supported by the National Natural Science Foundation of China (Grant Nos.61170272,61272514,61003287 and 61070163);the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No.20100005120002);the Fok Ying Tong Education Foundation (Grant No.131067);the Shandong Provincial Natural Science Foundation,China (Grant Nos.ZR2011FM023 and ZR2009GM036);the Shandong Province Outstanding Research Award Fund for Young Scientists of China (Grant No.BS2011DX034);the Fundamental Research Funds for the Central Universities (Grant No.BUPT2012RC0221)
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa...
supported by the National Natural Science Foundation of China (Grant Nos. 61170272,61272514,61003287,and 61070163);the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20100005120002);the Fok Ying Tong Education Foundation (Grant No. 131067);the Natural Science Foundation of Shandong Province,China (Grant No. ZR2011FM023);the Outstanding Research Award Fund for Young Scientists of Shandong Province,China (Grant No. BS2011DX034);the Fundamental Research Funds for Central Universities of China (Grant No. BUPT2012RC0221)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography...
This work is supported by the National Natural Science Foundation of China(61070163) and Shandong Natural Science Foundation (Y2008G35).
Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicio...
This work is supported by the National Natural Science Foundation of China (61070163) and Shandong Natural Science Foundation (Y2008G35).
A method to extract information of network connection status information from physical memory on Windows Vista operating system is proposed. Using this method, a forensic examiner can extract accurately the informatio...
This work is supported by the National Natural Science Foundation of China (61070163) and Shandong Natural Science Foundation (Y2008G35).
Although FireWire-based memory acquisition method has been introduced for several years, the methodologies are not discussed in detail and still lack of practical tools. Besides, the existing method is not working sta...