针对量子计算机特点的公钥密码理论与关键技术研究
项目来源
项目主持人
项目受资助机构
立项年度
立项时间
项目编号
项目级别
研究期限
受资助金额
学科
学科代码
基金类别
关键词
参与者
参与机构
项目受资助省
项目结题报告(全文)
1.Literature Review on Wireless Sensing-Wi-Fi Signal-Based Recognition of Human Activities
- 关键词:
- channel state information; frequency modulated carrier wave; humanactivities recognition; wireless sensing applications; Wi-Fi;HEART-RATE-VARIABILITY; SYSTEM
With the rapid development and wide deployment of wireless technology, Wi-Fi signals have no longer been confined to the Internet as a communication medium. Wi-Fi signals will be modulated again by human actions when propagating indoors, carrying rich human body state information. Therefore, a novel wireless sensing technology is gradually emerging that can realize gesture recognition, human daily activity detection, identification, indoor localization and human body tracking, vital signs detection, imaging, and emotional recognition by extracting effective feature information about human actions from Wi-Fi signals. Researchers mainly use channel state information or frequency modulated carrier wave in their current implementation schemes of wireless sensing technology, called "Walls have eyes", and these schemes cover radio-frequency technology, signal processing technology, and machine learning. These available wireless sensing systems can be used in many applications such as smart home, medical health care, search-and-rescue, security, and with the high precision and passively device-free through-wall detection function. This paper elaborates the research actuality and summarizes each system structure and the basic principles of various wireless sensing applications in detail. Meanwhile, two popular implementation schemes are analyzed. In addition, the future diversely application prospects of wireless sensing systems are presented.
...2.Cryptanalysis of a lattice based key exchange protocol
3.Survey on cyberspace security
- 关键词:
- cyberspace security; information security; cryptography; networksecurity; information system security; information content security;FULLY HOMOMORPHIC ENCRYPTION; STREAM CIPHERS; ATTACKS; RETRIEVAL;CLASSIFICATION; CRYPTOSYSTEMS; ANONYMITY; CLOUD; MODEL
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace. This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself, cyberspace security, cryptography, network security, information system security and information content security.
...4.Survey on cyberspace security
- 关键词:
- cyberspace security; information security; cryptography; networksecurity; information system security; information content security;FULLY HOMOMORPHIC ENCRYPTION; STREAM CIPHERS; ATTACKS; RETRIEVAL;CLASSIFICATION; CRYPTOSYSTEMS; ANONYMITY; CLOUD; MODEL
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace. This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself, cyberspace security, cryptography, network security, information system security and information content security.
...
