您的位置: 专家智库 > >

国家自然科学基金(61272057)

作品数:5 被引量:14H指数:3
发文基金:国家自然科学基金北京市自然科学基金国家教育部博士点基金更多>>
相关领域:理学自动化与计算机技术电子电信机械工程更多>>

文献类型

  • 5篇期刊文章
  • 4篇会议论文

领域

  • 6篇自动化与计算...
  • 4篇电子电信
  • 3篇理学
  • 1篇机械工程

主题

  • 2篇SCHEME
  • 2篇WSN
  • 2篇ALGORI...
  • 1篇旋转噪声
  • 1篇选择密文攻击
  • 1篇应用数学
  • 1篇噪声
  • 1篇数学
  • 1篇签密
  • 1篇签密方案
  • 1篇相干噪声
  • 1篇像素
  • 1篇像素值
  • 1篇量子
  • 1篇量子比特
  • 1篇密文
  • 1篇模函数
  • 1篇模量
  • 1篇古典
  • 1篇函数

传媒

  • 2篇Scienc...
  • 1篇The Jo...
  • 1篇Wuhan ...
  • 1篇Fronti...

年份

  • 1篇2016
  • 1篇2015
  • 4篇2014
  • 3篇2013
5 条 记 录,以下是 1-9
排序方式:
Data embedding based on pixel value differencing and modulus function using indeterminate equation被引量:2
2015年
An effective data hiding method based on pixel value differencing(PVD) and modulus function(MF) PVD(MF-PVD) was proposed. MF-PVD method was derived by Wang et al in which the MF was employed to adjust the remainder of two pixels for data embedding and extraction. In the proposed method, a new remainder function in a more general form is defined by selecting proper parameters, in which an indeterminate equation is constructed and an optimal solution is applied to revise the pixels. This strategy leads to a significant image distortion reduction compared with the original method. The experiment reveals that, by preserving the original embedding capacity, the method provides better embedding efficiency than both MF-PVD and PVD methods.
Wang ZhaoZhang JieLiao XinWen Qiaoyan
关键词:像素值模函数差分模量
An Algorithm for the Spectral Immunity of Binary Sequence with Period 2^n
2016年
To resist the fast algebraic attack and fast selective discrete Fourier transform attacks, spectral immunity of a sequence or a Boolean function was proposed. At the same time, an algorithm to compute the spectral immunity of the binary sequence with odd period N was presented, here N is a factor of 2~n-1, where n is an integer. The case is more complicated when the period is even. In this paper, we compute linear complexity of every orthogonal sequence of a given sequence using Chan-Games algorithm and k- error linear complexity algorithm. Then, an algorithm for spectral immunity of binary sequence with period N=2~n is obtained. Furthermore, the time complexity of this algorithm is proved to be O(n).
LIU Zhenhua
关键词:SEQUENCE
A LIGHTWEIGHT SOURCE LOCATION PRIVACY PRESERVING SCHEME FOR WIRELESS SENSOR NETWORKS
While many protocols for sensor network security provide confidentiality for message content, contextual infor...
Liming ZHOUQiaoyan WENHua ZHANGLin CHENG
关键词:WSN
A New Solution of Data Security Accessing for Hadoop Based on CP-ABE
In cloud computing platform Hadoop,because user data stored in the cloud is not a controllable domain,so how t...
Huixiang ZhouQiaoyan Wen
关键词:HADOOPHDFS
A lattice-based signcryption scheme without random oracles被引量:5
2014年
Xiuhua LUQiaoyan WENZhengping JINLicheng WANGChunli YANG
关键词:签密方案选择密文攻击应用数学
PASSIVE RFID-SUPPORTED SOURCE LOCATION PRIVACY PRESERVATION AGAINST GLOBAL EAVESDROPPERS IN WSN
Source location privacy is one of the most challenging issues in WSN applications. Some of existing solutions ...
Wuchen XIAOHua ZHANGQiaoyan WENWenmin LI
Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels被引量:6
2013年
We present a protocol for quantum private comparison of equality(QPCE) with the help of a semi-honest third party(TP).Instead of employing the entanglement,we use single photons to achieve the comparison in this protocol.By utilizing collective eavesdropping detection strategy,our protocol has the advantage of higher qubit efficiency and lower cost of implementation.In addition to this protocol,we further introduce three robust versions which can be immune to collective dephasing noise,collective-rotation noise and all types of unitary collective noise,respectively.Finally,we show that our protocols can be secure against the attacks from both the outside eavesdroppers and the inside participants by using the theorems on quantum operation discrimination.
HUANG WeiWEN QiaoYanLIU BinGAO FeiSUN Ying
关键词:量子比特相干噪声旋转噪声
Suffix Tree Constructing Algorithm for Datasets with Discrete Contents
The suffix tree is a useful data structure constructed for indexing strings.However,when it comes to large dat...
Zhenzhong JinZheng HuangHua Zhang
文献传递
Minimum best success probability by classical strategies for quantum pseudo-telepathy被引量:3
2014年
Quantum pseudo-telepathy(QPT)is a new type of game where the quantum team can win with certainty while the classical one cannot.It means the advantages of quantum participants over classical ones in game.However,there has been no systematic and formal analysis on the QPT game before.Here we present the formal description of the QPT game and the definition of the most simplified QPT.Based on the above definitions,we simplify a famous QPT game,i.e.the Cabllo game.Then,according to some instances,we analyze the minimum best success probability by classical strategies of the two-player QPT,which reflects the advantage of the quantum strategies.Finally,we prove the best success probability by classical strategies for the most simplified QPT is totally related to the number of all possible question combinations.
GAO FeiFANG WeiWEN QiaoYan
关键词:古典
共1页<1>
聚类工具0