期刊文献+
共找到2,140篇文章
< 1 2 107 >
每页显示 20 50 100
A new group key management scheme based on keys tree, XOR operation and one-way function 被引量:1
1
作者 张勇 张翼 汪为农 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期54-58,共5页
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p... By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members. 展开更多
关键词 secure group communication group key management keys tree one-way function
下载PDF
Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings 被引量:12
2
作者 SHAOZu-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期267-270,共4页
An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl... An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure. 展开更多
关键词 authenticated key agreement protocol self-certified public keys bilinearpairings
下载PDF
Three-dimensional modelling of shear keys in concrete gravity dams using an advanced grillage method 被引量:1
3
作者 Mahdi Ben Ftima Steephane Lafrance Pierre Leeger 《Water Science and Engineering》 EI CAS CSCD 2020年第3期223-232,共10页
Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to ... Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to be avoided.This paper presents a novel,robust,and computationally efficient three-dimensional(3D)modelling and simulation strategy of gravity dams,using a series of adjacent cantilever beam elements to represent individual monoliths.These monoliths are interconnected in the longitudinal direction by 3D no-tension link elements representing the lumped shear key stiffness contributions at a particular elevation.The objective is to assess the shear key internal force demands,including the axial force,shear,and moment demands.Shear key demand-capacity ratios can then be assessed with related multi-axial failure envelopes.The 3D link element stiffness coefficients were derived from a series of 3D finite element(FE)solid models with a detailed representation of geometrical features of multiple shear keys.The results from the proposed method based on advanced grillage analysis show strong agreement with reference solutions from 3D FE solid models,demonstrating high accuracy and performance of the proposed method.The application of the proposed advanced grillage method to a dam model with two monoliths clearly shows the advantage of the proposed method,in comparison to the classical approach used in practise. 展开更多
关键词 Gravity dam Shear keys Seismic analysis Grillage analysis Finite element model Multi-scale approach
下载PDF
Effect of mechanical degradation of laminated elastomeric bearings and shear keys upon seismic behaviors of small-to-medium-span highway bridges in transverse direction 被引量:2
4
作者 Wu Gang Wang Kehai +1 位作者 Zhang Panpan Lu Guanya 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2018年第1期205-220,共16页
Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seism... Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seismic responses more accurately, proper analytical models of bearings and shear keys should be developed. Based on a series of cyclic loading experiments and analyses, rational analytical models of laminated elastomeric bearings and shear keys, which can consider mechanical degradation, were developed. The effect of the mechanical degradation was investigated by examining the seismic response of a small-to-medium-span bridge in the transverse direction under a wide range of peak ground accelerations(PGA). The damage mechanism for small-to-medium-span highway bridges was determined, which can explain the seismic damage investigation during earthquakes in recent years. The experimental results show that the mechanical properties of laminated elastomeric bearings will degrade due to friction sliding, but the degree of decrease is dependent upon the influencing parameters. It can be concluded that the mechanical degradation of laminated elastomeric bearings and shear keys play an important role in the seismic response of bridges. The degradation of mechanical properties of laminated elastomeric bearings and shear keys should be included to evaluate more precise bridge seismic performance. 展开更多
关键词 bridge engineering mechanical degradation seismic response friction sliding shear keys
下载PDF
Dyke Swarms: Keys to Paleogeographic Reconstructions, Preface for IDC7 2016
5
作者 PENG Peng Richard ERNST 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2016年第S1期3-5,共3页
Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It... Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It has continued approximately every five years with 展开更多
关键词 IDC Dyke Swarms keys to Paleogeographic Reconstructions Preface for IDC7 2016
下载PDF
Variation in Stomatal Characteristics of <i>Bursera simaruba</i>(L.) Sarg., a Dominant Tree Species of Tropical Hardwood Hammock Forest across a Habitat Gradient in the Florida Keys
6
作者 Suresh C. Subedi Michael S. Ross +2 位作者 Rosario Vidales Jay P. Sah Leonel Sternberg 《American Journal of Plant Sciences》 2018年第10期2120-2139,共20页
Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a... Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a periodically stressful environment. To examine these responses, we sought to answer two primary research questions: a) how is variation in B. simaruba’s stomatal traits partitioned across hierarchical levels, i.e., site, tree, and leaf;and b) is variation in stomatal traits an integrated response to physiological stress expressed across the habitat gradient of Florida Keys forests? At eight sites distributed throughout the Keys, five leaves were collected from three mature trees for stomatal analysis. Leaf carbon stable isotope ratio (δ13C) was determined to infer the changes in water use efficiency caused by physiological stress experienced by each tree. The results showed that substantial proportions of the total variance in three traits (stomatal density, stomatal size, and δ13C) were observed at all levels, suggesting that processes operating at each scale are important in determining trait values. A significant negative correlation between stomatal density and size across scales was observed. Path model analysis showed that environmental variables, distance to ground water and ground water salinity, affect leaf δ13C indirectly, via its effects on stomatal traits, not directly to leaf δ13C. Therefore, the combination of small and densely distributed stomata seems to represent a strategy that allows B. simaruba to conserve water under conditions of physiological drought induced by either higher ground water salinity or flooding stress at very low elevation. 展开更多
关键词 STOMATAL Density STOMATAL Size δ13C Bursera simaruba Dry TROPICAL FOREST Florida keys
下载PDF
School-based physical activity interventions for children and youth:Keys for success
7
作者 Arto Grastén 《Journal of Sport and Health Science》 SCIE 2017年第3期290-291,共2页
Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence tha... Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence that past physical activity(PA)interventions have had only a small effect on children’s and youth’s overall activity levels,~2it is important to clarify whether school-based PA interventions warrant resource allocation.Schools represent an accessible and cost-effective 展开更多
关键词 School-based physical activity interventions for children and youth:keys for success PE
下载PDF
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
8
作者 Abdulrahman H. Altalhi 《Communications and Network》 2012年第1期83-87,共5页
A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is... A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is no central entity with the authority to administer the services and configurations of the network. How to secure a MANET is an active field of study for researchers. However, most of the research on the topic of securing the MANETs has focused on adapting security mechanisms that were meant for traditional wired networks. This adaptation has resulted in security solutions that do not work efficiently or that make assumptions that are not in line with the properties and characterizations of MANETs. In this paper, we propose the use of security mechanisms for MANETs that are designed based on the characteristics, functionalities, and goals of such networks. We aim to initiate a paradigm shift in securing MANETs, in which the focus should be on building security solutions specifically developed for MANETs, and not on adapting solutions that were meant for conventional wired networks. We revisit the basics and propose a simple encryption keys creation scheme that is based on the Diffie-Hellman key agreement protocol. The work presented in this paper should mark the initiation of a research agenda designed to build security primitives that are specifically for MANETs, along the lines of the new paradigm. 展开更多
关键词 keys Management MANET Security SYMMETRIC ENCRYPTION keys
下载PDF
A Brief Parametric Analysis of Catastrophic or Disastrous Hurricanes That Have Hit the Florida Keys between 1900 and 2000
9
作者 J. M. D’Andrea 《American Journal of Computational Mathematics》 2018年第1期1-6,共6页
The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960,... The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960, 1965, and 1992. In this paper, we will present a brief parametric analysis of the hurricanes that have hit the Florida Keys in the last 100 years. This analysis will include the descriptive statistics, best fit probability distribution of the latitude of the catastrophic hurricanes and a confidence interval that detects the average latitude of hurricanes (category 3 or higher) which have hit the Florida Keys in the last 100 years. 展开更多
关键词 Florida keys Hurricanes Parametric Analysis Statistics Probability Distributions LATITUDE CONFIDENCE INTERVALS
下载PDF
自订个人化窗口快捷键Active Keys
10
作者 林荣生 《ComputerDIY.电脑DIY》 2001年第12期87-87,共1页
关键词 ACTIVE keys 个人化窗口快捷键 工具软件
下载PDF
New species and new synonyms of Conaspidia Konow(Hymenoptera:Tenthredinidae) with keys to species of the Conaspidia bicuspis group and Japanese species
11
作者 祁立威 牛耕耘 +1 位作者 刘婷 魏美才 《Entomotaxonomia》 CSCD 2015年第3期221-233,共13页
Conaspidia qinlingia Wei sp. nov. and C. wangi Wei sp. nov. are described from China. Characters of Conaspidia bicuspis group are briefly discussed and a key to the species of the group is provided. Conaspidia murotai... Conaspidia qinlingia Wei sp. nov. and C. wangi Wei sp. nov. are described from China. Characters of Conaspidia bicuspis group are briefly discussed and a key to the species of the group is provided. Conaspidia murotai Togashi, 1984 and Conaspidia ishikawai Togashi, 2005 are new synonyms of Conaspidia guttata (Matsumura, 1912), the latter is briefly redescribed and illustrated. A key to Japanese species of Conaspidia is also provided. 展开更多
关键词 Tenthredininae SAWFLIES TAXONOMY key
下载PDF
KeyStone多核DSP中断系统原理及实现 被引量:1
12
作者 陈玉生 《电子世界》 2015年第13期23-25,35,共4页
本文概述Key Stone多核DSP中断系统的架构,分析DSP中断系统原理以及中断系统的实现,最后以TCI6614GPIO为例说明中断系统的实现。
关键词 KEY Stone多核DSP 中断系统
下载PDF
An Experimental Study on the Behavior of Shear Keys According to the Curing Time of UHPC 被引量:7
13
作者 Hee Seok Kim Won Jong Chin +2 位作者 Jeong Rae Cho Young Jin Kim Hyejin Yoon 《Engineering(科研)》 2015年第4期212-218,共7页
Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection syste... Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection system of structures using Ultra High Performance Concrete (UHPC). However, this method requires the presence of segmental joints to transfer the loads between neighboring segments, which stresses the importance of securing structural safety and serviceability. Therefore, need is for research on the behavior of the segmental joint for the structures erected by the precast segmental construction method. To that goal, this paper presents an experimental study on the behavior of shear keys with respect to the curing time of UHPC in the segmental joint. Analysis is done on the load-displacement relation according to the curing time of the shear keys and on the failure modes of the shear keys according to the cracking pattern at failure. 展开更多
关键词 Ultra High Performance Concrete PRECAST SEGMENTAL Joint CURING Time SHEAR KEY
下载PDF
Batch Private Keys Generation for RSA in Security Communication Systems 被引量:1
14
作者 陈运 陈新 《Journal of Electronic Science and Technology of China》 2005年第1期22-26,共5页
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complex... RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users. 展开更多
关键词 information security system public key cryptosystem RSA key generation
下载PDF
Depressed female cynomolgus monkeys(Macaca fascicularis) display a higher second-to-fourth(2D:4D)digit ratio
15
作者 Wei Li Ling-Yun Luo +6 位作者 Xun Yang Yong He Bin Lian Chao-Hua Qu Qing-Yuan Wu Jian-Guo Zhang Peng Xie 《Zoological Research》 SCIE CAS CSCD 2019年第3期219-225,共7页
This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed mo... This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed monkeys based on depressive-like behavioral criteria and 16 normal control mon keys.All animals were video recorded for two weeks,with the duration and frequency of the core depressive behaviors and 58 other behaviors in 12 behavioral categories then evaluated via behavioral analysis.Fin ger len gths from the right and left forelimb hands of both groups were measured by X-ray imagi ng.Fin ger length and digit ratio comparisons between the two groups were con ducted using Stude nt's Mest.In terms of the durati on of each behavior,signifies nt differences emerged in“Huddling”and five other behavioral categories,including Ingestive,Amicable,Parental,Locomotive,and Resting.In addition to the above five behavioral categories,we found that depressed mon keys spent less time in parental and rubbing back and forth behaviors than the control group.Furthermore,the 4th fin gers were significantly Ion ger in the left and right hands in the control group relative to the depressed mon keys.The sec ond?to?fourth(2D:4D)digit ratio in the left and right forelimb hands was significantly lower in the control group tha n that in the depressed group.Our fin dings revealed significant differences in finger lengths and digit ratios between depressed mon keys and healthy controls,which concords with our view that relatively high fetal testosterone exposure may be a protective factor against developing depressive symptoms(or that low fetal testosterone exposure is a risk factor). 展开更多
关键词 Fin ger length DIGIT ratio Major DEPRESSIVE disorder CYNOMOLGUS MON key
下载PDF
Never Lost Keys:A Novel Key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
16
作者 Yichuan Wang Dan Wu +1 位作者 Xiaoxue Liu Xinhong Hei 《China Communications》 SCIE CSCD 2022年第7期172-184,共13页
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerpr... Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerprint recognition and facial recognition are poor in randomness and can be forged easily.According to the characteristics of Electroencephalographic(EEG)signals such as the randomness,nonlinear and non-stationary etc.,it can significantly avoid these flaws.This paper proposes a novel method to generate keys based on EEG signals with end-edgecloud collaboration computing.Using sensors to measure motor imagery EEG data,the key is generated via pre-processing,feature extraction and classification.Experiments show the total time consumption of the key generation process is about 2.45s.Our scheme is practical and feasible,which provides a research route to generate biometric keys using EEG data. 展开更多
关键词 EEG biometric key generation end-edgecloud system information security
下载PDF
New Weak Keys in RSA
17
作者 WANG Baocang LIU Shuanggen HU Yupu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1529-1532,共4页
The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by... The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q). 展开更多
关键词 integer factorization RSA number public key cryptosystem special-purpose algorithm
下载PDF
A New Threshold Signature Scheme Using Self-Certified Public Keys
18
作者 SHAOJun LURong-xing CAOZhen-fu 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期263-266,共4页
To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation... To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive. 展开更多
关键词 self-certified threshold signature public key cryptosy stems
下载PDF
A FUNCTION NODE-BASED MULTIPLE PAIRWISE KEYS MANAGEMENT PROTOCOL FOR WIRELESS SENSOR NETWORKS AND ENERGY CONSUMPTION ANALYSIS
19
作者 Bi Jiana Wang Hui Sun Yandong Liu Yanzhao Ji Zhenzhou 《Journal of Electronics(China)》 2009年第5期692-698,共7页
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data... In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided. 展开更多
关键词 Wireless Sensor Networks (WSNs) Function nodes Key management Energy consumption
下载PDF
Memory of Familiar Melodies: Comparison Between Original and Transposed Keys
20
作者 Sumi Shigeno 《Journal of Literature and Art Studies》 2014年第12期1044-1052,共9页
The long-term memory for musical keys of familiar melodies was investigated. An experiment was conducted focusing on memory strength, music familiarity, and key transposition using musical pieces. Participants were ei... The long-term memory for musical keys of familiar melodies was investigated. An experiment was conducted focusing on memory strength, music familiarity, and key transposition using musical pieces. Participants were eighty-one Japanese undergraduate and graduate students. Eight were absolute pitch (AP) possessors and seventy-three were non-AP possessors. Two pieces of well-known classical music were selected as stimuli. These pieces were played in seven different keys: One was an original key and the other six were transposed keys in which the linear distance and harmonic distance were varied. Participants rated their strength of long-term memory for a particular segment of well-known music by comparing it with their memory of this piece. Importantly they were not required to identify the musical key of the melody. Results indicated that the strength of memory for these musical segments depended mainly on the pitch range associated with the transposed piece and partially on its key. We discussed participants' memory of melodies in the light of linear distance between original and transposed keys, harmonic distance between these factors, and the possibility of absolute tonality. 展开更多
关键词 musical key memory of melodies absolute tonality TRANSPOSITION long-term memory
下载PDF
上一页 1 2 107 下一页 到第
使用帮助 返回顶部