WIRETAP相关论文
Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate ......
Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n ......
In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap ......
监听的有序规范实施需要完善的监听程序制度来加以保障,对监听程序制度的研究有助于我国建构相关制度.监听程序性制度主要包括监听......
提出了一个完美量子封印的攻击策略,利用该策略能成功逃脱系统的监测.构造2个完整的项目操作符,在没有给定基础的情况下可以解码密......
通讯监听是侦查机关在刑事诉讼实践中经常采用通讯监听这一种技术侦查手段,该项行为直接影响到宪法所保障的公民的言论、通讯自由......
This paper analyzed the security of constant dimensional subspace code against wiretap attacks. The security was measure......
Reliable communication imposes an upper limit on the achievable rate,namely the Shannon capacity.Wyner's wiretap cod......
围绕如何对整个企业网络的性能进行监控与管理这一问题,着重介绍网络性能监控与管理工具WireTap的各种性能参数,并对其各个功能模块了深入的......