practical security
Recently Published Documents


TOTAL DOCUMENTS

136
(FIVE YEARS 17)

H-INDEX

17
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Mark S. Merkow
Keyword(s):  


2021 ◽  
Author(s):  
Lingzhi Kong ◽  
Weiqi Liu ◽  
Fan Jing ◽  
Chen He

Abstract When developing practical continuous-variable quantum key distribution (CVQKD), detector is necessary at the receiver’s side.We investigate the practical security of the CVQKD system with unbalanced heterodyne detector.The result shows that unbalanced heterodyne detector introduces extra excess noise into system and decreases the lower bound of secret key rate without awareness of the legitimate communicators, which leaves loopholes for Eve to attack the system. In addition, we find that the secret key rate decreases more severely with the increase of the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of local oscillator (LO) under the same degree of imbalance. Finally, the countermeasure is proposed to resist this kind of effects.



Photonics ◽  
2021 ◽  
Vol 8 (11) ◽  
pp. 511
Author(s):  
Duan Huang ◽  
Susu Liu ◽  
Ling Zhang

Quantum key distribution (QKD) offers information-theoretical security, while real systems are thought not to promise practical security effectively. In the practical continuous-variable (CV) QKD system, the deviations between realistic devices and idealized models might introduce vulnerabilities for eavesdroppers and stressors for two parties. However, the common quantum hacking strategies and countermeasures inevitably increase the complexity of practical CV systems. Machine-learning techniques are utilized to explore how to perceive practical imperfections. Here, we review recent works on secure CVQKD systems with machine learning, where the methods for detections and attacks were studied.



2021 ◽  
pp. 360-376
Author(s):  
Dave Clemente

This chapter examines the basics of personal cybersecurity and good ‘cyber hygiene’. It analyses the trade-offs inherent in cybersecurity, looks at methods of conducting a risk assessment, and reveals the potential impacts of poor security choices. It offers a range of practical security recommendations applicable to informed readers who may not be subject matter experts, and who wish to manage their personal cyber risks more effectively.





2021 ◽  
Author(s):  
Ivan S. Sushchev ◽  
Diana M. Guzairova ◽  
Andrey N. Klimov ◽  
Dmitriy A. Dvoretskiy ◽  
Sergey A. Bogdanov ◽  
...  


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
I Gusti Bagus Dharma Agastia

How does ASEAN fare in addressing maritime security problems? This paper examines the shifting character of maritime security cooperation in Southeast Asia. In doing so, this paper looks at the outcomes of three maritime security-oriented fora that exist within the ASEAN regional framework: the ASEAN Regional Forum, the ASEAN Defence Ministers’ Meeting, and the ASEAN Maritime Forum. By compiling and analysing data on the forms and frequency of existing cooperative activities from 2003 gathered from publicly available sources, this paper finds that maritime security cooperation among ASEAN members continue to be largely dialogue-based, with few instances of practical cooperation. By comparing the three fora, this paper argues that the organisational design of these forums tends to affect the forms of cooperation. This paper concludes that despite ASEAN showing progress in adopting practical security cooperation, there remain hurdles in achieving regional maritime security.





Author(s):  
Xi He ◽  
Jennie Rogers ◽  
Johes Bater ◽  
Ashwin Machanavajjhala ◽  
Chenghong Wang ◽  
...  




Sign in / Sign up

Export Citation Format

Share Document