期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
High Security Identity Tags Using Spiral Resonators
1
作者 Anju Pradeep S.Mridula P.Mohanan 《Computers, Materials & Continua》 SCIE EI 2016年第6期187-197,共11页
A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper.Spirals are well known metamaterial structures and thus capable of sharp resonance,and hence Spiral R... A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper.Spirals are well known metamaterial structures and thus capable of sharp resonance,and hence Spiral Resonators can serve as a good candidate for RF Identity Tags.The bit capacity of the proposed tag is 10 bits per sqcm.The prototype of the tag is fabricated on a low-cost substrate of dielectric constant 4.4 and loss tangent 0.02.The overall dimension of tag is 15.4 x 3 x 1.6mm3.Two methods for reading the tags are also discussed in this paper.Scope for bit enhancement is also provided. 展开更多
关键词 high security tag METAMATERIAL spiral resonator reader antenna
下载PDF
Design of secure operating systems with high security levels 被引量:5
2
作者 QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2 School of Software and Microelectronics, Peking University, Beijing 102600, China 3 Institute of Computing Technology, Navy, Beijing 100841, China 《Science in China(Series F)》 2007年第3期399-418,共20页
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process. 展开更多
关键词 secure operating systems with high security levels ARCHITECTURE security model covert channel analysis
原文传递
A hybrid biometric identification framework for high security applications 被引量:1
3
作者 Xuzhou LI Yilong YIN +2 位作者 Yanbin NING Gongping YANG Lei PAN 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第3期392-401,共10页
Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions... Research on biometrics for high security applica- tions has not attracted as much attention as civilian or foren- sic applications. Limited research and deficient analysis so far has led to a lack of general solutions and leaves this as a challenging issue. This work provides a systematic analy- sis and identification of the problems to be solved in order to meet the performance requirements for high security applica- tions, a double low problem. A hybrid ensemble framework is proposed to solve this problem. Setting an adequately high threshold for each matcher can guarantee a zero false accep- tance rate (FAR) and then use the hybrid ensemble framework makes the false reject rate (FRR) as low as possible. Three ex- periments are performed to verify the effectiveness and gener- alization of the framework. First, two fingerprint verification algorithms are fused. In this test only 10.55% of fingerprints are falsely rejected with zero false acceptance rate, this is sig- nificantly lower than other state of the art methods. Second, in face verification, the framework also results in a large re- duction in incorrect classification. Finally, assessing the per- formance of the framework on a combination of face and gait verification using a heterogeneous database show this frame- work can achieve both 0% false rejection and 0% false accep- tance simultaneously. 展开更多
关键词 biometric verification hybrid ensemble frame-work high security applications
原文传递
New capacity steadily commissioned, security management highly strengthened
4
《Electricity》 1998年第3期5-5,共1页
关键词 New capacity steadily commissioned security management highly strengthened
下载PDF
Achieving high-security and massive-capacity optical communications based on orbital angular momentum configured chaotic laser
5
作者 Yanwei Cui Jianguo Zhang +2 位作者 Zhongquan Nie Anbang Wang Yuncai Wang 《Advanced Photonics Nexus》 2024年第4期92-100,共9页
Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challen... Secure and high-speed optical communications are of primary focus in information transmission.Although it is widely accepted that chaotic secure communication can provide superior physical layer security,it is challenging to meet the demand for high-speed increasing communication rate.We theoretically propose and experimentally demonstrate a conceptual paradigm for orbital angular momentum(OAM)configured chaotic laser(OAM-CCL)that allows access to high-security and massivecapacity optical communications.Combining 11 OAM modes and an all-optical feedback chaotic laser,we are able to theoretically empower a well-defined optical communication system with a total transmission capacity of 100 Gb∕s and a bit error rate below the forward error correction threshold 3.8×10^(-3).Furthermore,the OAM-CCL-based communication system is robust to 3D misalignment by resorting to appropriate mode spacing and beam waist.Finally,the conceptual paradigm of the OAM-CCL-based communication system is verified.In contrast to existing systems(traditional free-space optical communication or chaotic optical communication),the OAM-CCL-based communication system has threein-one characteristics of high security,massive capacity,and robustness.The findings demonstrate that this will promote the applicable settings of chaotic laser and provide an alternative promising route to guide high-security and massive-capacity optical communications. 展开更多
关键词 chaotic secure communication orbital angular momentum configured chaotic laser high security massive capacity misalignment
下载PDF
Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network
6
作者 C. Bennila Thangammal D. Praveena P. Rangarajan 《Circuits and Systems》 2016年第8期1190-1198,共9页
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices... In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix. 展开更多
关键词 ENCRYPTION DECRYPTION Non-Square Matrices Low Energy high Secured Data Transmission
下载PDF
Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State 被引量:4
7
作者 纪兆旭 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期711-715,共5页
Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the ... Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP. 展开更多
关键词 quantum private comparison highly entangled six-qubit genuine state security
原文传递
High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states 被引量:2
8
作者 FangZhou Wu GuoJian Yang +4 位作者 HaiBo Wang Jun Xiong Faris Alzahrani Aatef Hobiny FuGuo Deng 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第12期19-25,共7页
This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of phot... This study proposes the first high-capacity quantum secure direct communication(QSDC) with two-photon six-qubit hyperentangled Bell states in two longitudinal momentum and polarization degrees of freedom(DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits.Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication.The QSDC protocol has good applications in the future quantum communication because of all these features. 展开更多
关键词 quantum secure direct communication high capacity hyperentanglement two-photon six-qubit systems decoy photons
原文传递
Single-Cycle Bit Permutations with MOMR Execution
9
作者 李佩露 杨骁 史志杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第5期577-585,共9页
Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of ope... Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations. 展开更多
关键词 PERMUTATION bit permutations CRYPTOGRAPHY cryptographic acceleration security multi-word operation datarich execution MOMR instruction set architecture ISA PROCESSOR high performance secure computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部