KEYS

作品数:93被引量:66H指数:4
导出分析报告
相关领域:电子电信更多>>
相关作者:刘云石金涛张翼汪为农刘小梅更多>>
相关机构:上海交通大学中山大学南京师范大学吉大正元信息技术股份有限公司更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
More trust in networks,more secure keys
《Light(Science & Applications)》2025年第1期18-19,共2页Guan-Jie Fan-Yuan Shuang Wang 
A novel continuous-variable quantum passive optical network is proposed in which a user can increase their key rate by trusting other users.This is because the keys,which would be discarded to remove correlations with...
关键词:network PASSIVE NETWORKS 
A Study on Inflation Theories and Turkey’s Inflation Problem
《Management Studies》2024年第5期309-322,共14页SıtkıSelim Dolanay 
In the Turkish Economy,with the policies of opening up to the outside world and transition to a free market economy in the 1980s,there have been radical changes in the structure of the economy and the prices of all go...
关键词:Turkish economy free market economy export-based growth model inflation theories post-Keynesian approach to inflation profit-push inflation approach 
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
《Science China(Information Sciences)》2024年第1期217-235,共19页Xiaoyan HU Zheng WAN Kaizhi HUANG Liang JIN Mengyao YAN Yajun CHEN Jinmei YANG 
supported by National Natural Science Foundation of China(Grant No.U22A2001,62301608);National Key Research and Development Program of China(Grant Nos.2022YFB2902202,2022YFB2902205)。
This paper proposes a novel modulated symbols-based one-time pad(SOTP)secure transmission scheme using physical layer keys.Unlike classical physical layer key generation and exclusive OR(XOR)encryption in the discrete...
关键词:physical layer security one-time pad wireless channel physical layer encryption perfect secrecy 
Efficient Technique for Image Cryptography Using Sudoku Keys
《Computers, Materials & Continua》2023年第10期1325-1353,共29页M.A.P.Manimekalai M.Karthikeyan I.Thusnavis Bella Mary K.Martin Sagayam Ahmed A Elngar Unai Fernandez-Gamiz Hatıra Günerhan 
supported by the government of the Basque Country for the ELKARTEK21/10 KK-2021/00014 and ELKARTEK22/85 Research Programs,respectively。
This paper proposes a cryptographic technique on images based on the Sudoku solution.Sudoku is a number puzzle,which needs applying defined protocols and filling the empty boxes with numbers.Given a small size of numb...
关键词:SUDOKU image cryptography PIXELS performance metrics 
Polysurfacic Tori or Kideas Inspired by the Möbius Strip Topology
《Advances in Pure Mathematics》2023年第9期543-551,共9页Emmanuel Cadier Anaxhaoza 
Polysurfacic tori or kideas are three-dimensional objects formed by rotating a regular polygon around a central axis. These toric shapes are referred to as “polysurfacic” because their characteristics, such as the n...
关键词:Heavenly Things Topology Euclidian Geometry Möbius Strip Emmanuel’s Tori YiBoLong’s Tori Cadier’s Tori Möbius Tori Polysurfacic Tori Kideas The Keys KideaCross KideaStar Churros Algorithm for Calculating the Set of Prime Numbers P The Last Found Element of P 
KEYS
《时代英语(高二版)》2022年第5期93-96,共4页
MSK-PK:A Public-Key Encryption Cryptosystem with Multiple Secret-Keys
《Chinese Journal of Electronics》2022年第4期764-772,共9页ZHAI Jiaqi LIU Jian CHEN Lusheng WANG Lingyu 
supported by National Key R&D Program of China(2019YFB2101700);National Key Research and Development Program of China(2018YFA0704703);National Natural Science Foundation of China(61902276).
By allowing intermediate nodes to combine multiple packets before forwarding them,the concept of network coding in multi-cast networks can provide maximum possible information flow.However,this also means traditional ...
关键词:Public-key encryption Network coding Lattice 
KEYS
《时代英语(高二版)》2022年第4期91-96,共6页
Never Lost Keys:A Novel Key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
《China Communications》2022年第7期172-184,共13页Yichuan Wang Dan Wu Xiaoxue Liu Xinhong Hei 
supported by the National Natural Science Founds of China (62072368, U20B2050);Key Research and Development Program of Shaanxi Province (2020GY-039, 2021ZDLGY05-09, 2022GY040)
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerpr...
关键词:EEG biometric key generation end-edgecloud system information security 
KEYS
《时代英语(高二版)》2022年第3期76-80,共5页
检索报告 对象比较 聚类工具 使用帮助 返回顶部