SECURING

作品数:98被引量:62H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:文伯屏周楠更多>>
相关机构:湖南大学中国社会科学院悉尼大学西安电子科技大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金重庆市自然科学基金广东省自然科学基金河北省自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=China Communicationsx
条 记 录,以下是1-4
视图:
排序:
Self-Powered Absorptive Reconfigurable Intelligent Surfaces for Securing Satellite-Terrestrial Integrated Networks
《China Communications》2024年第9期276-291,共16页Lin Zhi Niu Hehao He Yuanzhi An Kang Zhong Xudong Chu Zheng Xiao Pei 
supported by the National Natural Science Foundation of China(No.62201592);the Research Plan Project of NUDT(ZK21-33);the Young Elite Scientist Sponsorship Program of CAST,China(2021-JCJQ-QT-048)。
Satellite communications have attracted significant interests due to its advantages of large footprint and massive access.However,the commonly used onboard beamforming is hard to achieve reliable security because of t...
关键词:absorptive RIS beamforming design secure communications STIN 
Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping被引量:4
《China Communications》2021年第1期88-99,共12页Bin Duo Junsong Luo Yilian Li Hao Hu Zibin Wang 
This work was partially supported by the National Natural Science Foundation of China(No.61802034);National Key Research and Development Program of China(No.2019YFC1509602);Chongqing Natural Science Foundation(cstc2019jcyj-msxmX0264).
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl...
关键词:UAV communications active eavesdropping physical-layer security secrecy rate maximization power control trajectory design 
Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing
《China Communications》2014年第A01期121-127,共7页CHEN Danwei CHEN Linling FAN Xiaowei HE Liwen PAN Su Hu Ruoxiang 
the National Natural Science Foundation of China under contract NO 61271235 and No.60973146,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308
Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a n...
关键词:personal health records attribute- based encryption data privacy fine-grained access control 
A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks
《China Communications》2007年第1期40-47,共8页B.Moussakhani S.M.Safavi H.Ebrahimzad 
supported by Iran Telecommunication Research Center
Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malic...
关键词:ad HOC networks routing security CRYPTOGRAPHY random key predistributions 
检索报告 对象比较 聚类工具 使用帮助 返回顶部