期刊文献+
共找到49篇文章
< 1 2 3 >
每页显示 20 50 100
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices
1
作者 Yining Qi Zhen Yang +2 位作者 Yubo Luo Yongfeng Huang Xing Li 《Computers, Materials & Continua》 SCIE EI 2022年第11期2205-2221,共17页
Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low pe... Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low performance devices such as Internet of Things,we find that there are still two obstacles for applying PDP schemes.The first one is the heavy computation overhead in generating tags for data blocks,which is essential for setting up any PDP scheme.The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing.In this paper,we propose a novel blockchain-based light-weighted PDP scheme for low performance devices,with an instance deployed on a cloud server.We design a secure outsourced tag generating method for low performance devices,which enables a kind of“hash-sign-switch”two-phase tag computing.With this method,users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation,without leaking their data content.Chaincodes in blockchain network ensure the correctness of such outsourcing and prevent collusion attacks.The security analysis and performance evaluation prove that our scheme is both secure and efficient. 展开更多
关键词 Provable data possession outsourced computation blockchain smart contract chameleon hash
下载PDF
The Enclosed Personal Space and Female Identity Construction in A. S. Byatt's Possession
2
作者 叶柳影 《海外英语》 2018年第18期206-209,共4页
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay inten... From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction. 展开更多
关键词 A. S. BYATT possession Space FEMALE IDENTITY HARMONIOUS CO-EXISTENCE
下载PDF
Paradise Archetype in Possession
3
作者 吴菲 TIAN Ye 《海外英语》 2018年第1期154-155,共2页
A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this pape... A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this paper analyzes the epic poems"The Garden of Proserpina"so as to identify the hidden creation theme from paradise archetype. 展开更多
关键词 paradise archetype Northrop Frye archetypal criticism A S BYATT possession
下载PDF
The Quest Motif in Possession
4
作者 吴菲 《海外英语》 2018年第4期129-130,共2页
The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the q... The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the quest motif from our modern hero's discovery journey in Possession. 展开更多
关键词 "Glass Coffin" Brothers Grimm the quest motif A. S. Byatt possession
下载PDF
Towards Comprehensive Provable Data Possession in Cloud Computing 被引量:1
5
作者 LI Chaoling CHEN Yue +1 位作者 TAN Pengxu YANG Gang 《Wuhan University Journal of Natural Sciences》 CAS 2013年第3期265-271,共7页
To check the remote data integrity in cloud computing,we have proposed an efficient and full data dynamic provable data possession(PDP) scheme that uses a SN(serial number)-BN(block number) table to support data block... To check the remote data integrity in cloud computing,we have proposed an efficient and full data dynamic provable data possession(PDP) scheme that uses a SN(serial number)-BN(block number) table to support data block update.In this article,we first analyze and test its performance in detail.The result shows that our scheme is efficient with low computation,storage,and communication costs.Then,we discuss how to extend the dynamic scheme to support other features,including public auditability,privacy preservation,fairness,and multiple-replica checking.After being extended,a comprehensive PDP scheme that has high efficiency and satisfies all main requirements is provided. 展开更多
关键词 cloud computing provable data possession data dynamics SN-BN table
原文传递
Human Lives Are More Valuable Than Material Possessions——My Reflections on "Face to Face with Hurricane Camille"
6
作者 顾嘉祖 《外国语言文学》 1985年第4期59-62,共4页
“Face to face With Hurricane Camilleisa Piece of narration writ-ten by Joseph P.Blank.It has been adopted by text-book compilers of various countries ever since its first publication in The Readers Digest,March1970.A... “Face to face With Hurricane Camilleisa Piece of narration writ-ten by Joseph P.Blank.It has been adopted by text-book compilers of various countries ever since its first publication in The Readers Digest,March1970.A Searlyas1973,Nat-aliC. 展开更多
关键词 My Reflections on Face to Face with Hurricane Camille Human Lives Are More Valuable Than Material possessions
原文传递
“爵”世珠宝——Possession永恒的爱
7
《航空港》 2007年第4期36-36,共1页
代表着无尽爱意的Possession系列宛如一个个真爱故事,讲述着男女间永恒不变的情愫……2007之夏,伯爵再度推出最新Possession系列珠宝,"永恒之爱"是该系列的设计主题。隐喻着时光如水,Possession系列指环由两个紧扣的圈环组成... 代表着无尽爱意的Possession系列宛如一个个真爱故事,讲述着男女间永恒不变的情愫……2007之夏,伯爵再度推出最新Possession系列珠宝,"永恒之爱"是该系列的设计主题。隐喻着时光如水,Possession系列指环由两个紧扣的圈环组成,像两个缠绵相拥的舞者,一起捕捉时光的永恒。两枚指环线条精简。 展开更多
关键词 设计主题 如水 possession 珠宝设计 自由转动 冷调 爱情宣言 另一面 链环 菲力普
原文传递
PIAGET 伯爵Possession系列2011派对
8
《时尚时间》 2011年第12期34-34,共1页
拥抱与自由的完美共存,恒久和挚爱的精致艺术.伯爵Possession系列2011派对于10月26日在上海科技馆举行。双环璀璨光彩持续绽放,灵动魅力愈加动人。指间缱绻相扣,温情肆意流转,Possession系列“拥抱的艺术”在这场缤纷绚丽的风尚盛... 拥抱与自由的完美共存,恒久和挚爱的精致艺术.伯爵Possession系列2011派对于10月26日在上海科技馆举行。双环璀璨光彩持续绽放,灵动魅力愈加动人。指间缱绻相扣,温情肆意流转,Possession系列“拥抱的艺术”在这场缤纷绚丽的风尚盛事中得到了完美的呈现。 展开更多
关键词 伯爵 possession系列 2011派对 上海
原文传递
Pursuit of Possessions
9
作者 杨梅 《当代外语研究》 2002年第3期35-38,共4页
今日是除夕,央视的春节联欢晚会正在进行。我看了大约一个多小时,觉得兴味寡淡:小品无新意,歌舞无创意,戏曲不如意,观众不满意,整台春节晚会简直就成了“大腕的葬礼”。(编者按:无论是和亲朋聊聊,还是上网瞧瞧,或是翻开各地报纸看看,对... 今日是除夕,央视的春节联欢晚会正在进行。我看了大约一个多小时,觉得兴味寡淡:小品无新意,歌舞无创意,戏曲不如意,观众不满意,整台春节晚会简直就成了“大腕的葬礼”。(编者按:无论是和亲朋聊聊,还是上网瞧瞧,或是翻开各地报纸看看,对央视除夕晚会的指责成了春节期间的“共同主题”。)还是回到自己的书斋吧。 展开更多
关键词 林德伯格 Pursuit of possessions 慢跑鞋
原文传递
Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation
10
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期183-199,共17页
Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data s... Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data security threats,even more complex.When a user quit its group,remaining data block signatures must be re-signed to ensure security.Some researchers noticed this problem and proposed a few works to relieve computing overhead on user side.However,considering the privacy and security need of group auditing,there still lacks a comprehensive solution to implement secure group user revocation,supporting identity privacy preserving and collusion attack resistance.Aiming at this target,we construct a concrete scheme based on ring signature and smart contracts.We introduce linkable ring signature to build a kind of novel meta data for integrity proof enabling anonymous verification.And the new meta data supports secure revocation.Meanwhile,smart contracts are using for resisting possible collusion attack and malicious re-signing computation.Under the combined effectiveness of both signature method and blockchain smart contracts,our proposal supports reliable user revocation and signature re-signing,without revealing any user identity in the whole process.Security and performance analysis compared with previous works prove that the proposed scheme is feasible and efficient. 展开更多
关键词 Provable data possession data integrity blockchain ring signature
下载PDF
Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data
11
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2603-2618,共16页
Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,wh... Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,which is called group data sharing.As all kinds of cloud service,data group sharing also suffers from hardware/software failures and human errors.Provable Data Posses-sion(PDP)schemes are proposed to check the integrity of data stored in cloud without downloading.However,there are still some unmet needs lying in auditing group shared data.Researchers propose four issues necessary for a secure group shared data auditing:public verification,identity privacy,collusion attack resis-tance and traceability.However,none of the published work has succeeded in achieving all of these properties so far.In this paper,we propose a novel block-chain-based ring signature PDP scheme for group shared data,with an instance deployed on a cloud server.We design a linkable ring signature method called Linkable Homomorphic Authenticable Ring Signature(LHARS)to implement public anonymous auditing for group data.We also build smart contracts to resist collusion attack in group auditing.The security analysis and performance evalua-tion prove that our scheme is both secure and efficient. 展开更多
关键词 Provable data possession data integrity blockchain ring signature
下载PDF
Human Habitats and Malaria Vector Control in Benin: Current Situation and Implications for Effective Control
12
作者 Barikissou G. Damien Armel Djènontin +1 位作者 Badirou Aguemon Franck Remoué 《Advances in Infectious Diseases》 2023年第4期706-721,共16页
Long-lasting insecticide-treated nets (LLINs) and indoor residual spraying (IRS) are the main indoor malaria vector tools control tools. The study examined housing characteristics and investigated the relationship bet... Long-lasting insecticide-treated nets (LLINs) and indoor residual spraying (IRS) are the main indoor malaria vector tools control tools. The study examined housing characteristics and investigated the relationship between the total volume of household possessions, the volume of the sleeping room, and the hanging of LLINs. A total of 831 bedrooms were randomly selected in Benin in 2015. The findings showed that mud walls were predominant in rural areas (more than 75%), while metal roofs were common (77.3% - 97.9%). Battery-powered lighting was prevalent in rural areas in Northern (97%), while open-flame oil lamps were commonly used in rural areas in Southern (86%). The availability of correct bedding was low, ranging from 1% to 10% in all households. 20% of the bedrooms had at least 50% of their volume occupied by household possessions in urban areas. In rural areas, bedrooms without LLINs had a lower mean rate ratio of the volume occupied by possessions per the total volume of the room compared to bedrooms with at least one LLIN installed (p < 0.0001). The characteristics of human habitats are not favourable to the correct use of vector control intervention indoors. It is therefore important to improve people’s living conditions as the next step for malaria elimination. 展开更多
关键词 HOUSING LIGHTING BEDDING possessions Malaria Vector Control LLINs IRS
下载PDF
降低可证明存储的计算和通信复杂度(英文)
13
作者 刘妃妃 谷大武 +2 位作者 陆海宁 龙斌 李晓晖 《China Communications》 SCIE CSCD 2011年第6期67-75,共9页
Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files... Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation. 展开更多
关键词 cloud computing proofs of storage dynamic provable data possession file sharing
下载PDF
The Great Time,the Three Societies in the Globalization and the Three Souls of a Leftist Today
14
作者 Endre Kiss 《Journal of Environmental Science and Engineering(B)》 2018年第9期344-353,共10页
The first society would be the society of the good will.Already several times discussed,for which the value-oriented life of this year can no longer become an open problem.We define the second society provisionally as... The first society would be the society of the good will.Already several times discussed,for which the value-oriented life of this year can no longer become an open problem.We define the second society provisionally as the one,which is fundamentally not constituted by the above described good will.In the following,we will try to identify it in this abstract description as the society of the“majority”.We see the third society in that political class or elite,which power has been built in the year 1989 and thus became the concretization of that establishment,with which the“first”society identified itself so totally.This tripartition of the real existing Left might also explain,why its political articulation is so fragmented.A Leftist should have today three souls:one of the winners(the elite,as a member of our third class),one of the losers(as a member of our second class)and one of the man of good will(as a member of our first class),who very enjoyed in its total identification with the own system.And authors have drawn some meaningful conclusions. 展开更多
关键词 Political HERMENEUTICS splitting of SOCIETY cleavage GLOBALIZATION global SOCIETY identification thrust manipulation SOCIETY of good will media possession.
下载PDF
Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
15
作者 Junjie Feng Shigong Long 《International Journal of Communications, Network and System Sciences》 2017年第5期274-282,共9页
We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work... We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work, Ateniese et al. proposed a remote data integrity checking protocol that supports data partial dynamics. In this paper, we present a new remote data possession checking protocol which allows an unlimited number of file integrity verifications and efficiently supports dynamic operations, such as data modification, deletion, insertion and append. The proposed protocol supports public verifiability. In addition, the proposed protocol does not leak any private information to third-party verifiers. Through a specific analysis, we show the correctness and security of the protocol. After that, we demonstrate the proposed protocol has a good performance. 展开更多
关键词 Provable DATA possession (PDP) Cloud Storage DATA DYNAMICS Public Verifiability DATA INTEGRITY
下载PDF
Higher Level of Social Development—Enlightenism
16
作者 Jargal Dorj 《Journal of Philosophy Study》 2020年第5期279-292,共14页
This article determined the cause of social suffering by using set theory and also demonstrated that the cause of any suffering is the emptiness quality of Yang and Ying of the phenomena or“ownership”view and have b... This article determined the cause of social suffering by using set theory and also demonstrated that the cause of any suffering is the emptiness quality of Yang and Ying of the phenomena or“ownership”view and have been given its definition.It described the society free from the basic suffering as named enlightened society or enlightenism like one of the formations of the social development and explained its scientific evidence and described the cause and condition of this society’s evolution and development. 展开更多
关键词 EMPTINESS CAPITALISM COMMUNISM industrialism PRICE possession NIRVANA
下载PDF
Morphosyntactic Structures of Existential, Possessive and Locative Constructions in Amharic
17
作者 Amare Getahun 《宏观语言学》 2021年第2期25-43,共19页
This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region a... This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region and used as the first and the second language for some urban dwellers in the country.It is a working language for the Federal Government of Ethiopia.It serves the same in Gambella,Southern Nations,Nationalities and Peoples’and Benishangul-Gumuz regional states.The Amharic existential,possessive and locative constructions are characterized by using the same existential verb stem all-‘exist’.The verb is defective in its derivation and conjugation.Unlike the prototypical verbs of the language,the existential verb uses a different verb for imperfective and past verb forms.Unlike the regular verbs of the language,the existential verb,which is perfective in form,conveys present tense.It has been observed that indefinite nominals appear as the E(Existent)in existentials and possessives,whereas definite ones appear in locatives.The morphosyntactic features of existentials and locatives are the same in every aspect except the use of definiteness of the E(Existent).The possessives differ from the two constructions in word order and morphological structure of the verb. 展开更多
关键词 ROOT RADICAL EXISTENCE location possession morphosyntactic structures Amharic
下载PDF
Externalities as Compensatory Criteria of Compulsory Expropriation Actions
18
作者 Odysseas N.Kopsidas Stephanos D.V.Giakoumatos Athanasios E.P.Raptis 《Journal of Environmental Science and Engineering(A)》 2022年第4期138-147,共10页
Ownership/private property and property inheritance are concepts well-established and constitutionally protected in our modern societies.Nevertheless,numerous provisions in the national legal framework enable the stat... Ownership/private property and property inheritance are concepts well-established and constitutionally protected in our modern societies.Nevertheless,numerous provisions in the national legal framework enable the states to expropriate individual private goods under certain severe circumstances through compensation prerequisites.The present manuscript presents a short comparative study of the constitutional articles of many countries,regarding expropriation actions,examines the compensation techniques employed,and interrelates expropriation implementation with economic analysis methods and experimental economics.Furthermore,this paper states that the current Greek expropriate methods consist of an economic disturbance and externality in economic terms. 展开更多
关键词 Compulsory/forced expropriation externalities compensation constitutional law experimental economics OWNERSHIP possession economic analysis method
下载PDF
A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds
19
作者 Meng Zhao Yong Ding +3 位作者 Yujue Wang Huiyong Wang Bingyao Wang Lingang Liu 《国际计算机前沿大会会议论文集》 2019年第1期342-345,共4页
The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest ... The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest status of outsourced data. Integrity auditing requires user to take massive time-consuming computations, which would not be affordable by weak devices. In this paper, we propose a privacy-preserving TPA-aided remote data integrity auditing scheme based on Li et al.’s data integrity auditing scheme without bilinear pairings, where a third party auditor (TPA) is employed to perform integrity auditing on outsourced data for users. The privacy of outsourced data can be guaranteed against TPA in the sense that TPA could not infer its contents from the returned proofs in the integrity auditing phase. Our construction is as efficient as Li et al.’s scheme, that is, each procedure takes the same time-consuming operations in both schemes, and our solution does not increase the sizes of processed data, challenge and proof. 展开更多
关键词 Cloud STORAGE INTEGRITY AUDITING Provable Data possession PROOFS of STORAGE PROOFS of Retrievability
下载PDF
Flexible Defense Succeeds Creative Attacks!—A Simulation Approach Based on Position Data in Professional Football
20
作者 Daniel Memmert Jonas Imkamp Jürgen Perl 《Journal of Software Engineering and Applications》 2021年第9期493-504,共12页
<strong>Introduction</strong><strong>:</strong> The key to success is finding the perfect mixture of tactical patterns and sudden breaks of them, which depends on the behavior of the opponent t... <strong>Introduction</strong><strong>:</strong> The key to success is finding the perfect mixture of tactical patterns and sudden breaks of them, which depends on the behavior of the opponent team and is not easy to estimate by just watching matches. According to the specific tactical team behavior of “attack vs. defense” professional football matches are investigated based on a simulation approach, professional football matches are investigated according to the specific tactical team behavior of “attack vs. defense.” <strong>Methods:</strong> The formation patterns of all the sample games are categorized by SOCCER<span style="white-space:nowrap;">&#169;</span> for defense and attack. Monte Carlo-Simulation can evaluate the mathematical, optimal strategy. The interaction simulation between attack and defense shows optimal flexibility rates for both tactical groups. <strong>Approach: </strong>A simulation approach based on 40 position data sets of the 2014/15 German Bundesliga has been conducted to analyze and optimize such strategic team behavior in professional soccer. <strong>Results:</strong> The results revealed that both attack and defense have optimal planning rates to be more successful. The more complex the success indicator, the more successful attacking player groups get. The results also show that defensive player groups always succeed in attacking groups below a specific planning rate value.<strong> Conclusion:</strong> Groups are always succeeding. The simulation-based position data analysis shows successful strategic behavior patterns for attack and defense. Attacking player groups need very high flexibility to be successful (stay in ball possession). In contrast, defensive player groups only need to be below a defined flexibility rate to be guaranteed more success. 展开更多
关键词 Strategy KPI Offensive and Defensive Dynamics Ball Contact Ball possession Passes
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部