sender相关论文
We present two deterministic secure quantum communication schemes over a collective-noise. One is used to complete the s......
DAYS ago I received an e-mail,the head-ing of which was “No-one Should Buy Clothes in the Next Few Months Because Price......
This paper introduces a process planning system communication model based on a Multi-agent and all levels of the communi......
An integrated fault tolerant approach for data encryption and digital signature based on elliptic curve cryptography is ......
It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be ......
In 3G networks upgraded with high speed packet access(HSPA) technology,the high access bandwidth and advanced mobile dev......
Recently, Sun et al. (2005) highlighted the essential property of perfect forward secrecy (PFS) for e-mail protocols whe......
Nicht-invasive Darstellung komplexer Perianaller Fistelgangsysteme mittels hochaufl sender MRT in3D-
Es ist das Ziel der vorliegenden Arbeit, in einem Sequenzvergleich bei Patienten mit perianalen Fisteln zu untersuchen,......
A sudden letter from Taiwan through HK arrived at Urumqipost office. Xingjiang Province, shortly after the Spring Festi......
Teleportation of an unknown two-atom state using simultaneous interaction of two two-level atoms wit
Proposal for the teleportation of two-atom state is presented. It is based on the simultaneous interaction of two two-l......
One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL......
It is well known that 802.11 suffers from both inefficiency and unfairness in the face of competition and interference.T......
A four-party scheme is put forward for a sender to partition arbitrary single-qubit information amongthree receivers by......
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, ......
With the development of data intensive application, such as multimedia, data warehouse, and online analysis processing, ......
Two types of new subliminal channels are constructed respectively based on provable secure public key cryptosystems and......
Video streaming is one of the most important applications used in the best-effort Internet. This paper presents a new sc......
In this paper, an analytical model of two-layer retransmission scheme is proposed for CDMA systems in which selective re......
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure com......
In this paper, based on the inherent characteristic of the contention relation between flows in ad hoc networks, we intr......
In wireless ad hoc network environments, every link is wireless and every node is mobile. Those features make data lost ......
Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of so......
Two avowable quantum communication schemes are proposed.One is an avowable teleportation protocolbased on the quantum c......
We introduce a protocol for QKD based on reusable entangled states.In this protocol,the EPR pairs act as a quantum key t......
We present a scheme for probabilistic remote preparation of multi-qubit with three-party from a sender toeither of two ......
A theoretical scheme of quantum secure direct communication using teleportation is proposed.In thescheme,the sender nee......
We present a scheme for probabilistic remote preparation of an entangled two-qubit state with three parties from a sende......
Teleportation of an arbitrary unknown N-qubit entangled state under the controlling of M controllers
A new quantum protocol to teleport an arbitrary unknown N-qubit entangled state from a sender to a fixed receiver under ......
A new concept, the security level difference of a covert channel, is presented, which means the security level span from......
This paper presents the flip-flop tone(FFT)DMAC protocol,a tone based MAC protocol using di-rectional antennas to solve......
Classical Communication Cost and Probabilistic Remote Preparation of Four-Particle Entangled W State
We present a scheme for probabilistic remote preparation of the four-particle entangled W state by usingfour partial en......
We propose a quantum secure communication protocol by using three-particle GHZ states.In this protocol,we utilize the i......
The sender shares six-particle maximally entangled states as quantum channel with the receiver.If thequantum channel is......
A quantum secure direct communication scheme using dense coding is proposed.At first,the sender (Alice)prepares four-pa......
Performance of wireless mesh networks can be greatly improved by spatial reuse (SR), therefore, lots of algorithms have ......
这一期的内容,是我们的“个人信息保险箱”开发部分的最后一篇了。我们将要实现通过短信远程控制手机,清空、取回你的通讯簿。我们......
We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics.In addition,we ana......
Based on χ-type entangled states and the two-step protocol [Deng F G,Long G L and Liu X S 2003 Phys.Rev.A 68 042317],a ......
We propose two schemes for splitting single- and two-qubit states by using four-particle genuine entangledstate as the ......
A new protocol for the anonymous communication of quantum information is proposed. The anonymity of the receiver and the......
We analyze the development of quantum cryptography communication,including analyze the problems lie in the existent lite......
A framework of physical layer technique assisted authentication for vehicular communication networks
In this paper, we introduce a message physical layer assisted message authentication (PAA) framework under public key in......
This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rose......
Probabilistic remote preparation of a high-dimensional equatorial multiqubit with four-party and cla
This paper presents a protocol for probabilistic remote preparation of a high-dimensional equatorial multiqubit with fou......
This paper proposes an acknowledgement assistant inner loop power control (AILPC), which still obeys power control comma......
We start this paper by answering the questions:What requirements should a good Loss Differentiation Mechanism (LD) for 8......
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hiera......
This paper proposes a network coding (NC) based hybrid ARQ (HARQ) algorithm for video broad- cast over wireless networks......