdroppers(EVs).... This paper explores a UAV-mounted active Reconfigurable Intelligent Surface(aRIS)network designed to enhance secure downlink communication for multiple users while mitigating the impact of multiple Eavesdroppers(EVs).The focus is on optimizing the UAV’s trajectory,the Base Station’s(BS)transmit beamforming,and the power-Amplified Programmable Reflecting Elements(APREs)of the aRIS to maximize the minimum secrecy rate in the presence of EVs.This is a complex non-convex problem due to multiple optimization variables,high-dimensional matrix operations,and log-determinant objective functions,which makes it challenging to solve.Hence,a Successive Convex Approximation(SCA)-based optimization strategy is developed to efficiently solve the subproblems related to the UAV’s trajectory,aRIS’s APREs,and BS’s beamforming.By leveraging slack variables and approximation techniques,we solve the nonconvex subproblems by a sequence of convex subproblems.Simulation results demonstrate that the proposed UAV-aRIS network significantly outperforms its passive RIS counterpart in improving communication security,highlighting the effectiveness of the optimization strategy. 展开更多
关键词 Active Reconfigurable Intelligent Surface(aRIS) Alternative optimization Secure communication Successive Convex Approximation(SCA) Unmanned Aerial Vehicle(UAV)
原文传递
Security for Industrial Communication Systems
14
《可编程控制器与工厂自动化(PLC FA)》 2006年第8期31-33,共3页
B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maint... B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be 展开更多
关键词 DCOM IEC 61850 In OPC security for Industrial communication systems
在线阅读 下载PDF
Security for Industrial Communication Systems
15
《可编程控制器与工厂自动化(PLC FA)》 2006年第7期29-31,共3页
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti... B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi- 展开更多
关键词 security for Industrial communication systems WORK PRO NODE
在线阅读 下载PDF
Security for Industrial Communication Systems
16
《可编程控制器与工厂自动化(PLC FA)》 2006年第10期26-27,共2页
E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost,... E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost, real-time performance, power consumption, and other constraints which are even more demanding than in large workstations. A reference discusses these aspects with the example of a thermostat con- 展开更多
关键词 security for Industrial communication systems In
在线阅读 下载PDF
Adaptive projective synchronization of unified chaotic systems and its application to secure communication 被引量:4
17
作者 胡满峰 徐振源 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第11期3231-3237,共7页
In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of diffe... In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility. 展开更多
关键词 projective synchronization adaptive control unified chaotic system secure communication
原文传递
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
18
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access communications security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
在线阅读 下载PDF
Henon CSK Secure Communication System Using Chaotic Turbo Codes 被引量:1
19
作者 周小林 Song +4 位作者 Wentao Liu Jianbo Luo Hanwen 《High Technology Letters》 EI CAS 2002年第3期48-51,共4页
In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. S... In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system. 展开更多
关键词 chaotic secure communication Henon CSK modulation/demodulation chaotic turbo codes
在线阅读 下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
20
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The security Analysis of Two-Step Quantum Direct communication Protocol in Collective-Rotation Noise Channel EPR
原文传递
上一页 1 2 11 下一页 到第
使用帮助 返回顶部