期刊文献+
共找到606篇文章
< 1 2 31 >
每页显示 20 50 100
East Meets West:A Study of Maritime Silk Road Trade from the 8th to the Early 13th Century
1
作者 Chen Yexuan 《China Book International》 2024年第2期30-33,共4页
The earliest known Chinese envoy to the Abbasid Caliphate was the Yang Liangyao mission during the Zhenyuan Era of Emperor Dezong of the Tang Dynasty,as recorded in the Inscription of Yang Liangyao's Spirit Way.Mr... The earliest known Chinese envoy to the Abbasid Caliphate was the Yang Liangyao mission during the Zhenyuan Era of Emperor Dezong of the Tang Dynasty,as recorded in the Inscription of Yang Liangyao's Spirit Way.Mr.Rong Xinjiang surmises,“As an official envoy of the Tang Dynasty,Yang Liangyao would likely have chosen to use the dynasty's ships”So,what did Yang Liangyao's sailboat look like?The Inscription of Yang Liangyao's Spirit Way provides only this basic description of Yang Liangyao's sea voyage:“Raising sails to cut through the mist-filled air,rowing across the vast expanse of water.By night,guided by divine lamps for direction.By day,led forward by mythical beasts”. 展开更多
关键词 FILLED chosen SPIRIT
原文传递
Hope and Healing
2
作者 Wang Ruohan 《Beijing Review》 2024年第39期38-39,共2页
Ronald McDonald House in Beijing was filled with warmth and laughter as it celebrated its third anniversary on September 9.A group of children,along with their parents and many volunteers,gathered in this warm and car... Ronald McDonald House in Beijing was filled with warmth and laughter as it celebrated its third anniversary on September 9.A group of children,along with their parents and many volunteers,gathered in this warm and caring charitable organization to mark the occasion.Ronald McDonald delighted the kids with carefully chosen gifts,while volunteers organized a variety of engaging games.They all enjoyed cakes together,in an atmosphere of joy. 展开更多
关键词 FILLED ANNIVERSARY chosen
原文传递
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model 被引量:1
3
作者 孙瑾 胡予濮 张乐友 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第6期672-676,共5页
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos... To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained simultaneously.The reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable assumption.So the security level is improved,and it is suitable for higher security environment. 展开更多
关键词 the standard model provably secure broadcast encryption the chosen ciphertext security the self-adaptive chosen identity security
原文传递
韩国“高丽·朝鲜”时期的华人汉语教师 被引量:5
4
作者 文美振 《暨南大学华文学院学报》 2005年第2期1-7,共7页
中国从汉代就开始实行对外汉语教育,韩国从中国五代时期开始实行汉语教学,虽然比中国晚,但延续到清末一直没有中断。有对外汉语教学,就有对外汉语教师。韩国“高丽·朝鲜”时期的汉语教学机构都由国家设立,高丽、朝鲜政府为了提供... 中国从汉代就开始实行对外汉语教育,韩国从中国五代时期开始实行汉语教学,虽然比中国晚,但延续到清末一直没有中断。有对外汉语教学,就有对外汉语教师。韩国“高丽·朝鲜”时期的汉语教学机构都由国家设立,高丽、朝鲜政府为了提供更好的汉语学习条件,千方百计聘请以汉语为母语的汉籍教师。本文从《高丽史》和《朝鲜王朝实录》中发掘有关华人汉语教师的史实并加以整理,希望能够给编写对外汉语教学史提供一些资料。 展开更多
关键词 高丽 朝鲜 汉语教学 汉语教师 留学生
下载PDF
An improved image encryption algorithm based on chaotic maps 被引量:3
5
作者 徐淑奖 王继志 杨素香 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第11期4027-4032,共6页
Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover... Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext. Furthermore, it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext. Based on the given analysis, it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance. 展开更多
关键词 CHAOS chaotic cryptosystem image encryption chosen plaintext attack
下载PDF
Threshold public key encryption scheme resilient against continual leakage without random oracles 被引量:2
6
作者 Xiujie ZHANG Chunxiang XU +1 位作者 Wenzheng ZHANG Wanpeng LI 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第6期955-968,共14页
Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how ... Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how to correctly decrypt a ciphertext where all servers continually leak information about their secret keys to an external attacker. Dodis et al. and Akavia et al. show two concrete schemes on how to store secrets on continually leaky servers. However, their construc- tions are only interactive between two servers. To achieve continual leakage security among more than two servers, we give the first threshold public key encryption scheme against adaptively chosen ciphertext attack in the continual leak- age model under three static assumptions. In our model, the servers update their keys individually and asynchronously, without any communication between two servers. Moreover, the update procedure is re-randomized and the randomness can leak as well. 展开更多
关键词 leakage-resilient continual leakage Threshold Public Key Encryption adaptive chosen ciphertext security standard model
原文传递
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption 被引量:2
7
作者 赖俊祚 朱文涛 +2 位作者 邓慧杰 刘胜利 寇卫东 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第4期793-806,共14页
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public... We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public key of a delegator (say Alice), into a new ciphertext that is protected under the public key of a delegatee (say Bob), and thus the same message can then be recovered with Bob's private key. In this paper, in the identity-based setting, we first investigate the relationship between so called mediated encryption and unidirectional PRE. We provide a general framework which converts any secure identity-based unidirectional PRE scheme into a secure identity-based mediated encryption scheme, and vice versa. Concerning the security for unidirectional PRE schemes, Ateniese et al. previously suggested an important property known as the master secret security, which requires that the coalition of the proxy and Bob cannot expose Alice's private key. In this paper, we extend the notion to the identity-based setting, and present an identity-based unidirectional PRE scheme, which not only is provably secure against the chosen eiphertext attack in the standard model but also achieves the master secret security at the same time. 展开更多
关键词 identity-based encryption (IBE) unidirectional proxy re-encryption mediated encryption (mE) chosen ci-phertext attack (CCA) master secret security (MSS).
原文传递
Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices 被引量:2
8
作者 王兴元 刘林涛 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期198-202,共5页
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recove... A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack. 展开更多
关键词 CRYPTANALYSIS chosen plaintext attack image encryption chaotic map lattice
下载PDF
不同培养基上苜蓿假盘菌生长状况及形态学研究 被引量:3
9
作者 王蓟花 史娟 于有志 《农业科学研究》 2007年第1期15-17,共3页
对苜蓿假盘菌在11种培养基上的生长状况进行比较筛选,发现除V-8碳酸钙培养基适于苜蓿假盘菌的生长外,苜蓿汁液培养基、番茄汁培养基、马铃薯胡萝卜汁培养基等也适于假盘菌的生长.并对苜蓿假盘菌的菌落颜色、菌丝形态特征等生物学特性做... 对苜蓿假盘菌在11种培养基上的生长状况进行比较筛选,发现除V-8碳酸钙培养基适于苜蓿假盘菌的生长外,苜蓿汁液培养基、番茄汁培养基、马铃薯胡萝卜汁培养基等也适于假盘菌的生长.并对苜蓿假盘菌的菌落颜色、菌丝形态特征等生物学特性做了补充研究. 展开更多
关键词 培养基 苜蓿假盘菌 筛选 形态 褐斑病
下载PDF
Spray Characteristics of Biodiesel Fuel in Constant Volume Chamber using Multi-response Optimization Technique 被引量:3
10
作者 P.Raghu N.Nallusamy 《Journal of Thermal Science》 SCIE EI CAS CSCD 2016年第6期581-588,共8页
This study discusses about the optimization of spray characteristics of biodiesel fuel in a spray chamber.Three factors namely,fuel injection pressure,fuel temperature and fuel blends were chosen as the influencing fa... This study discusses about the optimization of spray characteristics of biodiesel fuel in a spray chamber.Three factors namely,fuel injection pressure,fuel temperature and fuel blends were chosen as the influencing factor for the set objective.Four levels were chosen in each factor and spray tip penetration,spray cone angle and Sauter mean diameter(SMD) were taken as the response variables.Experiments were designed by employing design of experiments method and Taguchi full factorial array was used to conduct the tests with different levels of the chosen factors.Multi Response Signal to Noise ratio(MRSN) was calculated for the response variables and the optimum combination level of factors was obtained simultaneously using Taguchi's parametric design.Confirmation experiments were conducted for the obtained optimum combination level of factors and the results were compared with the normal operating conditions and significant improvement were observed in the response variables. 展开更多
关键词 spray penetration factorial weighting chosen conduct chamber parametric normalized blends
原文传递
INTRODUCTION TO THE JOURNAL 被引量:3
11
作者 赵伟 李昂 +2 位作者 赵庆州 樊柄宏 翟洪达 《陕西电力》 2015年第1期6-9,65,共5页
Shaanxi Electric Power(monthly issue)is a science and technology journal which is administrated by State Grid Corporation of China,sponsored by Shaanxi Electric Power Corporation.The journal mainly reflects the new ... Shaanxi Electric Power(monthly issue)is a science and technology journal which is administrated by State Grid Corporation of China,sponsored by Shaanxi Electric Power Corporation.The journal mainly reflects the new achievement,new technology,new trend in the fields ofdomestic&international energy,electric technology.The scopeofShaanxi Electric Power covers new energy and distributed power generation, 展开更多
关键词 INSTRUMENTS INTELLIGENT ECONOMICS RELAY chosen SAVING
下载PDF
Cryptanalysis on an image block encryption algorithm based on spatiotemporal chaos 被引量:1
12
作者 王兴元 何国祥 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期77-83,共7页
An image block encryption scheme based on spatiotemporal chaos has been proposed recently. In this paper, we analyse the security weakness of the proposal. The main problem of the original scheme is that the generated... An image block encryption scheme based on spatiotemporal chaos has been proposed recently. In this paper, we analyse the security weakness of the proposal. The main problem of the original scheme is that the generated keystream remains unchanged for encrypting every image. Based on the flaws, we demonstrate a chosen plaintext attack for revealing the equivalent keys with only 6 pairs of plaintext/ciphertext used. Finally, experimental results show the validity of our attack. 展开更多
关键词 ENCRYPTION spatiotemporal chaos chosen plaintext attack equivalent keys
下载PDF
How to signcrypt a message to designated group 被引量:1
13
作者 MA Chun-bo LI Jian-hua AO Jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第4期57-63,共7页
In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distr... In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distributed networks, Anyone in this scheme can signcrypt a message and distribute it to a designated group, and any member in the receiving group can unsigncrypt the ciphertext. The ciphertext and public key in the scheme are of constant size. In addition, this new scheme offers public verification of the ciphertext. This property is very important to the large-scale group communication since the gateway can filter the incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given to show that the scheme is secure against chosen ciphertext attack and existential forgery. 展开更多
关键词 BROADCAST SIGNCRYPTION designated group chosen ciphertext attack existential forgery random oracle model
原文传递
A FUNCTIONAL EQUATION FOR ENUMERATING NONSEPARABLE PLANAR MAPS WITH VERTEX PARTITION 被引量:2
14
作者 刘彦佩 《Chinese Science Bulletin》 SCIE EI CAS 1986年第2期73-77,共5页
A map is a 2-cell embedding of a graph on the surface. If the surface is the plane, or the sphere, the map is called a planar map. A map is said to be rooted, if one of its edges is marked with a direction chosen befo... A map is a 2-cell embedding of a graph on the surface. If the surface is the plane, or the sphere, the map is called a planar map. A map is said to be rooted, if one of its edges is marked with a direction chosen beforchand. The marked edge is called the root-edge; its tail vertex, the root-vertex; the face on the right-hand side of the root-edge, the root-face. Without loss of generality, the root-face may be chosen as the infinite face. 展开更多
关键词 VERTEX EMBEDDING chosen planar MARKED INFINITE generating satisfied grange RESULTANT
原文传递
PDA在静脉输液自动监控系统中的应用研究 被引量:2
15
作者 温明锋 陈健超 李宇明 《中国卫生信息管理杂志》 2010年第5期65-67,共3页
本文针对PDA在医疗行业的应用,结合"医院静脉输液自动监控系统的设计与实现"研究课题,对PDA的选择、开发、应用及软件设计进行了研究、探讨。
关键词 PDA 选择 应用 软件设计
下载PDF
哈依穆·波特克创作主题探析
16
作者 曾艳钰 《外语与外语教学》 北大核心 2004年第2期28-30,共3页
哈依穆·波特克是当代美国“犹太味”最浓、最独特的作家。他以其独特的视角对当代美国犹太生活进行了切实探微。波特克的小说多以世俗世界中犹太人的宗教、历史和文化经历为题材,以皈依犹太神学和礼拜仪式的犹太人为原型人物,以... 哈依穆·波特克是当代美国“犹太味”最浓、最独特的作家。他以其独特的视角对当代美国犹太生活进行了切实探微。波特克的小说多以世俗世界中犹太人的宗教、历史和文化经历为题材,以皈依犹太神学和礼拜仪式的犹太人为原型人物,以犹太会堂、学校及虔诚的犹太家庭为背景,反映出宗教与社会、个人需求与集体信仰、传统与现代、父与子之间的冲突与矛盾。而在冲突与矛盾中表现出波特克对传统“强者-选民”伦理主题的复归。 展开更多
关键词 哈依穆·波特克 犹太复国主义 哈西德主义 强者-选民
下载PDF
Broadcast group-oriented encryption secure against chosen ciphertext attack
17
作者 Ma Chunbo Ao Jun Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期811-817,共7页
A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in... A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in the designated group has the ability to independently decrypt a ciphertext. In contrast to traditional broadcast encryption, all the valid receivers in the proposed scheme compose the designated group. To take advantage of this property, a tab for the group is set and the matching private key for each member is generated. In addition, before decrypting a ciphertext, anyone in the scheme can verify the ciphertext, to ensure that the ciphertext is correct. This property is very important for large-scale group communication, as the gateway can filter incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given, to show that the proposed scheme is secure against the adaptively chosen ciphertext attack. 展开更多
关键词 BROADCAST group-oriented encryption chosen ciphertext attack public verification
下载PDF
Instantiate Random Oracles in OAEP with Pseudorandom Functions
18
作者 JIA Xiaoying LI Hongda LI Bao 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期651-656,共6页
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti... This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes. 展开更多
关键词 random oracle(RO) model INSTANTIATION optimal asymmetric encryption padding(OAEP) indistinguishable securitity against adaptive chosen ciphertext attack (IND-CCA2)
原文传递
The Study of the Image "Ark" in America
19
作者 孙小静 《海外英语》 2011年第7X期364-366,共3页
The images of "boat" and "ark" are often used as metaphors by all walks of life ranging from statesmen to the film makers in America.There are also many boats or arks in American society.From the N... The images of "boat" and "ark" are often used as metaphors by all walks of life ranging from statesmen to the film makers in America.There are also many boats or arks in American society.From the Noah Ark in old times to the ark in the film 2012,they all play an important role,because they reflect the different trends of values,faith and ideology in different periods of America.Based on the three following texts:Old Testaments,Lifeboat Ethnic and 2012:Doomsday,it will reveal the values of materialism and pragmatism which are shown in contemporary American. 展开更多
关键词 Noah ARCH LIFEBOAT ETHNIC 2012 standards of 'chosen people' MATERIALISM PRAGMATISM
下载PDF
Monitoring of PON System Using Compound Surveillance Technique
20
作者 Sun-Chien Ko Hsiu-Jung Chuang +2 位作者 Si-Chong Chen Chih-Yih Wang Sheng-Fwu Lin 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第2期169-173,共5页
A passive optical network(PON) monitoring system combined light pulse and frequency sweep techniques is proposed and verified in a field test. The light pulse surveys over the all whole network and the frequency swe... A passive optical network(PON) monitoring system combined light pulse and frequency sweep techniques is proposed and verified in a field test. The light pulse surveys over the all whole network and the frequency sweep are used to investigate any fault in the link. The field test is performed with 4 PONs. Each PON is monitored at 4 ports, one is the splitter port and the other three are arbitrary chosen multiple optical units(ONUs). All the tested PONs are monitored in turns once per hour. Faults at the feeder and branch fiber have been observed in this field test and have been analyzed with the monitoring system. 展开更多
关键词 verified arbitrary monitored splitter branch chosen reflective turns restoration realistic
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部