您的位置: 专家智库 > >

国家自然科学基金(61272057)

作品数:5 被引量:14H指数:3
发文基金:国家自然科学基金北京市自然科学基金国家教育部博士点基金更多>>
相关领域:理学自动化与计算机技术电子电信机械工程更多>>

文献类型

  • 5篇期刊文章
  • 3篇会议论文

领域

  • 5篇自动化与计算...
  • 4篇电子电信
  • 3篇理学
  • 1篇机械工程

主题

  • 2篇SCHEME
  • 2篇WSN
  • 1篇OVER
  • 1篇PERIOD
  • 1篇PRESER...
  • 1篇PROBLE...
  • 1篇PROXY
  • 1篇PSEUDO
  • 1篇QUANTU...
  • 1篇ROBUST
  • 1篇SEQUEN...
  • 1篇SMALL
  • 1篇SOURCE
  • 1篇SPECTR...
  • 1篇STRATE...
  • 1篇STRATE...
  • 1篇SUPPOR...
  • 1篇USING
  • 1篇WIRELE...
  • 1篇WITHOU...

传媒

  • 2篇Scienc...
  • 1篇The Jo...
  • 1篇Wuhan ...
  • 1篇Fronti...

年份

  • 1篇2016
  • 1篇2015
  • 3篇2014
  • 3篇2013
5 条 记 录,以下是 1-8
排序方式:
Data embedding based on pixel value differencing and modulus function using indeterminate equation被引量:2
2015年
An effective data hiding method based on pixel value differencing (PVD) and modulus function (MF) PVD (MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods.
Wang ZhaoZhang JieLiao XinWen Qiaoyan
An Algorithm for the Spectral Immunity of Binary Sequence with Period 2^n
2016年
To resist the fast algebraic attack and fast selective discrete Fourier transform attacks,spectral immunity of a sequence or a Boolean function was proposed.At the same time,an algorithm to compute the spectral immunity of the binary sequence with odd period N was presented,here N is a factor of 2^n-1,where n is an integer.The case is more complicated when the period is even.In this paper,we compute linear complexity of every orthogonal sequence of a given sequence using Chan-Games algorithm and k-error linear complexity algorithm.Then,an algorithm for spectral immunity of binary sequence with period N=2^n is obtained.Furthermore,the time complexity of this algorithm is proved to be O(n).
LIU Zhenhua
关键词:SEQUENCE
A LIGHTWEIGHT SOURCE LOCATION PRIVACY PRESERVING SCHEME FOR WIRELESS SENSOR NETWORKS
While many protocols for sensor network security provide confidentiality for message content, contextual infor...
Liming ZHOUQiaoyan WENHua ZHANGLin CHENG
关键词:WSN
A New Solution of Data Security Accessing for Hadoop Based on CP-ABE
In cloud computing platform Hadoop,because user data stored in the cloud is not a controllable domain,so how t...
Huixiang ZhouQiaoyan Wen
关键词:HADOOPHDFS
A lattice-based signcryption scheme without random oracles被引量:5
2014年
In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Information Sciences, 2012, 6(1): 23-28] have independently extended the concept of signcryption to lattice-based cryptography. However, their schemes are only secure under the random or- acle model. In this paper, we present a lattice-based signcryp- tion scheme which is secure under the standard model. We prove that our scheme achieves indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the learning with errors (LWE) assumption and existential unforgeability against adaptive chosen-message attacks (EUF- CMA) under the small integer solution (SIS) assumption.
Xiuhua LUQiaoyan WENZhengping JINLicheng WANGChunli YANG
关键词:SIGNCRYPTION
PASSIVE RFID-SUPPORTED SOURCE LOCATION PRIVACY PRESERVATION AGAINST GLOBAL EAVESDROPPERS IN WSN
Source location privacy is one of the most challenging issues in WSN applications. Some of existing solutions ...
Wuchen XIAOHua ZHANGQiaoyan WENWenmin LI
Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels被引量:6
2013年
We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination.
HUANG WeiWEN QiaoYanLIU BinGAO FeiSUN Ying
Minimum best success probability by classical strategies for quantum pseudo-telepathy被引量:3
2014年
Quantum pseudo-telepathy(QPT)is a new type of game where the quantum team can win with certainty while the classical one cannot.It means the advantages of quantum participants over classical ones in game.However,there has been no systematic and formal analysis on the QPT game before.Here we present the formal description of the QPT game and the definition of the most simplified QPT.Based on the above definitions,we simplify a famous QPT game,i.e.the Cabllo game.Then,according to some instances,we analyze the minimum best success probability by classical strategies of the two-player QPT,which reflects the advantage of the quantum strategies.Finally,we prove the best success probability by classical strategies for the most simplified QPT is totally related to the number of all possible question combinations.
GAO FeiFANG WeiWEN QiaoYan
共1页<1>
聚类工具0