吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (2): 535-541.doi: 10.13229/j.cnki.jdxbgxb201602031
• Orginal Article • Previous Articles Next Articles
HAN Jia-wei1, 2, LIU Yan-heng1, SUN Xin3, SONG Li-jun2
CLC Number:
[1] 吴华,赵于康,赵勇,等. 实用化光纤量子加密电话网络和高速数据传输系统 现场应用与安全管理[J]. 中国科学:信息科学,2014,44(3): 312-321. Wu Hua,Zhao Yu-kang,Zhao Yong,et al. Field application and security management of a telephone network and a high speed data transmission system with practical fiber quantum cryptography[J]. Scien-tia Sinica Informationis,2014,44(3):312-321. [2] Fröhlich B,Dynes J F,Lucamarini M,et al. A quantum access network[J]. Nature,2013,501 (7465):69-72. [3] 刘晓慧,裴昌幸,聂敏. 量子无线通信网络构建及性能分析[J]. 吉林大学学报:工学版,2014,44(4):1177-1181. Liu Xiao-hui,Pei Chang-xing,Nie Min. Quantum wireless communication network model and performance analysis[J]. Journal of Jilin University (Eng-ineering and Technology Edition),2014,44(4):1177-1181. [4] Wang Qing-le,Gao Fei,Liu Bin,et al. Anonymous quantum communications using the quantum one-time pad[J]. Physica Scripta,2015,90(0151021): 1-6. [5] Peev M,Dynes J F,Fasel S,et al. The SECOQC quantum key distribution network in Vienna[J]. New Journal of Physics,2009,11(7): 75001-75037. [6] Stucki D,Legre M,Buntschu F,et al. Long-term performance of the Swiss quantum quantum key distribution network in a field environment[J]. New Journal of Physics,2011,13:123001-123018. [7] Sasaki M,Fujiwara M,Ishizuka H,et al. Field test of quantum key distribution in the Tokyo QKD Net-work[J]. Optics Express,2011,19(11): 10387-10409. [8] 吴华,王向斌,潘建伟. 量子通信现状与展望[J].中国科学:信息科学,2014,44(3):296-311. Wu Hua,Wang Xiang-bin,Pan Jian-wei. Quantum communication: status and prospects[J]. Scientia Sinica Informationis 2014,44(3): 296-311. [9] Neppach A,Pfaffel-Janser C,Wimberger I,et al. Key management of quantum generated keys in IPsec[C]//Proceedings of the International Conference on Security and Cryptography,Porto,Portugal,2008: 177-183. [10] Alléaume R,Branciard C,Bouda J,et al. Using quantum key distribution for cryptographic purposes: A survey[J]. Theoretical Computer Science,2014,560: 62-81. [11] Fujiwara M,Domeki T,Moriai S,et al. Highly secure network switches with quantum key distribution systems[J]. International Journal of Network Security,2015,17(1): 34-39. [12] Gottesman D,Lo H K,Lutkenhaus N,et al. Security of quantum key distribution with imperfect devices[J]. Quantum Information & Computation,2004,4(5):325-360. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|