期刊文献+
共找到218篇文章
< 1 2 11 >
每页显示 20 50 100
China’s Sea Lines of Communication Security: A Perspective from a Holistic Approach to National Security
1
作者 Wang Xu 《China International Studies》 2025年第4期31-68,共38页
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ... Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens. 展开更多
关键词 holistic approach economic securitythe citizen safety sea lines communication slocs security national security sea lines communication security economic security
在线阅读 下载PDF
Irregular IRS-aided SWIPT secure communication system with imperfect CSI
2
作者 Chunlong He Guanhai Lin +1 位作者 Chiya Zhang Xingquan Li 《Digital Communications and Networks》 2025年第3期878-885,共8页
The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of chan... The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS. 展开更多
关键词 Irregular intelligent reflecting surface Simultaneous wireless information and power TRANSFER Secure communication Topology optimization
在线阅读 下载PDF
A Communication Security Protocol of Mobile Agent System
3
作者 GUAN Huanmei ZHANG Huanguo +1 位作者 MENG Xuejun ZHANG Jingwei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第2期117-120,共4页
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication secu... The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent. 展开更多
关键词 mobile agent communication security multifactorauthentication encryption transmission
原文传递
System Design Of Security Evaluation For Data Link Communications
4
作者 Feng Haixun ZangYong 《International Journal of Technology Management》 2014年第7期46-47,共2页
Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal ... Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal communication functions.In this paper the author on the basis of many years of work experience, first discussed the establishment of a risk assessment system data link,then focused on the problem of index weight assessment.To data communication security, this research article will provide some references. 展开更多
关键词 Data link communications security AHP
在线阅读 下载PDF
Security for Industrial Communication Systems
5
《可编程控制器与工厂自动化(PLC FA)》 2006年第8期31-33,共3页
B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maint... B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be 展开更多
关键词 DCOM IEC 61850 In OPC security for Industrial communication systems
在线阅读 下载PDF
Security for Industrial Communication Systems
6
《可编程控制器与工厂自动化(PLC FA)》 2006年第9期26-27,共2页
D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sen... D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available. 展开更多
关键词 security for Industrial communication systems In LINE
在线阅读 下载PDF
Security for Industrial Communication Systems
7
《可编程控制器与工厂自动化(PLC FA)》 2006年第7期29-31,共3页
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti... B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi- 展开更多
关键词 security for Industrial communication systems WORK PRO NODE
在线阅读 下载PDF
Security for Industrial Communication Systems
8
《可编程控制器与工厂自动化(PLC FA)》 2006年第10期26-27,共2页
E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost,... E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost, real-time performance, power consumption, and other constraints which are even more demanding than in large workstations. A reference discusses these aspects with the example of a thermostat con- 展开更多
关键词 security for Industrial communication systems In
在线阅读 下载PDF
Adaptive projective synchronization of unified chaotic systems and its application to secure communication 被引量:4
9
作者 胡满峰 徐振源 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第11期3231-3237,共7页
In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of diffe... In this paper, a simple adaptive linear feedback control method is proposed for controlling the scaling factor between two coupled unified chaotic systems to a desired value, based on the invarianee principle of differential equations. Under this control strategy, one can arbitrarily select the scaling factor. Numerical simulations are given to support the effectiveness of the proposed method and show the robustness against noise. Furthermore, a secure communication scheme based on the adaptive projective synchronization of unified chaotic systems is presented and numerical simulation shows its feasibility. 展开更多
关键词 projective synchronization adaptive control unified chaotic system secure communication
原文传递
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
10
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access communications security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
在线阅读 下载PDF
Henon CSK Secure Communication System Using Chaotic Turbo Codes 被引量:1
11
作者 周小林 Song +4 位作者 Wentao Liu Jianbo Luo Hanwen 《High Technology Letters》 EI CAS 2002年第3期48-51,共4页
In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. S... In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system. 展开更多
关键词 chaotic secure communication Henon CSK modulation/demodulation chaotic turbo codes
在线阅读 下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
12
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The security Analysis of Two-Step Quantum Direct communication Protocol in Collective-Rotation Noise Channel EPR
原文传递
vip Editorial Special Issue on Network and Communication Security
13
作者 Chin-Chen Chang Ming-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期193-194,共2页
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ... Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years. 展开更多
关键词 DATA vip Editorial Special Issue on Network and communication security very CHEN OVER
在线阅读 下载PDF
Achieving high-security and massive-capacity optical communications based on orbital angular momentum configured chaotic laser 被引量:1
14
作者 Yanwei Cui Jianguo Zhang +2 位作者 Zhongquan Nie Anbang Wang Yuncai Wang 《Advanced Photonics Nexus》 2024年第4期92-100,共9页
Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challen... Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challenging to meet the demand for high-speed increasing communication rate.We theoretically propose and experimentally demonstrate a conceptual paradigm for orbital angular momentum(OAM)configured chaotic laser(OAM-CCL)that allows access to high-security and massivecapacity optical communications.Combining 11 OAM modes and an all-optical feedback chaotic laser,we are able to theoretically empower a well-defined optical communication system with a total transmission capacity of 100 Gb∕s and a bit error rate below the forward error correction threshold 3.8×10^(-3).Furthermore,the OAM-CCL-based communication system is robust to 3D misalignment by resorting to appropriate mode spacing and beam waist.Finally,the conceptual paradigm of the OAM-CCL-based communication system is verified.In contrast to existing systems(traditional free-space optical communication or chaotic optical communication),the OAM-CCL-based communication system has threein-one characteristics of high security,massive capacity,and robustness.The findings demonstrate that this will promote the applicable settings of chaotic laser and provide an alternative promising route to guide high-security and massive-capacity optical communications. 展开更多
关键词 chaotic secure communication orbital angular momentum configured chaotic laser high security massive capacity MISALIGNMENT
在线阅读 下载PDF
A fractional-order chaotic Lorenz-based chemical system:Dynamic investigation,complexity analysis,chaos synchronization,and its application to secure communication
15
作者 Haneche Nabil Hamaizia Tayeb 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第12期223-235,共13页
Synchronization of fractional-order chaotic systems is receiving significant attention in the literature due to its applications in a variety of fields,including cryptography,optics,and secure communications.In this p... Synchronization of fractional-order chaotic systems is receiving significant attention in the literature due to its applications in a variety of fields,including cryptography,optics,and secure communications.In this paper,a three-dimensional fractional-order chaotic Lorenz model of chemical reactions is discussed.Some basic dynamical properties,such as stability of equilibria,Lyapunov exponents,bifurcation diagrams,Poincarémap,and sensitivity to initial conditions,are studied.By adopting the Adomian decomposition algorithm(ADM),the numerical solution of the fractional-order system is obtained.It is found that the lowest derivative order in which the proposed system exhibits chaos is q=0.694 by applying ADM.The result has been validated by the existence of one positive Lyapunov exponent and by employing some phase diagrams.In addition,the richer dynamics of the system are confirmed by using powerful tools in nonlinear dynamic analysis,such as the 0-1 test and C_(0)complexity.Moreover,modified projective synchronization has been implemented based on the stability theory of fractional-order systems.This paper presents the application of the modified projective synchronization in secure communication,where the information signal can be transmitted and recovered successfully through the channel.MATLAB simulations are provided to show the validity of the constructed secure communication scheme. 展开更多
关键词 chaotic system Adomian decomposition method modified projective synchronization secure communication
原文传递
Improving the security of secure deterministic communication scheme based on quantum remote state preparation
16
作者 秦素娟 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第2期73-76,共4页
The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all t... The security of the quantum secure deterministic communication scheme [Chin. Phys.16 (2007) 2549] is reexamined. A security loophole is pointed out. Taking advantage of this loophole, an eavesdropper can steal all the secret messages without being detected by an intercept-and-resend attack strategy. Furthermore, a possible improvement on this protocol is presented. It makes the modified protocol secure against this kind of attack. 展开更多
关键词 quantum secure direct communication CRYPTANALYSIS quantum cryptography security
原文传递
Secure Communication Scheme based on A New Hyperchaotic System
17
作者 Khaled Benkouider Aceng Sambas +2 位作者 Ibrahim Mohammed Sulaiman Mustafa Mamat Kottakkaran Sooppy Nisar 《Computers, Materials & Continua》 SCIE EI 2022年第10期1019-1035,共17页
This study introduces a new continuous time differential system,which contains ten terms with three quadratic nonlinearities.The new system can demonstrate hyperchaotic,chaotic,quasi-periodic,and periodic behaviors fo... This study introduces a new continuous time differential system,which contains ten terms with three quadratic nonlinearities.The new system can demonstrate hyperchaotic,chaotic,quasi-periodic,and periodic behaviors for its different parameter values.All theoretical and numerical analysis are investigated to confirm the complex hyperchaotic behavior of our proposed model using many tools that include Kaplan-Yorke dimension,equilibrium points stability,bifurcation diagrams,and Lyapunov exponents.By means of Multisim software,the authors also designed an electronic circuit to confirm our proposed systems’physical feasibility.MATLAB and Multisim simulation results excellently agree with each other,which validate the feasibility of our new ten terms hyperchaotic system and make it very desirable to use in different domains especially in chaotic-based communication.Furthermore,by employing the drive response synchronisation,we developed a secure communication strategy for the proposed system.Findings from the proposed scheme show that the proposed approach was successful in completing the encryption and decryption procedure. 展开更多
关键词 Hyperchaotic system SYNCHRONIZATION circuit design secure communication system
在线阅读 下载PDF
Announcing a Special Issue on Network and Communication Security
18
《Journal of Electronic Science and Technology》 CAS 2012年第1期93-93,共1页
Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and applicati... Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and application achievements in NCS. It is intended to highlight and summarize the major developments that have occurred over the past few years. Topic scopes to be covered include: 展开更多
关键词 Announcing a Special Issue on Network and communication security WILL NCS
在线阅读 下载PDF
Synchronization of spatiotemporal chaotic systems and application to secure communication of digital image
19
作者 王兴元 张娜 +1 位作者 任小丽 张永雷 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第2期125-132,共8页
Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled ma... Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled map lattices. Through the appropriate separation of the linear term from the nonlinear term of the spatiotemporal chaotic system, we set the nonlinear term as the coupling function and then we can achieve the synchronization of two coupled map lattices. After that, we implement the secure communication of digital image using this synchronization method. Then, the discrete characteristics of the nonlinear coupling spatiotemporal chaos are applied to the discrete pixel of the digital image. After the synchronization of both the communication parties, the receiver can decrypt the original image. Numerical simulations show the effectiveness and the feasibility of the proposed program. 展开更多
关键词 coupled map lattice projective synchronization digital image secure communication
原文传递
Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security
20
作者 V.Sridhar K.V.Ranga Rao +4 位作者 Saddam Hussain Syed Sajid Ullah Roobaea Alroobaea Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2023年第1期1693-1708,共16页
NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic... NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods. 展开更多
关键词 Mobile network multivariate renkonen regression weighted preference bootstrap aggregation resource-aware secure data communication NOMA
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部