刊名
执行
中图分类
执行
    中文(共62篇) 外文(共3348篇)
    排序:
    导出 保存至文件
    摘要 : This study discusses the problem of key distribution protocol in IoT systems especially smart grids for two modes of communication: Unicast and multicast. In the present paper, we suggested two protocols for key distribution for b... 展开

    摘要 : In this report we try to modify the secret-key reconciliation protocol Cascade so as to reduce the number of publicly exchanged bits. The performance of the proposed scheme is shown by means of computer simulation. We give upper b... 展开

    [机翻] 子集密钥和身份票(SKIT)密钥分配方案
    [期刊]   Ramkumar, M.   《Information Forensics and Security, IEEE Transactions on》    2010年5卷1期      共13页
    摘要 : Probabilistic key predistribution schemes (P-KPSs) which place modest demands on hardware are good candidates for securing interactions between resource limited computers. Collusion susceptible P-KPSs are trade-offs between secur... 展开

    摘要 : Group key management (GKM) is one of the most important issues in secure group communication (SGC). The existing GKM protocols fall into three typical classes: centralized group key distribution (CGKD), decentralized group key man... 展开

    [期刊]   Gyongyosi, Laszlo   Imre, Sandor   《Communications of the ACM》    2022年65卷8期      共12页
    摘要 : QUANTUM INFORMATION WILL not only reformulate our view of the nature of computation and communication but will also open up fundamentally new possibilities for realizing high-performance computer architecture and telecommunication... 展开
    关键词 : KEY DISTRIBUTION  

    [期刊]   Ranade, KS   《Journal of physics, A. Mathematical and theoretical》    2009年42卷42期      共11页
    摘要 : The concept of symmetric extendibility has recently drawn attention in the context of tolerable error rates in quantum cryptography, where it can be used to decide whether quantum states shared between two parties can be purified ... 展开
    关键词 : KEY DISTRIBUTION  

    [期刊]   Niederberger A   Scarani V   Gisin N   《Physical Review, A》    2005年71卷4期      共10页
    摘要 : In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Lutkenhaus [... 展开
    关键词 : KEY DISTRIBUTION  

    摘要 : On the basis of entanglement swapping of Bell states, Hwang et al. proposed a probabilistic quantum key distribution (PQKD) protocol Quantum Inf. Comput. 11(7-8), 615-637 (2011). Recently, Lin et al. Quantum Inf. Comput. 14(9-10),... 展开

    [期刊]   Carles Padro   Ignacio Gracia   Sebastia Martin   Paz Morillo   《Discrete Applied Mathematics》    2003年128卷1期      共16页
    摘要 : A new family of broadcast encryption schemes, which well be called linear broadcast encryption schemes (LBESs), is presented in this paper by using linear algebraic techniques. This family generalizes most previous proposals and p... 展开

    [期刊]   Kuhn DR   《Quantum information & computation》    2005年5卷7期      共10页
    摘要 : This paper presents a server-based hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. A novel feature of the protocol is that it c... 展开

    研究趋势
    相关热图
    学科分类