期刊文献+
共找到9,015篇文章
< 1 2 250 >
每页显示 20 50 100
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
1
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Cautionary Remarks When Testing Agreement between Two Raters for Continuous Scale Measurements: A Tutorial in Clinical Epidemiology with Implementation Using R
2
作者 Mohamed M. Shoukri 《Open Journal of Epidemiology》 2024年第1期56-74,共19页
Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting sub... Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest. 展开更多
关键词 Limits of agreement Pitman and Morgan Tests Test of Parallelism The Arcsine Variance Stabilizing Transformation Sample Size Estimation
下载PDF
Game Analysis of Implementing Price Undertaking Agreements in Anti-dumping Disputes
3
作者 奚俊芳 仓平 钟根元 《Journal of Donghua University(English Edition)》 EI CAS 2008年第1期65-68,共4页
The Price Undertaking Agreement is one of the strategies a company accused of dumping often adopts in dealing with anti-dumping disputes.Using static game analysis,this paper compares the impact that anti-dumping duti... The Price Undertaking Agreement is one of the strategies a company accused of dumping often adopts in dealing with anti-dumping disputes.Using static game analysis,this paper compares the impact that anti-dumping duties and price undertaking agreements may have on an importing country's social welfare and an accused company's market performance.We conclude that,compared with anti-dumping duties,price undertakings improve the importing country's social welfare and reduce the accused company's market share in the import country.We also note that,in addition to the financial benefit,price undertakings can prevent escalation of trade disputes in international trade negotiations. 展开更多
关键词 anti-dumping price undertaking antidumping duty
下载PDF
Construction of Strategic Supporting-System for Anti-dumping Measures on China's Agricultural Products
4
作者 陈勇生 邓海华 +2 位作者 刘福业 潘方胤 吴文龙 《Agricultural Science & Technology》 CAS 2012年第1期9-12,共4页
With the international trade theories as the basis,this study started with researches on the reality of agricultural products that often experience anti-dumping,carried out a careful study on the construction of busin... With the international trade theories as the basis,this study started with researches on the reality of agricultural products that often experience anti-dumping,carried out a careful study on the construction of business strategic supporting-system to cope with the anti-dumping so as to promote the association governance and industrial warning mechanism and to provide new strategic thinking and theoretical support for the exporters to cope with anti-dumping. 展开更多
关键词 Agricultural products Coping with anti-dumping Strategic supportingsystem
下载PDF
Solutions of the Growing Use of Anti-dumping Measures by Countries in Recent Decades
5
作者 橐云婷 《海外英语》 2015年第24期294-295,共2页
In recent decades, international trade has evolved into a complex system of trade barriers to ensure the protection of domestic industry and its workers interests. However as tariffs have fallen and international trad... In recent decades, international trade has evolved into a complex system of trade barriers to ensure the protection of domestic industry and its workers interests. However as tariffs have fallen and international trade tends to be free trade, countries have found another way of protecting domestic industries from foreign competition—non-tariff protection. Among them anti-dumping is the most controversial subject that is involved in the foreign trade. This theme will analyze the reason and effect of growing use anti-dumping measures by countries in recent decades and try to give some possible solutions. 展开更多
关键词 anti-dumping international TRADE TARIFF protection
下载PDF
Study on the use of trade barrier of anti-dumping in China
6
作者 XU Jie 《Chinese Business Review》 2007年第4期20-24,共5页
WTO allows its members to use anti-dumping barrier to combat unfair competition. Nowadays, anti-dumping barrier has been dominant protective trade measure in the world, while in China, this measure is still not fully ... WTO allows its members to use anti-dumping barrier to combat unfair competition. Nowadays, anti-dumping barrier has been dominant protective trade measure in the world, while in China, this measure is still not fully used and at low level. For the purpose of protecting domestic industries and enhancing national welfare, China should use this barrier cautiously and construct its own anti-dumping system at the same time. 展开更多
关键词 trade barrier of anti-dumping China NECESSITY proposals
下载PDF
Comparison Research on Anti-dumping Duty Rates between Administrative Review and Welfare Maximization under Dynamic Game of Perfect Information
7
作者 许源 朱海洋 钟根元 《Journal of Donghua University(English Edition)》 EI CAS 2006年第3期127-130,共4页
Using economics and game theory, two kinds of models have been proposed in this paper under the assumption that foreign and domestic firms behave under the condition of dynamic game of perfect information. One model i... Using economics and game theory, two kinds of models have been proposed in this paper under the assumption that foreign and domestic firms behave under the condition of dynamic game of perfect information. One model is for calculating Anti-dumping rate which is obtained according to current regulations of Anti-dumping, but it is not optimal. The other is an optimal model of Anti-dumping which is obtained according to the maximum principle of domestic social welfare. Then, through the comparison of this two models in detail, several shortages have been revealed about Anti-dumping rate model based on current regulations of Anti-dumping. Finally, a suggestion is indicated that WTO and China should use the optimal model to calculate Anti-dumping rate. 展开更多
关键词 administrative review anti-dumping rate dynamic game perfect information.
下载PDF
China's Anti-dumping Legislation and Practice
8
《China's Foreign Trade》 1999年第9期31-32,共2页
关键词 In China’s anti-dumping Legislation and Practice
下载PDF
Why Has China Become a Target of Anti-dumping Activities?
9
作者 李月芬 《China Economist》 2007年第1期48-59,共12页
Although the benefits of China’s trade expansion have been distributed much more broadly than those of some early industrialized nations,China has become the primary target of anti-dumping activities.Being a new and ... Although the benefits of China’s trade expansion have been distributed much more broadly than those of some early industrialized nations,China has become the primary target of anti-dumping activities.Being a new and relatively efficient new rival in the global market may be an important reason for this.On the other hand,China’s development stage and her trade structure also place her in a disadvantageous position when it comes to anti-dumping activities. 展开更多
关键词 Why Has China Become a Target of anti-dumping Activities than
下载PDF
China's Color-Television Enterprises Respond Jointly to the EU's Anti-Dumping Proceedings
10
《China's Foreign Trade》 2000年第7期18-19,共2页
关键词 EU China’s Color-Television Enterprises Respond Jointly to the EU’s anti-dumping Proceedings
下载PDF
China Becomes the Biggest Victim of Anti-dumping on Earth
11
《China's Foreign Trade》 2001年第1期28-29,共2页
关键词 China Becomes the Biggest Victim of anti-dumping on Earth
下载PDF
Anti-dumping in Textiles and Clothing
12
《China Textile》 2009年第9期52-58,共7页
In the run up to the expiry of quota restrictions that had long regulated much of global trade in textiles and clothing, many a pundit predicted widespread recourse to anti-dumping actions.
关键词 anti-dumping in Textiles and Clothing WTO POY
下载PDF
Improved quantum key agreement protocol with authentication
13
作者 郭继红 柏明强 +2 位作者 雷小燕 谢佳欣 莫智文 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期308-313,共6页
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica... In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks. 展开更多
关键词 quantum key agreement AUTHENTICATION six-particle entangled states
下载PDF
NCTO Endorses Mexican Anti-dumping Case With China
14
《China Textile》 2010年第7期15-16,共2页
The president of the National Council of Textile Organizations(NCTO )has written a letter to the Mexican Economic Secretary Hugo Diaz strongly endorsing his country’s decision to seek a World Trade Organization(WTO)
关键词 NAFTA CASE NCTO Endorses Mexican anti-dumping Case With China
下载PDF
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
15
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
下载PDF
Anti-dumping Investigation Puts Pressure on China
16
作者 LIU Shuang 《China Textile》 2006年第3期62-63,共2页
Under the pressure of the anti- dumping investigations on silk fabrics launched by the Indian government, the China Chamber of Commerce for Import & Export of Textiles (CCCT) announced that it has decided not to h... Under the pressure of the anti- dumping investigations on silk fabrics launched by the Indian government, the China Chamber of Commerce for Import & Export of Textiles (CCCT) announced that it has decided not to hold the Silk Trade Fair (Autumn) this year, in order to avoid the negative effects the case might bring. 展开更多
关键词 anti-dumping Investigation Puts Pressure on China HIGH
下载PDF
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
17
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
下载PDF
Anti-Dumping on and from China
18
作者 Patrick H.Zhao 《China Textile》 2007年第7期21-23,共3页
The past years saw an increased cases of anti-dumping on China mostly from the developed countries,some from developing countries.But Pakistan,a friendly neighbor to China,recently adds up to that list of ranks for an... The past years saw an increased cases of anti-dumping on China mostly from the developed countries,some from developing countries.But Pakistan,a friendly neighbor to China,recently adds up to that list of ranks for an anti-dumping investigation on China.It is the national interests that count most,after all. It gives out a signal that anti-dumping would be a frequent tool to defend or to attack. Evidences show China is a target for this trade remedy,but is also targeting others. 展开更多
关键词 anti-dumping on and from China
下载PDF
Ministry of Commerce's Final Arbitration on Anti-dumping Investigation on Nonyl Pheno
19
作者 Zheng Yan 《China Textile》 2007年第4期7-7,共1页
The Ministry of Commerce of People’s Republic of China issued the Announcement No.11,2007 of
关键词 In Ministry of Commerce’s Final Arbitration on anti-dumping Investigation on Nonyl Pheno
下载PDF
药品数据专有权国际立法溯源与中国制度安排 被引量:1
20
作者 刘鑫 《科技进步与对策》 北大核心 2024年第6期139-148,共10页
药品上市审批对于药品安全有效性数据的专门审查要求,造就了涉及药品数据的独特知识产权保护机制。基于药品数据获取的高昂投入及其对于药品仿制与后续创新的重要价值,美欧发达国家在世界范围内率先建立了药品数据保护机制,其逐渐成为... 药品上市审批对于药品安全有效性数据的专门审查要求,造就了涉及药品数据的独特知识产权保护机制。基于药品数据获取的高昂投入及其对于药品仿制与后续创新的重要价值,美欧发达国家在世界范围内率先建立了药品数据保护机制,其逐渐成为一项国际性的法律规则。无论是美欧发达国家的立法,还是相关国际法律规则,对于药品数据的知识产权保护都呈现从商业秘密模式向专有权机制转变的立法格局。产业利益驱动无疑是其中的一个重要诱因,但归根结底是源自药品数据专有权有效兼顾原研发药企经济利益与社会公众健康权益的制度优势。鉴于此,在药品数据专有权保护的国际趋势下,我国应从本土药品产业激励创新与规范仿制的基本诉求出发,以必要的内部限制与外部监管明确药品数据专有权的法律边界,并通过药品数据动态化公示平台的设置与药品数据付费使用模式的创设,建构起与药品专利制度有机衔接的数据专有权保护机制。 展开更多
关键词 药品数据专有权 药品专利保护 商业秘密 TRIPS协定 TPP协定 CPTPP协定
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部