期刊文献+
共找到12,085篇文章
< 1 2 250 >
每页显示 20 50 100
An Identity-Based Strong Designated Verifier Proxy Signature Scheme 被引量:3
1
作者 WANG Qin CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1633-1635,共3页
In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ... In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements. 展开更多
关键词 strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing
下载PDF
Threshold Subliminal Channel Based on Designated Verifier Signature 被引量:1
2
作者 SU Li CUI Guohua YANG Muxiang CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1485-1488,共4页
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess... The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient. 展开更多
关键词 THRESHOLD subliminal channel designated verifier signature digital signature
下载PDF
GROWTH OF NEW DESIGNATED CITIES IN CHINA
3
作者 顾朝林 甄峰 +1 位作者 邱友良 叶舜赞 《Chinese Geographical Science》 SCIE CSCD 1999年第2期1-10,共10页
The opening of the economy has contributed to the rapid urban development in China over the last 17 years from 1979 to 1996. It is worthwhile to note three new development trends of Chinese urban system. The first tr... The opening of the economy has contributed to the rapid urban development in China over the last 17 years from 1979 to 1996. It is worthwhile to note three new development trends of Chinese urban system. The first trend identifies the emergence of mega urbanization regions. The second trend rebuilds a closer tie between the Chinese urban system and the global urban system through the development of the world (global) cities and international cities. The third trend shows the fast polarized development in hinterlands and peripheries around advanced economic regions. However, the research literature on Chinese urbanization in English has shown the scarcity of good databanks and the analysis results are incomplete. Some researchers also always question the quality of the data. Using the most completed and most recent data, this paper reviews the growth of China's new designated cities since 1949. This paper also seeks to examine the various policies and to explore the underlying factors that have affected the growth of China new cities. From the development of China's cities in the past 47 years from 1949 to 1996, it is easy to find that metropolitan cities developed with a relatively high rate compared with smaller ones, but the ratio of number and population to whole country cities remained stable; Chinese urban system development had entered a phase of small cities development; in terms of cities regional distribution, the south and east region is still the central area of urban development. 展开更多
关键词 URBANIZATION NEW designated CITY China CITIES URBAN development
下载PDF
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT
4
作者 Kyungroul Lee Kangbin Yim 《Digital Communications and Networks》 SCIE CSCD 2022年第2期124-131,共8页
With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking servic... With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking services.For this reason,a countermeasure is required to improve the security of the online identification process.The current security and authentication mechanisms applied to financial services,such as Internet banking services for 5G-enabled IoT,do not ensure security.In this paper,a transaction-linkage technique with which the designated terminal is combined is proposed to solve this fundamental problem.The technique improves the security of online identification mechanisms because it is possible to counteract all of the existing security threats.The proposed technique supports mutual authentication and is safe from eavesdropping attacks,replay attacks,spoofing attacks,and service-denial attacks.Moreover,the technique supports non-repudiation by storing the transaction history in a transaction-linkage device.We believe that the security of Internet-banking services for 5G-enabled IoT will be increased through the utilization of the proposed technique. 展开更多
关键词 Transaction-linkage technique designated terminal Internet banking Online-authentication mechanism 5G-enabled IoT
下载PDF
Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
5
作者 ZHANG Jianhong ZOU Wei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1903-1906,共4页
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the... Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable. 展开更多
关键词 oblivious transfer designated verifier EFFICIENCY
下载PDF
Multi-Hazard Evaluation Using Cluster Analysis—For Designated Evacuation Centers of Yokohama
6
作者 Tsutomu Ochiai Takahisa Enomoto 《Journal of Geographic Information System》 2021年第2期243-259,共17页
Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are lik... Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are likely not aware of the specific types of disaster. So, first of all, we need to know what kind<span style="font-family:;" "="">s</span><span style="font-family:;" "=""> of hazards are important. However, the information that integrates multiple hazards is not well maintained, and there are few such studies. On the other hand, in Japan, a lot of hazard information is being released on the Internet. So, we summarized and assessed hazard data that can be accessed online regarding shelters (where evacuees live during disasters) and their catchments (areas assigned to each shelter) in Yokohama City, Kanagawa Prefecture. Based on the results, we investigated whether a grouping by cluster analysis would allow for multi-hazard assessment. We used four natural disasters (seismic, flood, tsunami, sediment disaster) and six parameters of other population and senior population. However, since the characteristics of the population and the senior population were almost the same, only population data was used in the final examination. From the cluster analysis, it was found that it is appropriate to group the designated evacuation centers in Yokohama City into six groups. In addition, each of the six groups was found <span>to have explainable characteristics, confirming the effectiveness of multi-hazard</span> creation using cluster analysis. For example, we divided, all hazards are low, both flood and Seismic hazards are high, sediment hazards are high, etc. In many Japanese cities, disaster prevention measures have been constructed in consideration of ground hazards, mainly for earthquake disasters. In this paper, we confirmed the consistency between the evaluation results of the multi-hazard evaluated here and the existing ground hazard map and examined the usefulness of the designated evacuation center. Finally, the validity was confirmed by comparing this result with the ground hazard based on the actual measurement by the past research. In places where the seismic hazard is large, the two are consistent with the fact that the easiness of shaking by actual measurement is also large.</span> 展开更多
关键词 Multi Hazard Cluster Analysis Open Data designated Evacuation Center GIS
下载PDF
Exploration of Infection Prevention and Control Practice of Designated Hospitals in During Corona Virus Disease 2019 Epidemic Period
7
作者 Haiquan Luo Maojun Fu +5 位作者 Xiantao Chen Yunliang Chen Yichuan Li Xiaochuan Liu Xiaolan Su Yanling Chen 《Journal of Clinical and Nursing Research》 2020年第4期80-90,共11页
Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance wi... Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance with the principle of"concentrating patients,experts,resources and treatment".Designated hospitals are often the strength of the general hospital and general hospital complex layers of various kinds of personnel,campus area is large,multi-channel,ordinary outpatient accepts people more,for emergency and severe cases treatment in patients with normal difficulty pressuure big,suspected/confirmed cases,combined with the COVID-19 occurred when the traditional holiday,the country launched the emergency response since,process reform faces a difficult labor,shortage of mampower,protective shortages,short time limit,and many other difficulties,hospital infection prevention and control is facing unprecedented pressure.In this paper,the West China-Guang'an Hospital,Sichuan University(Guang'an people's hospital)as a designated hospital,on the basis of the relevant scheme of the national health committee,epidemic prevention and control of the actual,combined with comprehensive hospital leadership,mampower allocation,protection,security,patient management,disinfection isolation,preview triage,preventive measures,training,monitoring,etc.,with practical experience summary for the COVID-19 diring the hospital infection prevention and control to improve the practice exploration. 展开更多
关键词 Corona Vius Disease 2019(COVID-19) designated hospitals Nosocomial infection prevention and control Protective measuures
下载PDF
Practice and Thoughts on due Statistics for Four Classes of Enterprises Above Designated Size
8
作者 Yan Qinglan 《Economics World》 2021年第3期139-143,共5页
“Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,... “Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,including four classes in national economy,namely,industrial enterprises above designated size,construction and real estate development and management enterprises above qualifications,wholesale and retail,catering and accommodation enterprises,and service enterprises above designated size,which are the primary part of national economic and social development activities.This paper is focused on analyzing the practice and difficulties in the current statistics work of four-classes enterprises,and then this paper proposes some recommendations. 展开更多
关键词 four classes of enterprises above designated size method of statistics statistics system
下载PDF
New Sites to be Designated on the World Heritage List
9
《China & The World Cultural Exchange》 1999年第5期48-48,共1页
关键词 World New Sites to be designated on the World Heritage List
下载PDF
Multi-designated geoparks face challenges in China’s heritage conservation 被引量:1
10
作者 WANG Lianyong 《Journal of Geographical Sciences》 SCIE CSCD 2007年第2期187-196,共10页
The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National ... The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National Geoparks of China in Sichuan Province, 18 UNESCO Global Geoparks in China, and 219 World Heritage sites in China and 8 European nations. Through analysis and synthesis, the author concludes that doubled designation, which also leads to unbalanced park distribution, is particularly prevalent in China other than in Europe. Therefore, on-site management agencies and related governments in China should carefully translate the doubled designations into responsibilities and harmonious partnerships between all stakeholders in order to enhance the management effectiveness and avoid paper park phenomenon. 展开更多
关键词 SICHUAN national geopark of China UNESCO Global Geopark World Heritage doubled designation heritage conservation
下载PDF
The Optimal Design of Lighting Systems for Designated Office Building in Thailand
11
作者 Surasak Panjavaranont Pomrapeepat Phasaputra +6 位作者 Woraratana Pattaraprakom Arthit Sode-Yome Kitti Tirawannavit Chaiyapat Kumpeerakupt Somkhun Rimsmutchai Wichit Krueasuk Natapongkom Pawanawichien 《Journal of Energy and Power Engineering》 2013年第4期798-804,共7页
This paper proposes the financial index of payback period analysis in order to evaluate the economic performance of lighting system. Conventional designs and proposed optimal design using the Energy Conversation Promo... This paper proposes the financial index of payback period analysis in order to evaluate the economic performance of lighting system. Conventional designs and proposed optimal design using the Energy Conversation Promotion Act (No. 2) B.E. 2550 of Ministry of Energy (Section--The Type or Size of Building Standards and Rules and Procedures, Building Design for Energy Conservation, Act B.E. 2552) are compared based on illumination standard for office building in term of energy consumption, return of investment and environmental impact. Firstly, the Type or Size of Building Standards and Rule and Procedures, Building Design for Energy Conservation, Act B.E. 2552 is reviewed and compared with the conventional designs of lighting system for office building. Next, the lifetime energy consumption of fluorescent lamp T5 with electronic ballast, fluorescent lamp T8 with standard ballast and fluorescent lamp T8 with electronic ballast are simulated using DIALux software program in three sizes office buildings. Then, the payback period and CO2 emission of lighting system for selected office building are simulated by various scenarios, which the analytical results show are the optimal lighting system for office building under the present situation. Finally, the optimal design of lighting system for designated office building in Thailand will be discussed with respect to the energy performance with environmental friendly. 展开更多
关键词 Energy management FINANCE ENVIRONMENT lighting system design.
下载PDF
Certificateless universal designated verifier signature schemes 被引量:8
12
作者 MING Yang SHEN Xiao-qin WANG Yu-min 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第3期85-90,94,共7页
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unabl... Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact. The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required. This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed. The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system. Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve. 展开更多
关键词 certificateless cryptography universal designated verifier signature bilinear pairing
原文传递
延胡索乙素纳米乳制备工艺优化及其性质研究
13
作者 陈子龙 吕倩 +2 位作者 孙鑫 刘思美 赵鹏 《中国药业》 CAS 2025年第1期47-53,共7页
目的优选延胡索乙素纳米乳制备工艺,并考察其稳定性和理化性质。方法采用亲水亲油平衡(HLB)法制备延胡索乙素纳米乳,以粒径和聚合物分散性指数为评价指标,在单因素试验基础上,采用Box-BehnkenDesign响应面法筛选最优制备工艺,并考察优... 目的优选延胡索乙素纳米乳制备工艺,并考察其稳定性和理化性质。方法采用亲水亲油平衡(HLB)法制备延胡索乙素纳米乳,以粒径和聚合物分散性指数为评价指标,在单因素试验基础上,采用Box-BehnkenDesign响应面法筛选最优制备工艺,并考察优选工艺制得样品的稳定性和理化性质。结果最优工艺为聚氧乙烯蓖麻油-油酸乙酯质量比19.514∶1,无水乙醇用量1.2 g,去离子水用量6.48 g。以优选工艺制得延胡索乙素纳米乳为无色透明液体,外观均匀,易于涂布,呈球形或近球形,平均粒径为16.3 nm,聚合物分散性指数为0.306,在40℃条件下的物理稳定性良好,24 h累积透过量为1100.92μg/cm^(2),纳米乳中延胡索乙素的透皮吸收过程与质量浓度无关,且为扩散过程。结论制备的延胡索乙素纳米乳的稳定性、物理性质和透皮吸收性均较好,可为延胡索乙素新剂型的研发提供参考。 展开更多
关键词 延胡索乙素 纳米乳 Box-Behnken Design响应面法 工艺优选 体外性质研究
下载PDF
Cloud data auditing with designated verifier 被引量:4
14
作者 Solomon Guadie WORKU Chunxiang XU Jining ZHAO 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第3期503-512,共10页
An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build... An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappy with this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.'s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oracle model assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps. 展开更多
关键词 cloud data storage designated verifier data privacy storage correctness cloud computing
原文传递
A Designated Query Protocol for Serverless Mobile RFID Systems with Reader and Tag Privacy 被引量:4
15
作者 Jiwhan Lim Sangjin Kim +1 位作者 Heekuck Oh Donghyun Kim 《Tsinghua Science and Technology》 SCIE EI CAS 2012年第5期521-536,共16页
Recently, a new type of Radio Frequency IDentification (RFID) system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus ... Recently, a new type of Radio Frequency IDentification (RFID) system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus it is frequently referred as a serverless mobile RFID system. In this paper, we formalize a serverless mobile RFID system model and propose a new encryption-based system that preserves the privacy of both tags and readers in the model. In addition, we define a new adversary model for the system model and show the security of the proposed system. Throughout comparisons between ours and the other alternatives, we show that our proposed system provides a stronger reader privacy and robustness against a reader forgery attack than the competitors. 展开更多
关键词 Radio Frequency IDentification (RFID) serverless designated query protocol reader privacyencryption-based
原文传递
Analysis of CO2 Emissions and the Mechanism of the Industrial Enterprises above Designated Size(IEDS) in Resource-based Cities by Application of Geographical Detector Technology 被引量:3
16
作者 ZHANG Wang 《Journal of Resources and Ecology》 CSCD 2019年第5期537-545,共9页
Resource-based cities are the most important players in responding to climate change and achieving low carbon development in China.An analysis of relevant data(such as the energy consumption)showed an inter-city diffe... Resource-based cities are the most important players in responding to climate change and achieving low carbon development in China.An analysis of relevant data(such as the energy consumption)showed an inter-city differentiation of CO2 emissions from energy consumption,and suggested an influence of the Industrial Enterprises above Designated Size(IEDS)in resource-based industrial cities at the prefecture level and above in different regions.Then by geographical detector technology,the sizes of each influencing mechanism on CO2 emissions from energy consumption of the IEDS were probed.This analysis showed that significant spatial differences exist for CO2 emissions from energy consumption and revealed several factors which influence the IEDS in resource-based cities.(1)In terms of unit employment,Eastern and Western resource-based cities are above the overall level of all resource-based cities;and only Coal resource-based cities far exceeded the overall level among all of the cities in the analysis.(2)In terms of unit gross industrial output value,the Eastern,Central and Western resources-based cities are all above the overall level for all the cities.Here also,only Coal resource-based cities far exceeded the overall level of all resources-based cities.Economic scale and energy structure are the main factors influencing CO2 emissions from energy consumption of the IEDS in resource-based cities.The factors influencing CO2 emissions in different regions and types of resource-based cities show significant spatial variations,and the degree of influence that any given factor exerts varies among different regions and types of resource-based cities.Therefore,individualized recommendations should be directed to different regions and types of resource-based cities,so that the strategies and measures of industrial low carbon and transformation should vary greatly according to the specific conditions that exist in each city. 展开更多
关键词 resource-based cities Industrial enterprises above designated size CO2 emissions from energy consumption mechanism analysis geographical detector
原文传递
How to signcrypt a message to designated group 被引量:1
17
作者 MA Chun-bo LI Jian-hua AO Jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第4期57-63,共7页
In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distr... In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distributed networks, Anyone in this scheme can signcrypt a message and distribute it to a designated group, and any member in the receiving group can unsigncrypt the ciphertext. The ciphertext and public key in the scheme are of constant size. In addition, this new scheme offers public verification of the ciphertext. This property is very important to the large-scale group communication since the gateway can filter the incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given to show that the scheme is secure against chosen ciphertext attack and existential forgery. 展开更多
关键词 BROADCAST SIGNCRYPTION designated group chosen ciphertext attack existential forgery random oracle model
原文传递
Universal Designated Multi Verifier Signature Scheme without Random Oracles 被引量:1
18
作者 MING Yang WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期685-691,共7页
In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) ba... In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) based on Waters' signature scheme. In this setting, a signature holder can to designate the signature to multi verifiers. Moreover, the security of our proposed scheme is based on the Gap Bilinear Difffie-Hellman assumption. 展开更多
关键词 universal designated multi verifier signature random oracle bilinear pairing
原文传递
The Health Demands of Designated Drivers-Four Cities,China,2019 被引量:1
19
作者 Meng Zhang Qiqi Wang +3 位作者 Hongyan Yao Xiao Qi Shicheng Yu Jianjun Liu 《China CDC weekly》 2022年第20期426-430,共5页
Summary What is already known about this topic?The health status of designated drivers is largely associated with road safety,which is a major public health issue.However,few studies have focused on the health demands... Summary What is already known about this topic?The health status of designated drivers is largely associated with road safety,which is a major public health issue.However,few studies have focused on the health demands of designated drivers.What is added by this report?This study investigated the health consciousness,first aid knowledge learning,acceptable ways to acquire health knowledge,and willingness to have physical examinations for designated drivers to provide suggestions for improving their health status.What are the implications for public health practice?The industry and platform should provide scientific and reasonable guidance on healthy lifestyles for designated drivers and implement physical examinations to monitor their health status. 展开更多
关键词 designated KNOWLEDGE CONSCIOUSNESS
原文传递
Molecular Structure Tailoring of Organic Spacers for High‑Performance Ruddlesden–Popper Perovskite Solar Cells
20
作者 Pengyun Liu Xuejin Li +6 位作者 Tonghui Cai Wei Xing Naitao Yang Hamidreza Arandiyan Zongping Shao Shaobin Wang Shaomin Liu 《Nano-Micro Letters》 SCIE EI CAS 2025年第2期314-357,共44页
Layer-structured Ruddlesden–Popper(RP)perovskites(RPPs)with decent stability have captured the imagination of the photovoltaic research community and bring hope for boosting the development of perovskite solar cell(P... Layer-structured Ruddlesden–Popper(RP)perovskites(RPPs)with decent stability have captured the imagination of the photovoltaic research community and bring hope for boosting the development of perovskite solar cell(PSC)technology.However,two-dimensional(2D)or quasi-2D RP PSCs are encountered with some challenges of the large exciton binding energy,blocked charge transport and poor film quality,which restrict their photovoltaic performance.Fortunately,these issues can be readily resolved by rationally designing spacer cations of RPPs.This review mainly focuses on how to design the molecular structures of organic spacers and aims to endow RPPs with outstanding photovoltaic applications.We firstly elucidated the important roles of organic spacers in impacting crystallization kinetics,charge transporting ability and stability of RPPs.Then we brought three aspects to attention for designing organic spacers.Finally,we presented the specific molecular structure design strategies for organic spacers of RPPs aiming to improve photovoltaic performance of RP PSCs.These proposed strategies in this review will provide new avenues to develop novel organic spacers for RPPs and advance the development of RPP photovoltaic technology for future applications. 展开更多
关键词 Ruddlesden-Popper perovskites Low-dimensional perovskite solar cells Organic spacers Molecular structure Design strategies
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部