期刊文献+
共找到208篇文章
< 1 2 11 >
每页显示 20 50 100
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
1
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access communications security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
在线阅读 下载PDF
Achieving high-security and massive-capacity optical communications based on orbital angular momentum configured chaotic laser
2
作者 Yanwei Cui Jianguo Zhang +2 位作者 Zhongquan Nie Anbang Wang Yuncai Wang 《Advanced Photonics Nexus》 2024年第4期92-100,共9页
Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challen... Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challenging to meet the demand for high-speed increasing communication rate.We theoretically propose and experimentally demonstrate a conceptual paradigm for orbital angular momentum(OAM)configured chaotic laser(OAM-CCL)that allows access to high-security and massivecapacity optical communications.Combining 11 OAM modes and an all-optical feedback chaotic laser,we are able to theoretically empower a well-defined optical communication system with a total transmission capacity of 100 Gb∕s and a bit error rate below the forward error correction threshold 3.8×10^(-3).Furthermore,the OAM-CCL-based communication system is robust to 3D misalignment by resorting to appropriate mode spacing and beam waist.Finally,the conceptual paradigm of the OAM-CCL-based communication system is verified.In contrast to existing systems(traditional free-space optical communication or chaotic optical communication),the OAM-CCL-based communication system has threein-one characteristics of high security,massive capacity,and robustness.The findings demonstrate that this will promote the applicable settings of chaotic laser and provide an alternative promising route to guide high-security and massive-capacity optical communications. 展开更多
关键词 chaotic secure communication orbital angular momentum configured chaotic laser high security massive capacity MISALIGNMENT
在线阅读 下载PDF
China’s Sea Lines of Communication Security: A Perspective from a Holistic Approach to National Security
3
作者 Wang Xu 《China International Studies》 2025年第4期31-68,共38页
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ... Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens. 展开更多
关键词 holistic approach economic securitythe citizen safety sea lines communication slocs security national security sea lines communication security economic security
在线阅读 下载PDF
RIS Enabled Simultaneous Transmission and Key Generation with PPO:Exploring Security Boundary of RIS Phase Shift
4
作者 FAN Kaiqing YAO Yuze +2 位作者 GAO Ning LI Xiao JIN Shi 《ZTE Communications》 2025年第1期11-17,共7页
Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and... Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods. 展开更多
关键词 reconfigurable intelligent surfaces physical layer key generation integrated communications and security one-time pad deep reinforcement learning
在线阅读 下载PDF
System Design Of Security Evaluation For Data Link Communications
5
作者 Feng Haixun ZangYong 《International Journal of Technology Management》 2014年第7期46-47,共2页
Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal ... Data link communication requires data communication process must have reliability, availability, confidentiality, availability, integrity, non-repudiation, controllability.This has a great effect to ensure the normal communication functions.In this paper the author on the basis of many years of work experience, first discussed the establishment of a risk assessment system data link,then focused on the problem of index weight assessment.To data communication security, this research article will provide some references. 展开更多
关键词 Data link communications security AHP
在线阅读 下载PDF
ZTE Communications Special Issue on Security and Privacy in Communications
6
《ZTE Communications》 2015年第3期41-41,共1页
Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communica... Modern communication allows billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments. However, modern communication also introduces new challenges for the security of systems and processes and the privacy of individuals. There is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integ- rity, and availability of resources in modern communication. 展开更多
关键词 security ZTE communications Special Issue on security and Privacy in communications
在线阅读 下载PDF
Physical Layer Security for Wireless and Quantum Communications
7
作者 Jinhong Yuan Yixian Yang Nanrun Zhou 《ZTE Communications》 2013年第3期1-2,共2页
his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issu... his special issue is dedicated to security problems in wireless and quan-turn communications. Papers for this issue were invited, and after peer review, eight were selected for publication. The first part of this issue comprises four papers on recent advances in physical layer security forwireless networks. The second Part comprises another four papers on quantum com- munications. 展开更多
关键词 security Physical Layer security for Wireless and Quantum communications
在线阅读 下载PDF
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
8
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
Irregular IRS-aided SWIPT secure communication system with imperfect CSI
9
作者 Chunlong He Guanhai Lin +1 位作者 Chiya Zhang Xingquan Li 《Digital Communications and Networks》 2025年第3期878-885,共8页
The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of chan... The performance of traditional regular Intelligent Reflecting Surface(IRS)improves as the number of IRS elements increases,but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation.The Irregular Intelligent Reflecting Surface(IIRS)can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited.However,due to the lack of radio frequency chain in IRS,it is challenging for the Base Station(BS)to gather perfect Channel State Information(CSI),especially in the presence of Eavesdroppers(Eves).Therefore,in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer(SWIPT)secure communication system with imperfect CSI of BS-IIRS-Eves links,which is subject to the rate outage probability constraints of the Eves,the minimum rate constraints of the Information Receivers(IRs),the energy harvesting constraints of the Energy Receivers(ERs),and the topology matrix constraints.Afterward,the formulated nonconvex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method.Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS. 展开更多
关键词 Irregular intelligent reflecting surface Simultaneous wireless information and power TRANSFER Secure communication Topology optimization
在线阅读 下载PDF
Continuous-variable quantum secure direct communication based on N-APSK with Boltzmann-Maxwell distribution
10
作者 Zheng-Wen Cao Yu-Jie Zhang +4 位作者 Geng Chai Zhang-Tao Liang Xin-Lei Chen Lei Wang Yu-Jie Wang 《Chinese Physics B》 2025年第3期85-93,共9页
Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature... Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature components of the quantum states.Hence,high-speed random number generators are required to satisfy this demand,which is difficult to implement in practical applications.CVQSDC with discrete modulation(DM),correspondingly,employs a finite number of quantum states to achieve encoding,which can circumvent the shortcomings of the GM scheme.Based on the advantages of DM,the issue of attaining the most optimal secrecy capacity and communication distance remains to be resolved.Here,we propose a CVQSDC protocol based on N-symbol amplitude phase shift keying(N-APSK),which exploits the Boltzmann-Maxwell distribution assisted probability shaping technique.In comparison with the uniform distribution,according to 32-APSK CVQSDC,the proposed scheme extends the communication distance by about 38%,while obtaining a higher secrecy capacity at the same communication distance.Furthermore,increasing the value of N will concurrently increase the quantity of rings in the constellation,thereby facilitating enhancements of communication distance.This work incorporates the modulation approaches prevalently employed in classical communication into the realm of quantum communication,attaining gratifying advancements in communication distance and secrecy capacity,and concurrently facilitating the integrated development of quantum communication and classical communication. 展开更多
关键词 quantum secure direct communication discrete-modulation amplitude phase shift keying Boltzmann-Maxwell distribution
原文传递
Semantic Secure Communication Based on the Joint Source-Channel Coding
11
作者 Yifeng Lin Yuer Yang +2 位作者 Jianxiang Xie Tong Ji Peiya Li 《Computers, Materials & Continua》 2025年第8期2865-2882,共18页
Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the c... Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported. 展开更多
关键词 Secure semantic communication joint source-channel coding(JSCC) automaticed joint source-channel coding algorithm
在线阅读 下载PDF
Application of periodic orbit theory in chaos-based security analysis 被引量:3
12
作者 龙敏 丘水生 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第8期2254-2258,共5页
Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security an... Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys. 展开更多
关键词 periodic orbit theory secure communication chaos-based security analysis
原文传递
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
13
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "Ping-pong " protocol protocol security eavesdropping detection
在线阅读 下载PDF
RIS Assisted Dual-Function Radar and Secure Communications Based on Frequency-Shifted Chirp Spread Spectrum Index Modulation 被引量:2
14
作者 Xiaoping Jin Peng Zhang +2 位作者 Chuan Wan Dingyou Ma Yudong Yao 《China Communications》 SCIE CSCD 2023年第10期85-99,共15页
Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS... Reconfigurable intelligent surface(RIS)assisted dual-function radar communications(DFRC)system is a promising integrated sensing and communication(ISAC)technology for future 6G.In this paper,we propose a scheme of RIS-assisted DFRC system based on frequency shifted chirp spread spectrum index modulation(RDFI)for secure communications.The proposed RDFI achieves the sensing and transmission of target location information in its radar and communication modes,respectively.In both modes,the frequency-shifted chirp spread spectrum index modulation(FSCSS-IM)signal is used as the baseband signal for radar and communications,so that the signal sent by the radar also carries information.This scheme implements the RIS-assisted beamforming in the communication mode through the azimuth information of the target acquired in the radar mode,so that the signal received from the eavesdropper is distorted in amplitude and phase.In addition,this paper analyzes the radar measurement accuracy and communication security of the FSCSS-IM signal using ambiguity function and secrecy rate(SR)analysis,respectively.Simulation results show that RDFI achieves both excellent bit error rate(BER)performance and physical layer security of communications. 展开更多
关键词 index modulation secure communications ISAC DFRC reconfigurable intelligent surface
在线阅读 下载PDF
Nonlinear Masking and Iterative Learning Decryption for Secure Communications 被引量:1
15
作者 Ming-Xuan Sun 《International Journal of Automation and computing》 EI CSCD 2015年第3期297-306,共10页
Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking meth... Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method. 展开更多
关键词 Secure communication MASKING CONVERGENCE learning algorithms nonlinearities.
原文传递
Air-Ground Integrated Low-Energy Federated Learning for Secure 6G Communications 被引量:3
16
作者 WANG Pengfei SONG Wei +2 位作者 SUN Geng WEI Zongzheng ZHANG Qiang 《ZTE Communications》 2022年第4期32-40,共9页
Federated learning(FL)is a distributed machine learning approach that could provide secure 6G communications to preserve user privacy.In 6G communications,unmanned aerial vehicles(UAVs)are widely used as FL parameter ... Federated learning(FL)is a distributed machine learning approach that could provide secure 6G communications to preserve user privacy.In 6G communications,unmanned aerial vehicles(UAVs)are widely used as FL parameter servers to collect and broadcast related parameters due to the advantages of easy deployment and high flexibility.However,the challenge of limited energy restricts the populariza⁃tion of UAV-enabled FL applications.An airground integrated low-energy federated learning framework is proposed,which minimizes the overall energy consumption of application communication while maintaining the quality of the FL model.Specifically,a hierarchical FL framework is proposed,where base stations(BSs)aggregate model parameters updated from their surrounding users separately and send the aggregated model parameters to the server,thereby reducing the energy consumption of communication.In addition,we optimize the deploy⁃ment of UAVs through a deep Q-network approach to minimize their energy consumption for transmission as well as movement,thus improv⁃ing the energy efficiency of the airground integrated system.The evaluation results show that our proposed method can reduce the system en⁃ergy consumption while maintaining the accuracy of the FL model. 展开更多
关键词 federated learning 6G communications privacy preserving secure communication
在线阅读 下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
17
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel EPR
原文传递
A Communication Security Protocol of Mobile Agent System
18
作者 GUAN Huanmei ZHANG Huanguo +1 位作者 MENG Xuejun ZHANG Jingwei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第2期117-120,共4页
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication secu... The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent. 展开更多
关键词 mobile agent communication security multifactorauthentication encryption transmission
原文传递
vip Editorial Special Issue on Network and Communication Security
19
作者 Chin-Chen Chang Ming-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期193-194,共2页
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ... Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years. 展开更多
关键词 DATA vip Editorial Special Issue on Network and Communication security very CHEN OVER
在线阅读 下载PDF
Announcing a Special Issue on Network and Communication Security
20
《Journal of Electronic Science and Technology》 CAS 2012年第1期93-93,共1页
Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and applicati... Journal of Electronic Science and Technology (JEST) invites manuscript submissions in the area of Network and Communication Security (NCS). This special issue of JEST will focus on recent theoretical and application achievements in NCS. It is intended to highlight and summarize the major developments that have occurred over the past few years. Topic scopes to be covered include: 展开更多
关键词 Announcing a Special Issue on Network and Communication security WILL NCS
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部