期刊文献+
共找到170篇文章
< 1 2 9 >
每页显示 20 50 100
免共谋公钥叛逆者追踪方案 被引量:10
1
作者 王青龙 杨波 +1 位作者 韩臻 耿秀华 《通信学报》 EI CSCD 北大核心 2006年第12期6-9,共4页
当参与共谋的叛逆者不超过某个预先给定的范围时,现有的叛逆者追踪方案都可以追踪出至少一个叛逆者,但是如何阻止共谋的发生还是一个有待解决的问题。提出一种新的叛逆者追踪方案,方案中不同用户间的解密钥是不相关的,这样无论多少个用... 当参与共谋的叛逆者不超过某个预先给定的范围时,现有的叛逆者追踪方案都可以追踪出至少一个叛逆者,但是如何阻止共谋的发生还是一个有待解决的问题。提出一种新的叛逆者追踪方案,方案中不同用户间的解密钥是不相关的,这样无论多少个用户都不能通过共谋构造出一个解密钥来,并且能快速准确地追踪出叛逆者,对潜在的不良用户有更好的威慑作用。与现有方案相比,本方案具有更高的传输效率。 展开更多
关键词 叛逆者 不相关 共谋 传输效率
下载PDF
抗战胜利后湖南汉奸审判工作简论
2
作者 李航宇 《档案学刊》 2024年第1期78-84,共7页
抗战胜利后,审判汉奸是湖南高等法院开展的一项重要司法工作。湖南高等法院审判汉奸主要经过一审、复判、再审和执行等司法程序,在审判汉奸的实践过程中实行公开审判、辩护、两审终审等司法制度。湖南高等法院审判汉奸起到了维护战后社... 抗战胜利后,审判汉奸是湖南高等法院开展的一项重要司法工作。湖南高等法院审判汉奸主要经过一审、复判、再审和执行等司法程序,在审判汉奸的实践过程中实行公开审判、辩护、两审终审等司法制度。湖南高等法院审判汉奸起到了维护战后社会秩序的稳定、推动汉奸审判从非常态到常态化的转变和重塑法律的公正权威等成效,同时也存在司法腐败、司法不公和行政干预等不足。 展开更多
关键词 湖南高等法院 汉奸 审判 司法程序 司法制度
原文传递
盟国审判机制下的国民政府审判“台籍战犯”问题 被引量:1
3
作者 刘萍 《台湾历史研究》 2023年第4期13-28,共16页
抗战胜利后对“台籍战犯”进行审判,是中国政府收复国土后,在中国台湾恢复行使国家主权的第一次司法实践。受盟国审判机制及国际法的规约,国民政府始终坚持两个原则:一是对违法战犯坚决进行惩处,二是对违法中国台湾人依据国际法以战犯... 抗战胜利后对“台籍战犯”进行审判,是中国政府收复国土后,在中国台湾恢复行使国家主权的第一次司法实践。受盟国审判机制及国际法的规约,国民政府始终坚持两个原则:一是对违法战犯坚决进行惩处,二是对违法中国台湾人依据国际法以战犯身份审判。由于相关法规出台迟滞,以及司法群体对法的理解存在差异,对“台籍战犯”的身份存在争议。但作为审判战犯最高决策机构的国民政府战争罪犯处理委员会,始终坚持以国际法审判“台籍战犯”,部分司法判决也较好地诠释了国际法,一定程度体现了近代以来司法群体对国际法的理解和接受。 展开更多
关键词 “台籍战犯” 汉奸 战后审判 战争罪犯处理委员会
下载PDF
五四时期“卖国贼”问题中的传播因素研究 被引量:5
4
作者 熊玉文 《南京社会科学》 CSSCI 北大核心 2012年第11期152-156,共5页
巴黎和会期间,梁启超"卖国"的消息传回国内,引起国人对"卖国贼"问题的大讨论。人们在传播中日密约事实性信息的同时,也随之传播签约人责任问题的价值性信息。当国人把"卖国贼"问题从专业术语转换成政治... 巴黎和会期间,梁启超"卖国"的消息传回国内,引起国人对"卖国贼"问题的大讨论。人们在传播中日密约事实性信息的同时,也随之传播签约人责任问题的价值性信息。当国人把"卖国贼"问题从专业术语转换成政治话语后,"多数意见"的社会压力和政府的免职行为,使"沉默"的曹汝霖、章宗祥和陆宗舆成为朝野一致认同的"卖国贼"。 展开更多
关键词 卖国贼 媒体 价值性信息 政治话语
下载PDF
论东北现代家族小说中的叛逆者与边缘人形象 被引量:3
5
作者 刘瑞弘 《北方论丛》 北大核心 2005年第5期34-37,共4页
受五四新文学家族小说“叛逆与救赎”人物塑造模式的影响,东北现代家族小说中的人物,突出地表现出一种对封建家庭制度的叛逆与对精神家园的拯救相交织的复杂的人性特征,以及以男性为主体的封建家庭中没有自我的边缘人的悲剧性命运。析... 受五四新文学家族小说“叛逆与救赎”人物塑造模式的影响,东北现代家族小说中的人物,突出地表现出一种对封建家庭制度的叛逆与对精神家园的拯救相交织的复杂的人性特征,以及以男性为主体的封建家庭中没有自我的边缘人的悲剧性命运。析理和解读这两类人物群体,是探求东北现代家族小说要义的关键所在。 展开更多
关键词 东北 家族小说 叛逆者 边缘人
下载PDF
清代西南边疆地区“汉奸”问题述论 被引量:5
6
作者 黄梅 《云南师范大学学报(哲学社会科学版)》 CSSCI 北大核心 2015年第2期47-59,共13页
在清代出现的"汉奸"一词,作为官方语言初指进入西南边疆地区的不法汉人,此后指称范围有所扩大,亦指损害国家利益的中国人。改土归流后,"汉奸"的不法行为造成西南边疆地区的动乱和汉夷矛盾的加剧,成为西南边疆地区... 在清代出现的"汉奸"一词,作为官方语言初指进入西南边疆地区的不法汉人,此后指称范围有所扩大,亦指损害国家利益的中国人。改土归流后,"汉奸"的不法行为造成西南边疆地区的动乱和汉夷矛盾的加剧,成为西南边疆地区亟待解决的重大问题。清政府制定了一系列防止汉奸产生和作恶的措施并取得一定成效,但清政府以汉夷隔绝为出发点,因而未能彻底解决汉奸问题,但其处理汉奸举措的得失也可为当今民族关系的处理提供借鉴。 展开更多
关键词 清代 西南边疆 汉奸 危害 治策
下载PDF
RCDS:a right-confirmable data-sharing model based on symbol mapping coding and blockchain 被引量:1
7
作者 Liang WANG Shunjiu HUANG +2 位作者 Lina ZUO Jun LI Wenyuan LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第8期1194-1213,共20页
The problem of data right confirmation is a long-term bottleneck in data sharing.Existing methods for confirming data rights lack credibility owing to poor supervision,and work only with specific data types because of... The problem of data right confirmation is a long-term bottleneck in data sharing.Existing methods for confirming data rights lack credibility owing to poor supervision,and work only with specific data types because of their technical limitations.The emergence of blockchain is followed by some new data-sharing models that may provide improved data security.However,few of these models perform well enough in confirming data rights because the data access could not be fully under the control of the blockchain facility.In view of this,we propose a right-confirmable data-sharing model named RCDS that features symbol mapping coding(SMC)and blockchain.With SMC,each party encodes its digital identity into the byte sequence of the shared data by generating a unique symbol mapping table,whereby declaration of data rights can be content-independent for any type and any volume of data.With blockchain,all data-sharing participants jointly supervise the delivery and the access to shared data,so that granting of data rights can be openly verified.The evaluation results show that RCDS is effective and practical in data-sharing applications that are conscientious about data right confirmation. 展开更多
关键词 Data right confirmation Symbol mapping coding Blockchain Data sharing traitor tracing Access control
原文传递
Pirate decoder for the broadcast encryption schemes from Crypto 2005 被引量:2
8
作者 WENG Jian LIU ShengLi CHEN KeFei 《Science in China(Series F)》 2007年第3期318-323,共6页
In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they giv... In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they give an open question to construct a traitor tracing algorithm for their broadcast encryption schemes, and combine the two systems to obtain an efficient trace-and-revoke system. In this paper, we give a negative answer to their open question. More precisely, we show that three or more insider users are able to collude to forge a valid private key for pirate decoding against their schemes. Moreover, we prove that there exists no traitor tracing algorithm to identify the colluders. Our pirate decoding can also similarly be applied to Lee et al.'s broadcast encryption schemes in ISPEC'06. 展开更多
关键词 broadcast encryption pirate decoder traitor tracing
原文传递
An Improved Traitor Tracing Scheme Based on Bilinear Map 被引量:2
9
作者 ZHANG Xuejun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期5-8,共4页
T6 et al presented a bilinear-map-based traitor tracing scheme(TSZ scheme) with revocation, but it is a symmetric scheme because it does not provide non-repudiation. In this paper, an improved TSZ scheme was propose... T6 et al presented a bilinear-map-based traitor tracing scheme(TSZ scheme) with revocation, but it is a symmetric scheme because it does not provide non-repudiation. In this paper, an improved TSZ scheme was proposed by using oblivious polynomial evaluation (OPE) protocol and service parameters. Under the recondition of general sameness capabilities of both TSZ and improved TSZ scheme, the new scheme adds some advantages such as providing multi-service capability, user's non-repudiation and data provider's no-framing innocent users. Furthermore, it is also proved to be semantically secure under the decisional bilinear Diffie-Hellman (DBDH problem) assumption. 展开更多
关键词 bilinear map traitor tracing MULTI-SERVICE asymmetry
下载PDF
Broadcast encryption schemes based on RSA 被引量:2
10
作者 MU Ning-bo HU Yu-pu OU Hai-wen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第1期69-75,共7页
Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the problem of data redundancy when the size of receiver set is small. In the proposed schemes, the center... Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the problem of data redundancy when the size of receiver set is small. In the proposed schemes, the center uses one key to encrypt the message and can revoke authorization conveniently. Every authorized user only needs to store one decryption key of a constant size. Among these three schemes, the first one has indistinguishability against adaptive chosen ciphertext attack (IND-CCA2) secure, and any collusion of authorized users cannot produce a new decryption key but the sizes of encryption modulus and ciphertext are linear in the number of receivers. In the second scheme, the size of ciphertext is half of the first one and any two authorized users can produce a new decryption key, but the center can identify them using the traitor tracing algorithm. The third one is the most efficient but the center cannot identify the traitors exactly. 展开更多
关键词 broadcast encryption traitor tracing authorization revocation RSA
原文传递
时代的叛逆者——霍尔顿形象分析 被引量:3
11
作者 焦玲玲 《牡丹江师范学院学报(社会科学版)》 2009年第2期29-30,共2页
塞林格凭借《麦田里的守望者》一举成名,其笔下的主人公霍尔顿是一位时代的叛逆者。本文就叛逆的时代、叛逆的作者和叛逆的霍尔顿形象进行了分析,阐述了内心充满矛盾时代的叛逆者霍尔顿不能与人沟通,以至于逃离学校、家庭、社会,最终走... 塞林格凭借《麦田里的守望者》一举成名,其笔下的主人公霍尔顿是一位时代的叛逆者。本文就叛逆的时代、叛逆的作者和叛逆的霍尔顿形象进行了分析,阐述了内心充满矛盾时代的叛逆者霍尔顿不能与人沟通,以至于逃离学校、家庭、社会,最终走向精神崩溃的历程。 展开更多
关键词 霍尔顿 时代 叛逆者
下载PDF
New scheme of dynamic traitor tracing against the immediate rebroadcast attack
12
作者 苏加军 王新梅 《Journal of Beijing Institute of Technology》 EI CAS 2015年第1期128-132,共5页
Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using... Traitor tracing schemes are introduced to combat the piracy scenarios. The notation of dynamic traitor tracing is proposed by Fiat and Tassa, which fights against rebroadcast of decrypted content. In this paper, using the idea of searching user address level by level, a new dynamic traitor tracing scheme based on a multilevel structure of user set is constructed. The scheme proposed can efficiently combat with the immediate rebroadcast attack, and possesses lower tracing complexity. Importantly, the tracing scheme can be applicable to systems with different sizes of subscriber sets. 展开更多
关键词 traitor tracing copyright protection rebroadcast attack WATERMARKING
下载PDF
基于RSA的叛逆者追踪方案的设计与分析
13
作者 齐亚莉 《北京印刷学院学报》 2012年第2期55-56,59,共3页
叛逆者追踪方案是版权保护中的重要工具。基于RSA算法的安全性,设计叛逆者追踪方案,数据分发者分别为每个用户进行初始化,使每个用户都具有标志性的用户信息,可准确地追踪到叛逆者。对方案进行分析后得出结论:为保证安全性,需要不断增... 叛逆者追踪方案是版权保护中的重要工具。基于RSA算法的安全性,设计叛逆者追踪方案,数据分发者分别为每个用户进行初始化,使每个用户都具有标志性的用户信息,可准确地追踪到叛逆者。对方案进行分析后得出结论:为保证安全性,需要不断增加密钥长度,但其不可否认性和防诬陷性使该追踪算法的应用受到一定限制。 展开更多
关键词 叛逆者 RSA 黑盒测试 可撤销性
下载PDF
Efficient Broadcast Encryption Scheme Based on Number Theory Research Unit
14
作者 ZHANG Weidong LU Xixiang LI Hui 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期247-250,共4页
In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive public key cryptosystem NTRU (number theory research unit). In our scheme, we use the idea of RSA a... In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive public key cryptosystem NTRU (number theory research unit). In our scheme, we use the idea of RSA and develop this idea from two-party to multi-party, and combine this multi-party public key idea with the multiplication in ring R of NTRU. What we get from this design is extremely efficient encryption and decryption, fast and easy key creation, low memory requirements and revocation property, etc. Moreover, this novel work contains other desirable features, such as traitor tracing. With its complexity only O(log2n), the tracing algorithm of this system is more efficient than that of the previous ones. 展开更多
关键词 broadcast encryption traitor tracing software protection information security
原文传递
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
15
作者 吴永东 Member, IEEE 邓慧杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第2期362-374,共13页
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of... In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of defeating most multiple-round based traitor tracing schemes such as the schemes based on the black-box confirmation method. In particular, the proposed pirate decoder is customized to defeat the private key and the public key fully collusion resistant traitor tracing (FTT) schemes, respectively. We show how the decoder prolongs a trace process so that the tracer has to give up his effort. FTT schemes are designed to identify all the traitors. We show that decoder enables the FTT schemes to identify at most 1 traitors. Finally, assuming the decoder is embedded with several bytes of memory, we demonstrate how the decoder is able to frame innocent users at will. 展开更多
关键词 broadcast encryption multi-key pirate decoder traitor tracing
原文传递
Anonymous and Unlinkable Membership Authentication with Illegal Privilege Transfer Detection
16
作者 Sung-Ming Yen Tsung-Min Kuo Tzu-Yu Yang 《International Journal of Communications, Network and System Sciences》 2018年第2期9-26,共18页
Anonymous authentication schemes, mostly based on the notion of group signatures, allow a group member to obtain membership from a server and gain access rights if the member can prove their authenticity to the verifi... Anonymous authentication schemes, mostly based on the notion of group signatures, allow a group member to obtain membership from a server and gain access rights if the member can prove their authenticity to the verifier. However, existing authentication schemes are impractical because they neglect to provide an exclusive verification of the blacklist. In addition, the schemes are unaware of malicious members who are involved in privilege transferring. In this paper, a novel membership authentication scheme providing detection of membership transfer and proof of membership exclusiveness to the blacklist is proposed. 展开更多
关键词 ANONYMOUS AUTHENTICATION Schemes traitor TRACING REVOCATION of MEMBERSHIP Dynamic MEMBERSHIP
下载PDF
鄂尔泰对西南地区“汉奸”的认识及治理 被引量:2
17
作者 张姗 《贵州文史丛刊》 2013年第4期62-66,共5页
鄂尔泰的西南治理对象,除了少数民族土司与普通民众外,还有一个特殊群体——"汉奸"。由于"汉奸"既威胁到清政府在西南地区的统治深入,也暴露了西南地区特别是贵州地区吏治的松弛,鄂尔泰在雍正帝的支持下对其进行了... 鄂尔泰的西南治理对象,除了少数民族土司与普通民众外,还有一个特殊群体——"汉奸"。由于"汉奸"既威胁到清政府在西南地区的统治深入,也暴露了西南地区特别是贵州地区吏治的松弛,鄂尔泰在雍正帝的支持下对其进行了两次集中打击。同时,鄂尔泰企图通过实行"民族隔离"政策,在贵州苗疆地区杜绝"汉奸"的进入,但是这种极端做法不仅没有消灭"汉奸",而且影响了民族之间的正常交往。 展开更多
关键词 鄂尔泰 贵州苗疆 汉奸 人口贩卖
下载PDF
浅议甲午战争中的汉奸 被引量:2
18
作者 孙洪军 《广西师范大学学报(哲学社会科学版)》 CSSCI 2008年第2期115-119,共5页
甲午战争中汉奸的种种通敌叛国行为,在很大程度上便利了日军的攻略行动和对占领区人民的统治,是导致清朝抵抗日本侵略失败的一个重要原因。清政府采取了一系列措施防范和惩处汉奸,但效果不佳。甲午战争中的汉奸问题值得重视。
关键词 甲午战争 清朝 汉奸 惩处
下载PDF
鸦片战争时期“汉奸”人员构成问题研究 被引量:2
19
作者 金峰 《广州大学学报(社会科学版)》 2006年第6期85-89,共5页
鸦片战争时期,汉奸问题涉及相当广泛的社会阶层,使得汉奸的人员构成极为复杂。清政府对于汉奸的人员构成情况所作的分析,虽有一定的依据,但由于在认识上存在着重大的偏差,使得这一问题更加复杂,问题的严重性也被显著夸大,反而不利于这... 鸦片战争时期,汉奸问题涉及相当广泛的社会阶层,使得汉奸的人员构成极为复杂。清政府对于汉奸的人员构成情况所作的分析,虽有一定的依据,但由于在认识上存在着重大的偏差,使得这一问题更加复杂,问题的严重性也被显著夸大,反而不利于这一问题的有效解决。 展开更多
关键词 鸦片战争 汉奸 人员构成
下载PDF
魏晋南北朝时期曹操形象的演变 被引量:2
20
作者 李同恩 《中州学刊》 CSSCI 北大核心 2018年第7期133-137,共5页
魏晋南北朝时期,曹操的形象从"英雄"到"枭雄""奸雄",再到"奸贼",发生了巨大变化,尤其东晋是曹操形象的一大转关。南北朝时期的笔记小说也继承史书所载,使曹操的形象所表现的方面更为丰富。曹... 魏晋南北朝时期,曹操的形象从"英雄"到"枭雄""奸雄",再到"奸贼",发生了巨大变化,尤其东晋是曹操形象的一大转关。南北朝时期的笔记小说也继承史书所载,使曹操的形象所表现的方面更为丰富。曹操形象的复杂性与变动性,是在不同时代的政治、文化背景下呈现出来的,有着深刻的社会历史原因,是当时社会意识形态的集中反映。这种立体化的历史形象与文学形象,为南宋以后曹操形象的确立奠定了基础,也造就了一种独特的历史文化现象。 展开更多
关键词 曹操形象 英雄 奸雄 奸贼 演变
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部