Beijing, China

Beijing Electronic Science and Technology Institute is a university in Beijing, China. It is a major research institute of information security in China. It consists of five departments, with approximately 1,000 students. It belongs to the General Office of the Communist Party of China. Wikipedia.


Time filter

Source Type

Lin S.,Fujian Normal University | Sun Y.,Beijing Electronic Science and Technology Institute | Liu X.-F.,Fujian Normal University | Yao Z.-Q.,Fujian Normal University
Quantum Information Processing | Year: 2013

In this paper, a quantum private comparison protocol with Bell states is proposed. In the protocol, two participants can determine the relationship between their secret inputs in size, with the assistance of a semi-trusted third party. The presented protocol can ensure fairness, correctness, and security. Meanwhile, all the particles undergo only a one-way trip, which improves the efficiency and security of the communication. Furthermore, only Bell states are exploited in the implementation of the protocol, and two participants are just required having the ability to perform single particle operations, which make the presented protocol more feasible in technique. © 2012 Springer Science+Business Media, LLC.


Sun Y.,Beijing University of Posts and Telecommunications | Sun Y.,Beijing Electronic Science and Technology Institute | Wen Q.-Y.,Beijing University of Posts and Telecommunications
Physical Review A - Atomic, Molecular, and Optical Physics | Year: 2010

In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency.We also analyze how to achieve the optimal efficiency under various conditions. © 2010 The American Physical Society.


Li Y.-B.,Beijing University of Posts and Telecommunications | Li Y.-B.,Beijing Electronic Science and Technology Institute | Wen Q.-Y.,Beijing University of Posts and Telecommunications | Qin S.-J.,Beijing University of Posts and Telecommunications
Physical Review A - Atomic, Molecular, and Optical Physics | Year: 2011

In a recent paper, five schemes for secure multiparty computation utilizing the Greenberger-Horne-Zeilinger (GHZ) quantum correlation were presented, which were claimed to be secure in some kinds of security models. However, this study points out that schemes C and D2 could be attacked by corrupted parties replacing photon and exchanging classical information. © 2011 American Physical Society.


Li X.M.,Beijing Electronic Science and Technology Institute
Applied Mechanics and Materials | Year: 2013

A time delay estimator based on the fractional bispectrum is proposed; and it is suitable for the chirp signal. The proposed time delay estimation technique can outperform the conventional time delay estimation methods associated with the bispectrum in the Fourier domain under the correlated Gaussian noises at lower SNR. Simulation results demonstrate the validity of this estimation method. © (2013) Trans Tech Publications, Switzerland.


Feng Y.,Beijing Electronic Science and Technology Institute
IET Conference Publications | Year: 2013

Compared to IKE protocol, the capability of JFKi anti-DoS attack is stronger. By m-depth study of JFKi protocol. the two kinds of DoS attack that JFKi may still suffer were analyzed. One is low-cost DoS attack which is lower calculation effort spent on the DoS attack, and the other is high-cost DoS attack which is higher calculation effort. To investigate the DoS attacks that JFKi may still suffer, the procedures of these attacks have been described in detail, and the cost of the attacker and the effect of the attacks have been analyzed deeply. Finally, the corresponding improvement solutions for low-cost DoS attack and high-cost DoS attack which influence to the efficiency of JFKi is minor have been proposed.


Zhang J.,Beijing Electronic Science and Technology Institute | Wang Y.,Beijing Electronic Science and Technology Institute
Proceedings of 2nd International Conference on Computer Science and Network Technology, ICCSNT 2012 | Year: 2012

Phishing scam, a fraudulent attempt that masquerades as a trustworthy entity to obtain users' sensitive data, has become the most dangerous form of online fraud to hit online businesses and information security. In this paper, we reveal some new aspects of the common features that appear in the phishing URLs, and introduce a statistical machine learning classifier to detect the phishing sites, which relies on these selected features. Unlike previous studies, we do not utilize an ordinary feature extraction method since some of these features need to be treated differently and some of these cannot be retrieved by the traditional way. A number of comprehensive experiments show that our proposed method achieves high accuracy over a balanced dataset and less than 1% error rates in the simulated real phishing scene with a high processing speed. And moreover, the well performance of our proposed algorithm demonstrates the new characteristics and the corresponding extraction methods are useful in the anti-phishing scenario. © 2012 IEEE.


Wen Y.,Beijing Electronic Science and Technology Institute
2016 6th International Workshop on Computer Science and Engineering, WCSE 2016 | Year: 2016

Based on the actual needs of expanded training course construction and features of expanded project teaching, the paper uses Authorware - A multimedia development tool to process the selected image and video materials and composes a set of comprehensive expanded training courseware for university use. During coursecare preparation, great importance has been attached to advantage, principle and technique of Authorware and course curriculum requirements of expanded training. The practical application of multimedia courseware has greatly improved the initiative of students and achieved excellent teaching results, which will be helpful to achieve the desired multimedia teaching objectives of university expanded training.


Liu B.,Beijing Electronic Science and Technology Institute
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) | Year: 2014

Aiming at the AES cipher chip with rotating S-boxes masking, a new method of correlation power attack was proposed. Firstly, a variance analysis approach was used to identify the time instances when the plaintext blinding and the relevant S-box were computed. Secondly, the random offset of each trace was guessed by calculating the correlation coefficients between hamming weight and the points of masking operation. Lastly, the secret key was revealed by operating correlation power attack using the guessed hamming distance between S-box input and output. Experimental results from attacking 1×104 traces randomly selected in DPA Contest V4 dataset which is publicly available show that this method requires only 45 traces to recovery the key correctly. ©, 2014, Huazhong University of Science and Technology. All right reserved.


Li X.M.,Beijing Electronic Science and Technology Institute
Proceedings of the 2013 6th International Congress on Image and Signal Processing, CISP 2013 | Year: 2013

Image enhancement in the transform domain is an indispensable technique in the image processing area. In this paper, a novel method of image enhancement with respect to the fractional Fourier transform is presented. This method filters image in the fractional Fourier domain instead of the Fourier domain which is usually applied to the classical image enhancement. The fractional Fourier transform has a rotation angle a, characters of image thus change in different transform domain. In a proper fractional Fourier domain with angle a, ideal low-pass filter makes image smoother and ideal high-pass filter loses less information of image than in the traditional Fourier domain, which provides an alternative way to enhance image with proper filter designing. The validity of this method is demonstrated via simulations. © 2013 IEEE.


Li X.M.,Beijing Electronic Science and Technology Institute
2012 5th International Congress on Image and Signal Processing, CISP 2012 | Year: 2012

The definition of the higher-order statistics associated with the fractional Fourier transform is presented in this paper. The proposed fractional higher-order statistics for order greater than two are blind to the additive white or colored Gaussian noise, which is similar to the conventional higher-order statistics; and it is suitable for the chirp signal. The proposed higher-order statistics can outperform the conventional higher-order statistics in the Fourier domain under the correlated Gaussian noises at lower SNR. Simulation results demonstrate the validity of this estimation method. © 2012 IEEE.

Loading Beijing Electronic Science and Technology Institute collaborators
Loading Beijing Electronic Science and Technology Institute collaborators