Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum Key Distribution Networks--Key Management: A Survey
Secure communication makes the widespread use of telecommunication networks and
services possible. With the constant progress of computing and mathematics, new …
services possible. With the constant progress of computing and mathematics, new …
The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)
Quantum key distribution (QKD) is a means of generating keys between a pair of computing
hosts that is theoretically secure against cryptanalysis, even by a quantum computer …
hosts that is theoretically secure against cryptanalysis, even by a quantum computer …
A QTCP/IP reference model for partially trusted-node-based quantum-key-distribution-secured optical networks
Classical encryption protocols that are currently used to secure the internet and transmission
control protocol/internet protocol (TCP/IP) protocols will be subjected to high risks with the …
control protocol/internet protocol (TCP/IP) protocols will be subjected to high risks with the …
[PDF][PDF] Quantum Communication Networks and Trust Management: A Survey.
S Zhang, Y Chang, L Yan, Z Sheng… - Computers …, 2019 - pdfs.semanticscholar.org
This paper summarizes the state of art in quantum communication networks and trust
management in recent years. As in the classical networks, trust management is the premise …
management in recent years. As in the classical networks, trust management is the premise …
A self-adjusting quantum key renewal management scheme in classical network symmetric cryptography
J Han, Y Liu, X Sun, A Chen - The Journal of Supercomputing, 2020 - Springer
Quantum private communication is a technology for secure communication that uses the
laws of quantum mechanics to distribute quantum keys for encryption. Currently it has been …
laws of quantum mechanics to distribute quantum keys for encryption. Currently it has been …
Intelligent security model of smart phone based on human behavior in mobile cloud computing
Diverse researches following the advancement of IT technology and emergence of smart
devices are common in current research. In particular, the most commercialized smart …
devices are common in current research. In particular, the most commercialized smart …
Architecture and protocol to optimize videoconference in wireless networks
In the past years, videoconferencing (VC) has become an essential means of
communications. VC allows people to communicate face to face regardless of their location …
communications. VC allows people to communicate face to face regardless of their location …
Real-time inspection and fault detection for large photovoltaic arrays based on drones and deep learning algorithms
R Yu, Y Cui, H Wang, H Edin… - Journal of Physics …, 2023 - iopscience.iop.org
In recent years, the installation of renewable energy generation systems based on
photovoltaic (PV) panels has experienced massive increments and PV parks with thousands …
photovoltaic (PV) panels has experienced massive increments and PV parks with thousands …
Experimental study of video fusion for multi-view video streaming in mobile media cloud
Nowadays, mobile users are not just content with a quick access to Internet when they are
watching various types of videos, but also expecting a better video viewing experience. The …
watching various types of videos, but also expecting a better video viewing experience. The …
On-Site Dance Teaching Live Broadcast System Based on Internet Streaming Media Technology
C Zhang, X Wang - The International Conference on Cyber Security …, 2022 - Springer
The rapid development of Internet technology has provided a powerful driving force for
streaming media services. Streaming media is based on the Internet and is time-based …
streaming media services. Streaming media is based on the Internet and is time-based …