From February 1990 to January 1991, the measurement experiment was carried out at Zhongshan station, East Antarctica. In the experiment, measurements of the surface radiative fluxes and wind, temperature and humidity ...From February 1990 to January 1991, the measurement experiment was carried out at Zhongshan station, East Antarctica. In the experiment, measurements of the surface radiative fluxes and wind, temperature and humidity profiles in the lowest 32 m in the atmosphere boundary layer were made throughout the year. The regime of the surface energy balance was analysed based on the observed data. The conclusion was derived that in warm season (from Nov. to Feb.), large amounts of energy are absorbed by the surface and then transported to the atmosphere in the form of sensible and latent heat, while in cold season (from Mar. to Oct.) continually radiative cooling of the surface occurs.展开更多
Cloud computing has reached the peak of Gartner hype cycle,and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment.But data privacy and communication issues will oc...Cloud computing has reached the peak of Gartner hype cycle,and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment.But data privacy and communication issues will occur with the increment of the cloud data storage.The key privacy concern for scalability is caused by the dynamic membership allocation and multi-owner data sharing.This paper addresses the issues faced by multiple owners through a mutual authentication mechanism using the Enhanced Elliptic Curve Diffie-Hellman(EECDH)key exchange protocol along with the Elliptic Curve Digital Signature Algorithm(ECDSA).The proposed EECDH scheme is used to exchange the secured shared key among multiple owners and also to eliminate the Man-In-The-Middle(MITM)attacks with less computational complexity.By leveraging these algorithms,the integrity of data sharing among multiple owners is ensured.The EECDH improves the level of security only slightly increasing the time taken to encrypt and decrypt the data,and it is secured against the MITM attacks,which is experimented using the AVISPA tool.展开更多
Communication security involves all aspects of the country and society,and financial security is of top priority.Through strong supervision and strong technical means,a“semaphore”file exchange station is established...Communication security involves all aspects of the country and society,and financial security is of top priority.Through strong supervision and strong technical means,a“semaphore”file exchange station is established.The data transmission system is composed of a sending server,a receiving server,and a“semaphore”communication box.Physical connections between internal and external networks are eliminated to achieve the purpose of“physical isolation”and“secure file transfer”.展开更多
基金Project supported by the National Natural Science Foundation of China and State Antarctic Committee of China.
文摘From February 1990 to January 1991, the measurement experiment was carried out at Zhongshan station, East Antarctica. In the experiment, measurements of the surface radiative fluxes and wind, temperature and humidity profiles in the lowest 32 m in the atmosphere boundary layer were made throughout the year. The regime of the surface energy balance was analysed based on the observed data. The conclusion was derived that in warm season (from Nov. to Feb.), large amounts of energy are absorbed by the surface and then transported to the atmosphere in the form of sensible and latent heat, while in cold season (from Mar. to Oct.) continually radiative cooling of the surface occurs.
文摘Cloud computing has reached the peak of Gartner hype cycle,and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment.But data privacy and communication issues will occur with the increment of the cloud data storage.The key privacy concern for scalability is caused by the dynamic membership allocation and multi-owner data sharing.This paper addresses the issues faced by multiple owners through a mutual authentication mechanism using the Enhanced Elliptic Curve Diffie-Hellman(EECDH)key exchange protocol along with the Elliptic Curve Digital Signature Algorithm(ECDSA).The proposed EECDH scheme is used to exchange the secured shared key among multiple owners and also to eliminate the Man-In-The-Middle(MITM)attacks with less computational complexity.By leveraging these algorithms,the integrity of data sharing among multiple owners is ensured.The EECDH improves the level of security only slightly increasing the time taken to encrypt and decrypt the data,and it is secured against the MITM attacks,which is experimented using the AVISPA tool.
文摘Communication security involves all aspects of the country and society,and financial security is of top priority.Through strong supervision and strong technical means,a“semaphore”file exchange station is established.The data transmission system is composed of a sending server,a receiving server,and a“semaphore”communication box.Physical connections between internal and external networks are eliminated to achieve the purpose of“physical isolation”and“secure file transfer”.