期刊文献+
共找到1,308篇文章
< 1 2 66 >
每页显示 20 50 100
Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation
1
作者 Jiaqi Gao Kangfeng Zheng +2 位作者 Xiujuan Wang Chunhua Wu Bin Wu 《Computers, Materials & Continua》 SCIE EI 2024年第10期251-270,共20页
User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore ... User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore the rich image resources generated by users,and the existing attempts touch on the multimodal domain,but still face the challenge of semantic differences between text and images.Given this,we investigate the UIL task across different social media platforms based on multimodal user-generated contents(UGCs).We innovatively introduce the efficient user identity linkage via aligned multi-modal features and temporal correlation(EUIL)approach.The method first generates captions for user-posted images with the BLIP model,alleviating the problem of missing textual information.Subsequently,we extract aligned text and image features with the CLIP model,which closely aligns the two modalities and significantly reduces the semantic gap.Accordingly,we construct a set of adapter modules to integrate the multimodal features.Furthermore,we design a temporal weight assignment mechanism to incorporate the temporal dimension of user behavior.We evaluate the proposed scheme on the real-world social dataset TWIN,and the results show that our method reaches 86.39%accuracy,which demonstrates the excellence in handling multimodal data,and provides strong algorithmic support for UIL. 展开更多
关键词 user identity linkage multimodal models attention mechanism temporal correlation
下载PDF
On the Internet Language from Perspectives of Sociolinguistics and The Development of Identity of its Users
2
作者 易珊羽 《海外英语》 2016年第11期229-231,共3页
The distinctive form of language emerged from the Internet is gaining more and more attention these days. In fact, different theories and methodologies can support to explain the phenomenon of the Internet language. F... The distinctive form of language emerged from the Internet is gaining more and more attention these days. In fact, different theories and methodologies can support to explain the phenomenon of the Internet language. Furthermore, language and identity in sociolinguistic domain can help study the relationship between the Internet language and its users. Taking a popular online discussion board Tianya.cn as an example, the affirmation of a virtual community's identity can be established through using its distinctive language. 展开更多
关键词 internet LANGUAGE sociolinguistic speech community REGISTER identity
下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
3
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 user authentication SECURITY PRIVACY internet of medical things homomorphic encryption optimal key generation
下载PDF
Preserving Privacy of User Identity Based on Pseudonym Variable in 5G 被引量:1
4
作者 Mamoon M.Saeed Mohammad Kamrul Hasan +4 位作者 Rosilah Hassan Rania Mokhtar Rashid A.Saeed Elsadig Saeid Manoj Gupta 《Computers, Materials & Continua》 SCIE EI 2022年第3期5551-5568,共18页
The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these ... The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme. 展开更多
关键词 5G privacy and security user identity IMSI authentication and key agreement(AKA)
下载PDF
Risk Analysis of Industrial Internet Identity System 被引量:1
5
作者 TANG Kai 《ZTE Communications》 2020年第1期44-48,共5页
The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem p... The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem planes are divided,and a corresponding risk analysis view is established to analyze risks for various planes.This paper uses Isaiah Berlin’s definition of liberty to more generally express the concept of security as positive rights and negative rights.In the risk analysis view,the target system is modeled from four dimensions:stakeholders,framework,architecture,and capability delivery.At last,three defensive lines are proposed to establish the identity credit system. 展开更多
关键词 industrial internet identity credit system risk analysis view right framework security attribute
下载PDF
Pseudonym Mutable Based Privacy for 5G User Identity
6
作者 Rashid A.Saeed Mamoon M.Saeed +2 位作者 Rania A.Mokhtar Hesham Alhumyani S.Abdel-Khalek 《Computer Systems Science & Engineering》 SCIE EI 2021年第10期1-14,共14页
Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.... Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.As Internet of Things(IoT)and long-term evolution for machine type(LTE-m)are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase.For all the above issues standards’bodies should ensure users’identity and privacy in order to gain the trust of service providers and industries.Against such threats,5G specifications require a rigid and robust privacy procedure.Many research studies have addressed user privacy in 5G networks.This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity(IMSI)using a mutable mobile subscriber identity(MMSI)that changes randomly and avoids the exchange of IMSIs.It maintains authentication and key agreement(AKA)structure compatibility with previous mobile generations and improves user equipment(UE)synchronization with home networks.The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server(HSS).The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly.The proposed solution was verified by ProVerif. 展开更多
关键词 5G MMSI IMSI AKA PRIVACY user identity
下载PDF
Integrated Architecture for Networking and Industrial Internet Identity
7
作者 LU Hua LI Xiaolu +1 位作者 XIE Renchao FENG Wei 《ZTE Communications》 2020年第1期24-35,共12页
Several excellent works have been done on the industrial Internet;however,some problems are still ahead,such as reliable security,heterogeneous compatibility,and system efficiency.Information-Centric Networking(ICN),a... Several excellent works have been done on the industrial Internet;however,some problems are still ahead,such as reliable security,heterogeneous compatibility,and system efficiency.Information-Centric Networking(ICN),an emerging paradigm for the future Internet,is expected to address the challenges of the industrial Internet to some extent.An integrated architecture for industrial network and identity resolution in the industrial Internet is proposed in this paper.A framework is also designed for the ICN-based industrial Network And Named Data Networking(NDN)based factory extranet with Software-Defined Networking(SDN).Moreover,an identity resolution architecture in the industrial Internet is proposed based on ICN paradigms with separate resolution nodes or with merging resolution and routing. 展开更多
关键词 ICN NDN industrial network industrial internet identity
下载PDF
A CPK-Based Identity Authentication Scheme for IoT
8
作者 Mingming Zhang Jiaming Mao +6 位作者 Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期1217-1231,共15页
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality.... As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality.The existing public key infrastructure(PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT.Its key distribution and management costs are high,which hinders the development of power IoT security construction.Combined Public Key(CPK)technology uses a small number of seeds to generate unlimited public keys.It is very suitable for identity authentication in the power Internet of Things.In this paper,we propose a novel identity authentication scheme for power IoT.The scheme combines the physical unclonable function(PUF)with improved CPK technology to achieve mutual identity authentication between power IoT terminals and servers.The proposed scheme does not require third-party authentication and improves the security of identity authentication for power IoT.Moreover,the scheme reduces the resource consumption of power IoT devices.The improved CPK algorithm solves the key collision problem,and the third party only needs to save the private key and the public key matrix.Experimental results show that the amount of storage resources occupied in our scheme is small.The proposed scheme is more suitable for the power IoT. 展开更多
关键词 Power internet of Things terminal equipment identity authentication CPK PUF
下载PDF
DTAIS:Distributed trusted active identity resolution systems for the Industrial Internet
9
作者 Tao Huang Renchao Xie +7 位作者 Yuzheng Ren F.Richard Yu Zhuang Zou Lu Han Yunjie Liu Demin Cheng Yinan Li Tian Liu 《Digital Communications and Networks》 SCIE 2024年第4期853-862,共10页
In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are... In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness. 展开更多
关键词 Industrial internet NFT IPFS Trust identity resolution system
下载PDF
短视频商业模式下网红特质对用户产品依恋的影响研究——基于实验研究与仿真分析的方法 被引量:1
10
作者 王炳成 李丰娟 李芳 《财经论丛》 CSSCI 北大核心 2024年第3期80-90,共11页
伴随着短视频商业模式的发展,短视频网红特质已经成为推动用户形成产品依恋的重要因素,但目前鲜有研究对其中的实现路径与机理进行深入探究。本文基于信号理论,构建短视频商业模式下网红特质对用户产品依恋的影响模型,同时综合运用实验... 伴随着短视频商业模式的发展,短视频网红特质已经成为推动用户形成产品依恋的重要因素,但目前鲜有研究对其中的实现路径与机理进行深入探究。本文基于信号理论,构建短视频商业模式下网红特质对用户产品依恋的影响模型,同时综合运用实验研究与系统动力学仿真的方法对模型进行检验。结果表明:(1)短视频网红特质对用户产品依恋具有促进作用;(2)信任感知在短视频网红特质与用户产品依恋之间起中介作用;(3)生活场景还原不仅调节短视频网红特质对用户产品依恋的影响,而且在短视频网红特质、信任感知和用户产品依恋的中介关系中起调节作用;(4)系统动力学仿真结果表明,短视频网红特质对用户产品依恋的影响是一个长期累积的过程,并且随着时间的推移,这种影响效果愈发显著。研究结果为相关企业的短视频商业模式实践提供了有益的启示和参考。 展开更多
关键词 短视频商业模式 网红特质 用户产品依恋 信任感知 生活场景还原
下载PDF
我国大城市居民参与互联网在线问诊的行为画像分析
11
作者 吕英杰 马子婷 胡雅欣 《医学信息学杂志》 CAS 2024年第6期1-6,共6页
目的/意义研究大城市居民选择互联网医疗服务时的典型特征,建立患者行为画像,为改进互联网医疗服务提供决策依据。方法/过程以北京市患者为研究对象,从个体属性特征、在线问诊行为以及择医需求偏好3个维度构建患者群体画像,通过聚类方... 目的/意义研究大城市居民选择互联网医疗服务时的典型特征,建立患者行为画像,为改进互联网医疗服务提供决策依据。方法/过程以北京市患者为研究对象,从个体属性特征、在线问诊行为以及择医需求偏好3个维度构建患者群体画像,通过聚类方法对在线患者群体分类。结果/结论在线患者可划分为价值潜力型、平台忠诚型、潜在转化型、需求强烈型和服务转移型5类不同特征群体。总体上来自大城市的在线患者病例级别偏低且活跃度不高,通常使用价格较低的图文问诊方式,倾向于选择来自三甲医院、职称较高且在线服务质量较高的医生。5类患者群体各具典型特征,需要分别采取针对性措施满足其个性化医疗需求。 展开更多
关键词 互联网医疗 大城市居民 用户画像
下载PDF
辟谣信息对社交媒体用户错误信息持续影响效应(CIE)的影响--基于知识修正理论
12
作者 李松涛 张卫东 陈希鹏 《现代情报》 CSSCI 北大核心 2024年第5期123-139,共17页
[目的/意义]通过研究社交媒体辟谣的要素对错误信息的持续影响效应(CIE)的影响,确定改善CIE的关键因素,进一步完善知识修正等相关理论,以遏制信息疫情的影响。[方法/过程]以知识修正理论为基础模型,采用问卷调查的方式对社交媒体用户进... [目的/意义]通过研究社交媒体辟谣的要素对错误信息的持续影响效应(CIE)的影响,确定改善CIE的关键因素,进一步完善知识修正等相关理论,以遏制信息疫情的影响。[方法/过程]以知识修正理论为基础模型,采用问卷调查的方式对社交媒体用户进行回溯调查。从用户个人因素和辟谣信息因素两个维度构建了社交媒体辟谣对用户持续影响效应(CIE)的影响因素模型。为验证该模型的可靠性,采用Smart PLS软件进行分析。[结果/结论]网络辟谣信息对社交媒体用户持续影响效应(CIE)的影响主要受7个因素的影响:辟谣信息的频次、辟谣响应速度、个体的自信水平、辟谣信息的详尽程度、辟谣信息的来源、定向推理动机和辟谣信息内容认知能力。这7个因素共同调节了社交媒体用户的知识修正全过程。其中,辟谣信息的来源、定向推理动机和辟谣信息内容认知能力3个因素对用户消除CIE的效果起到相对主导性作用。 展开更多
关键词 网络辟谣信息 错误信息持续影响效应(CIE) 社交媒体用户 知识修正理论
下载PDF
互联网产品设计中用户体验与交互设计优化对策
13
作者 李建 田崑 《包装工程》 CAS 北大核心 2024年第14期399-402,共4页
目的探寻互联网产品设计中用户体验与交互设计优化对策,从而设计出更符合用户需求和用户体验的互联网产品。方法采用概念分析法,对互联网产品设计中的用户体验与交互设计分别展开研究,提出要遵循用户体验设计的一致性以及用户体验设计... 目的探寻互联网产品设计中用户体验与交互设计优化对策,从而设计出更符合用户需求和用户体验的互联网产品。方法采用概念分析法,对互联网产品设计中的用户体验与交互设计分别展开研究,提出要遵循用户体验设计的一致性以及用户体验设计的个性化,并提出在交互设计中应使界面与用户感知习惯契合,易于被用户感知,帮助用户形成长时记忆,唤醒用户记忆,关注用户情绪与情感,使其产生愉悦的体验感。结论作为产品创新与开拓的基础,用户体验与交互设计从深层次发掘用户的切实需求与体验,进而有利于互联网产品的推广。 展开更多
关键词 互联网产品设计 用户体验 交互设计
下载PDF
基于Wi-Fi感知的多用户身份识别研究
14
作者 魏忠诚 陈炜 +3 位作者 董延虎 连彬 王巍 赵继军 《物联网学报》 2024年第1期111-121,共11页
随着无线感知技术的发展,基于Wi-Fi的身份识别研究在人机交互和家居安防等领域备受关注。尽管基于Wi-Fi信号的身份识别已经取得了初步的成功,但是目前主要适用于用户独立行为场景,并发行为下的多用户身份识别仍然面临着一系列挑战,包括... 随着无线感知技术的发展,基于Wi-Fi的身份识别研究在人机交互和家居安防等领域备受关注。尽管基于Wi-Fi信号的身份识别已经取得了初步的成功,但是目前主要适用于用户独立行为场景,并发行为下的多用户身份识别仍然面临着一系列挑战,包括用户之间的相互干扰以及模型鲁棒性差等问题。因此,提出了一种并发行为下多用户身份识别系统Wiblack,其核心思想是训练一个多分支深度神经网络(Wiblack-Net)来提取每个单用户的独特特征。首先,利用主干网络提取多用户之间的共同特征;然后,为每个用户分配一个二分类器以此判断给定群体中是否存在目标用户,在此基础上基于并发行为实现多个用户身份识别。此外,将Wiblack与多个独立的二分类模型和单个多分类模型进行对比实验,对运行效率和系统性能进行分析。实验结果显示,在同时识别3个用户身份时,Wibalck平均准确率达到了92.97%,平均精确度为93.71%,平均召回率为93.24%,平均F1值为92.43%。 展开更多
关键词 Wi-Fi感知 信道状态信息 身份识别 多人识别 多分支深度神经网络
下载PDF
数字仪式中国家认同的中介路径与机制——以新中国成立70周年高校网络拉歌为例
15
作者 马锋 郭扬 《新媒体与社会》 2024年第2期234-247,M0015,共15页
已有媒介仪式的国家认同研究存在“主体性失语”的缺憾以及对具体仪式事件过程性和中观层面的国家认同的中介机制追问不够的现象。本文通过追索新中国成立70周年高校网络拉歌的仪式过程,意图解答数字仪式中个体的国家认同何以可能。研... 已有媒介仪式的国家认同研究存在“主体性失语”的缺憾以及对具体仪式事件过程性和中观层面的国家认同的中介机制追问不够的现象。本文通过追索新中国成立70周年高校网络拉歌的仪式过程,意图解答数字仪式中个体的国家认同何以可能。研究发现数字仪式不与日常分离而是将惯常实践仪式化进而复魅社群,不消弭个体差异而是在留言区的主体间互动中轮流激活。公众号作为仪式舞台,仪式演员的脚本与仪式观众的留言同时登场,在仪式结构与仪式主体的互动实践中协商生成“校园—国家”交融的情感认同,进而为国家认同构建出一条“个体—社群—国家”的中介路径,其形成机制表现为可持续性、创造性、交融性。 展开更多
关键词 数字仪式 国家认同 网络拉歌
下载PDF
戒毒服务型平台使用意愿影响因素及构建研究
16
作者 秦总根 魏舒晴 《中国人民警察大学学报》 2024年第2期20-28,共9页
自“智慧戒毒”概念提出以来,我国积极建设了许多戒毒服务型平台,为社会有寻求戒毒相关内容与线上服务人群提供了专业、便捷的途径,然而,当前这类平台普遍未深入用户视角设计平台功能。以技术接受模型为理论基础,构建戒毒服务型平台的... 自“智慧戒毒”概念提出以来,我国积极建设了许多戒毒服务型平台,为社会有寻求戒毒相关内容与线上服务人群提供了专业、便捷的途径,然而,当前这类平台普遍未深入用户视角设计平台功能。以技术接受模型为理论基础,构建戒毒服务型平台的使用意愿模型,再通过线上线下相结合的问卷调查方式,采用SPSS 21.0软件对311份有效问卷进行统计分析,将所得数据导入AMOS对模型进行测试,以了解用户对现有戒毒服务型平台的使用意愿及影响因素,从而推进我国戒毒康复平台的构建与发展。结果表明:感知有用性、感知易用性、交互体验和自我效能感对戒毒服务型平台使用意愿有正向显著影响。 展开更多
关键词 戒毒人员 戒毒平台 互联网服务 使用意愿 结构方程模型
下载PDF
互联网医疗平台的数据可视化设计分析
17
作者 黑昱冬 《科学与信息化》 2024年第14期58-60,共3页
由于远程医学技术和互联网产业的迅猛发展,更多的人意识到互联网诊疗的便利,可视化的资料可以帮助使用者以一种更直观、更生动的方式了解资讯,提高用户的操作便利性,增加用户的黏性。在此背景下,本文主要针对互联网医疗平台的数据、可... 由于远程医学技术和互联网产业的迅猛发展,更多的人意识到互联网诊疗的便利,可视化的资料可以帮助使用者以一种更直观、更生动的方式了解资讯,提高用户的操作便利性,增加用户的黏性。在此背景下,本文主要针对互联网医疗平台的数据、可视化设计工作进行了分析和探讨,并且提出了相应的意见和建议,希望能给有关人员带来帮助和参考。 展开更多
关键词 数据可视化 互联网医疗 用户体验 设计
下载PDF
面向多用户接入的无线通信技术在物联网环境下的资源分配与协同传输研究
18
作者 李轶骥 《通信电源技术》 2024年第13期172-174,共3页
为探讨面向多用户接入的无线通信技术在物联网环境下的资源分配与协同传输问题,深入研究无线通信技术、多用户接入技术及物联网环境下的资源分配技术,提出结合正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)和多... 为探讨面向多用户接入的无线通信技术在物联网环境下的资源分配与协同传输问题,深入研究无线通信技术、多用户接入技术及物联网环境下的资源分配技术,提出结合正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)和多用户多输入多输出(Multi User Multiple Input Multiple Output,MU-MIMO)的解决方案。该方案在吞吐量、延迟、用户支持数及频谱利用率等方面均表现出显著优势。在研究中,采用OFDMA技术将无线信道划分为多个正交子信道,允许多个用户在同一时间、同一频段内进行通信。结合MU-MIMO技术,实现多个用户在同一时间内与基站进行通信,提高了网络吞吐量和容量。结合使用OFDMA和MU-MIMO技术的方案,吞吐量达到了1300 Mb/s,明显高于单独使用OFDMA的800 Mb/s和单独使用MU-MIMO的1000 Mb/s。该方案的延迟降低到了10 ms,用户支持数多达24个,频谱利用率高达90%。 展开更多
关键词 多用户 无线通信技术 物联网 资源分配
下载PDF
物联网环境下场景驱动用户创新方式与路径研究 被引量:1
19
作者 张凡 何佳讯 《科技进步与对策》 CSSCI 北大核心 2024年第6期1-10,共10页
伴随物联网技术的应用,场景营销成为一种动态激发用户需求从而反向刺激企业创新的新兴商业模式。为探究用户如何在场景驱动下产生新需求并与企业共创价值,根据场景理论与用户创新相关理论,以场景品牌卡萨帝为案例,采用扎根理论对场景驱... 伴随物联网技术的应用,场景营销成为一种动态激发用户需求从而反向刺激企业创新的新兴商业模式。为探究用户如何在场景驱动下产生新需求并与企业共创价值,根据场景理论与用户创新相关理论,以场景品牌卡萨帝为案例,采用扎根理论对场景驱动用户创新的方式及路径进行理论化工作。结果表明,消费场景由物理、技术、人文和关系要素构成;用户根据环境、体验、情感、行为、目标等不同导向的场景类型,通过预期差距弥合、消费惯性突破、用户情感追求、体验数据创造及用户知识整合进行创新;场景驱动用户创新路径是以场景要素组合为基础,以用户体验为核心,由企业主导的场景驱动创新和用户主导的用户参与创新交替作用的迭代循环价值共创系统。 展开更多
关键词 物联网技术 场景营销 场景驱动创新 用户创新 价值共创
下载PDF
物联网环境下基于SM9算法和区块链技术的身份认证方法 被引量:1
20
作者 翟鹏 何泾沙 张昱 《信息网络安全》 CSCD 北大核心 2024年第2期179-187,共9页
物联网环境下的终端设备需要进行相互识别和身份认证来保障网络安全和数据安全,身份认证是物联网安全保障的第一道防线,现有的传统公钥密码体制(PKI)过程繁琐、计算量大,不能很好地满足资源受限、开放、分布式物联网环境。文章基于SM9... 物联网环境下的终端设备需要进行相互识别和身份认证来保障网络安全和数据安全,身份认证是物联网安全保障的第一道防线,现有的传统公钥密码体制(PKI)过程繁琐、计算量大,不能很好地满足资源受限、开放、分布式物联网环境。文章基于SM9标识密码算法设计了一种基于区块链的物联网终端身份认证方案,基于计算性Diffie-Hellman困难问题、q-Diffie-Hellman逆问题和双线性DH困难问题的假设下,可以极大满足机密性和不可伪造性,更加符合物联网实际应用环境。该方案采用设备身份标识作为公钥,简化了密钥分发管理流程,另外区块链作为一种去中心化的底层存储数据库,用来记录密钥、证书、签名等信息,可以为认证流程进行可信背书。通过性能和Proverif形式化安全性分析,并与目前主流的几种认证方式进行比较,证明该方案可以满足物联网环境下时间、性能及安全性的需求。 展开更多
关键词 物联网 SM9算法 身份认证 区块链
下载PDF
上一页 1 2 66 下一页 到第
使用帮助 返回顶部