期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
China should Guard against Economic Security Loopholes
1
作者 江涌 《China Economist》 2007年第2期46-47,共2页
Many heated debates have taken place recently upon the economic security brought about by foreign acquisitions.This should be a good sign,as different views are being aired in contrast to the one uniform voice and has... Many heated debates have taken place recently upon the economic security brought about by foreign acquisitions.This should be a good sign,as different views are being aired in contrast to the one uniform voice and hasty generalization has been replaced by ever-intensifying debate,which is indeed historical progress. 展开更多
关键词 China should Guard against Economic Security loopholes
下载PDF
Plugging Up the loopholes
2
作者 Lan Xinzhen 《ChinAfrica》 2011年第8期37-37,共1页
State regulator tightens supervision over state overseas assets NEW measures to supervise overseas assets of centrally administered state-owned enterprises(SOEs) have been announced by the State-Owned Assets Supervisi... State regulator tightens supervision over state overseas assets NEW measures to supervise overseas assets of centrally administered state-owned enterprises(SOEs) have been announced by the State-Owned Assets Supervision and Administration Commission(SASAC), coming about amid what it termed "increasing complexities." The newly announced pair of regula- 展开更多
关键词 Plugging Up the loopholes
下载PDF
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
3
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
下载PDF
Will Tougher Sentencing Close Corruption Loopholes?
4
《Beijing Review》 2008年第38期46-47,共2页
The maximum punishment for holding large amounts of property with unidentified sources, currently five years’ imprison-ment, is set to double if a draft amendment to the Criminal Law is adopted.
关键词 Will Tougher Sentencing Close Corruption loopholes
原文传递
NO GOOD DEED GOES UNPUNISHED LOOPHOLES PERPETUATE ‘BYSTANDER EFFECT'
5
作者 H.L. 《The World of Chinese》 2017年第4期8-,共1页
A public debate on the bystander effect,prompted by a viral video of a fatal traffic accident,has highlighted continued gaps in China’s'Good Samaritan'laws—legal protections for those who volunteer to help v... A public debate on the bystander effect,prompted by a viral video of a fatal traffic accident,has highlighted continued gaps in China’s'Good Samaritan'laws—legal protections for those who volunteer to help victims.The 94-second video from Zhumadian,Henan,recorded in April but circulated in mid-June,showed a 展开更多
关键词 BYSTANDER EFFECT NO GOOD DEED GOES UNPUNISHED loopholeS PERPETUATE
原文传递
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
6
作者 Jin Li Jinfu Chen +5 位作者 Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang 《China Communications》 SCIE CSCD 2018年第2期190-208,共19页
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity. 展开更多
关键词 software vulnerability detection loopholeS information security evaluationmethod testing framework
下载PDF
Implementation Scheme of Two-Photon Post-Quantum Correlations
7
作者 Cuo-Zhu Pan, Wen-Jing Chu +3 位作者 Ming Yang Qing Yang Gang Zhang Zhuo-Liang Cao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第6期687-693,共7页
The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a ph... The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a physical implementation of such a correlation with the help of quantum non-demolition measurement, which is realized via the cross-Kerr nonlinear interaction between the signal photon and a probe coherent beam. The indirect measurement on the polarization state of photon is realized by the direct measurement on the phase shift of the probe coherent beam, which enhances the detection efficiency greatly and leaves the signal photon unabsorbed. The maximal violation of the CHSH inequality 4 can be achieved by pre-and post-selecting maximally entangled states. The reason why we can get the post-quantum correlation is that the selection of the results after measurement opens fair-sampling loophole. The fair-sampling loophole opened here is different from the one usually used in the currently existing simulation schemes for post-quantum correlations,which are simulated by selecting the states to be measured or enlarging the Hilbert space. So, our results present an alternative way to mimic post-quantum correlations. 展开更多
关键词 post-quantum correlation two-state vector formalism fair-sampling loophole linear optics
原文传递
SPECIAL ISSUE: ANTI-CORRUPTION STRATEGIES IN TRANSITIONAL CHINA-- Criminal Sanctions against Non-state Functionaries Who Accept Bribes and Abuse Public Power
8
作者 Li Huaisheng 《Social Sciences in China》 2011年第4期148-161,共14页
In order to penalize the acceptance of bribes by non-state functionaries who abuse public power, the anti-corruption system of China's criminal law has undergone successive transformations: from punishing non-state ... In order to penalize the acceptance of bribes by non-state functionaries who abuse public power, the anti-corruption system of China's criminal law has undergone successive transformations: from punishing non-state functionaries who accept bribes in accordance with the joint crime model to punishing them in accordance with the model for a single crime, and from seeking the rules of punishment in judicial interpretations to having the criminal code directly prescribe the criteria for determining a charge. Judicial interpretations have been particularly concerned with the punishment of non-state functionaries who have a relationship of common interests with a state functionary. The crime of accepting bribes given in return for trading in influence was established to solve the problem of the judicial vacuum created by judicial interpretations, but new legal obstacles have emerged. To generalize the class of offenders who accept bribes in return for using their influence is the route future improvement should take. 展开更多
关键词 non-state functionary particular affiliate close affiliates rules for closing off legal loopholes
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部