期刊文献+
共找到1,476篇文章
< 1 2 74 >
每页显示 20 50 100
The Essence of Non-Traditional Security Issues and Their Solutions 被引量:1
1
作者 Huang Zhaoyu Su Qin 《Contemporary International Relations》 2009年第6期28-45,共18页
Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situatio... Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences. 展开更多
关键词 The Essence of non-traditional security Issues and Their Solutions security
下载PDF
On the Problems of Computer Network Maintenance and Security 被引量:1
2
作者 张保峰 《电子世界》 2018年第7期103-103,105,共2页
伴随我国计算机网络事业的快速发展,我们的生活已与网络紧密相联,但随着数据网络的传播,安全问题也开始出现。网络安全所涉及到的知识面较广,其中与网络安全存在着重要关联的就是计算机网络维护工作的质量。为此,本文就通过计算机... 伴随我国计算机网络事业的快速发展,我们的生活已与网络紧密相联,但随着数据网络的传播,安全问题也开始出现。网络安全所涉及到的知识面较广,其中与网络安全存在着重要关联的就是计算机网络维护工作的质量。为此,本文就通过计算机网络维护保障网络安全的具体策略展开了进一步探讨,希望能为行业发展提供一定参考。 展开更多
关键词 计算机网络 维护 安全问题 策略
下载PDF
Efficient Security Sequencing Problem over Insecure Channel Based on Homomorphic Encryption
3
作者 Mingxu Yi Lifeng Wang Yunpeng Ma 《China Communications》 SCIE CSCD 2016年第9期195-202,共8页
In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure mult... In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure multipart computation is more and more popular in anonymous voting and online auction.In the present study,related secure computation protocol for sequencing problem is not many by far.In order to improve the efficiency and safety,we propose a security sequencing protocol based on homomorphic encryption.We also give analysis of correctness and security to highlight its feasibility. 展开更多
关键词 homomorphic encryption privacy sequencing problem secure multipart compu- tation information transformation
下载PDF
Specificity of Food Security Concept as a Wicked Problem
4
作者 Renata Grochowska 《Journal of Agricultural Science and Technology(B)》 2014年第10期823-831,共9页
The aim of the article was firstly to analyze a specific character of the food security's concept, and secondly to present a large variety of stakeholders' positions dealing with the issue and their impact on econom... The aim of the article was firstly to analyze a specific character of the food security's concept, and secondly to present a large variety of stakeholders' positions dealing with the issue and their impact on economic and political dimensions. For this purpose, a review in available studies and documents was made. The results show that a lack of the precise definition for the food security's concept creates different understandings, leading to various interpretations and divergent solutions. The reasons could be found in specifics of the food security's concept which is qualified as a wicked problem. Wicked problems refer to issues which are highly complex, have innumerable and undefined causes and are difficult to understand and frame. Therefore, caution is required when positions of stakeholders are estimating. Based on literature, it can be stated that the productionist (focusing on intensive food production) and environmental frames are dominant in the debate, resulting in potential conflicts and different claims about action to be taken. As a result, a clear political vision on the food security's concept is lacking. In conclusion, a return to the principle what food production is economically, socially and environmentally sustainable can reshape a public debate in order to actively form food security policies at the global and national levels in the future. However, better coping strategies like cooperative strategy should be developed to tame food security as a wicked problem by turning over to stakeholders for new definitions and solutions. 展开更多
关键词 Food security wicked problem stakeholders' positions.
下载PDF
Problems and Strategies of Fishermen’s Social Security
5
作者 Peng Du 《Proceedings of Business and Economic Studies》 2019年第5期6-10,共5页
With the development of social economy and industry,fisheries also play an important role in the development of the country.In the process of fishery development,the problems in the fishermen’s social security system... With the development of social economy and industry,fisheries also play an important role in the development of the country.In the process of fishery development,the problems in the fishermen’s social security system are becoming more and more serious,and the types of problems are gradually increasing.Discovering the problems existing in the development of fisheries,and making up and correcting them in time,has an important role in promoting the development of fisheries and social and economic development.In recent years,the issue of“agriculture,rural areas and farmers”has been a hot topic of discussion.During the course of the problem,the party and the government introduced a series of safeguard measures and policy systems.Based on this,this paper focuses on the problems existing in the fishermen’s social security system and the measures to solve the problems.At the same time,the reasons for the reform of the fishermen’s social security system are also briefly explained.The main reasons can be divided into four points,namely the cost of living,unemployment insurance for fishermen,fishery resources,and income of fishermen,etc.,which are the reasons why the fishery social security system is in urgent need of optimization,contributing to the sustainable development and progress of fisheries. 展开更多
关键词 FISHERMEN SOCIAL security problemS COUNTERMEASURES
下载PDF
Major Problems Affecting the Financial Security of China
6
《China's Foreign Trade》 1999年第9期19-20,共2页
关键词 security Major problems Affecting the Financial security of China
下载PDF
On Some Problems and Trend of the World Security
7
作者 Li Xinwei 《International Understanding》 2003年第1期18-21,共4页
关键词 On Some problems and Trend of the World security World of
下载PDF
Cyberspace Endogenous Safety and Security 被引量:4
8
作者 Jiangxing Wu 《Engineering》 SCIE EI CAS 2022年第8期179-185,共7页
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"... Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR. 展开更多
关键词 Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom Dynamic heterogeneous redundant architecture
下载PDF
ON SOME PROBLEMS IN CHINA’S SECURITIES LEGISLATION
9
作者 Gao Erson Chairman of the Research Center of International Economic Law at Nankai University Li Jiuming Li Li 《南开经济研究》 CSSCI 北大核心 1994年第S2期2-11,共10页
In May 1993, the State Council promulgated ProvisionalRegulations Regarding the Issuing of Stocks and theAdministration of Stock Dealings. However, the Stock Act isstill in the process of drafting. This paper intends ... In May 1993, the State Council promulgated ProvisionalRegulations Regarding the Issuing of Stocks and theAdministration of Stock Dealings. However, the Stock Act isstill in the process of drafting. This paper intends to discuss thefollowing three problems concerning the securities legislation. 展开更多
关键词 S securITIES LEGISLATION ON SOME problemS IN CHINA CSEA
下载PDF
China' s Security Measures for 2010 Shanghai World Expo: A Retrospect
10
作者 Degang SUN 《International Relations and Diplomacy》 2015年第7期470-479,共10页
The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as seriou... The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as serious social crimes The first was from terrorist threat, and the global Jihad network in Eurasia was looming in the early 21st century, which was guided by radical ideologies; the second threat was from ethnic separatist groups; the third threat was related with foreign personnel and diplomats' security; the fourth threat was from mass disturbances, and the fifth was from serious social crimes. China's measures to these potential multi-faceted challenges were serious and various, including preventing terrorist attacks through international cooperation, lessening ethnic separatists' dissatisfaction and avoiding possible mass demonstration, reducing the chance of domestic mass disturbances, guaranteeing public transportation and aerospace security, making extensive use of advanced technologies and referring to other countries' expertise in security check, seeking help from other provinces bordering Shanghai, and strengthening control over explosive materials, etc.. Nevertheless, the efficacy of the above-mentioned countermeasures was problematic, for they were more defensive than offensive, more passive than proactive, and more tactical than strategic. 展开更多
关键词 Shanghai World Expo ANTI-TERRORISM China's national security non-traditional threat internationalanti-terror cooperation
下载PDF
Existing Problems and Countermeasures in Financial Securities Market Regulation
11
作者 Changming Chen Shang Chen 《Journal of Finance Research》 2019年第1期64-67,共4页
At the present stage,with the continuous development of social economy and science and technology,China's financial and securities industry has gradually developed.As an important part of China's socialist eco... At the present stage,with the continuous development of social economy and science and technology,China's financial and securities industry has gradually developed.As an important part of China's socialist economic market,including the financial and securities industry,therefore,to a certain extent,the development of the financial securities industry has promoted the prosperity and development of China's economy.In other words,strengthening the management of financial securities market regulation can promote the sustainable development of the securities industry,thereby promoting the rapid development of China's economy.This paper mainly discusses and expounds some problems existing in the current process of financial securities market regulation,and proposes solutions to it,hoping to be helpful to the financial securities industry. 展开更多
关键词 FINANCIAL securITIES MARKET regulation Existing problems EXPLORATION and DISCUSSION on COUNTERMEASURES
下载PDF
Research on computer network security measures
12
作者 CHEN Jie 《International English Education Research》 2015年第10期1-3,共3页
With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security is... With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security issues have received more and more attention of the communities. In the face of the problems of the security hidden trouble in the computer network, it is essential to take the relevant measures to ensure the safety of the computer network. With the computer network security as the breakthrough point, this paper discusses the precautionary measures of the computer network security based on the analysis of the computer network security, in order to illustrate the importance of the computer network security, to provide references for ensuring the security of the computer network. 展开更多
关键词 COMPUTER network security problem precautionary measures
下载PDF
Global view of the social security system with Chinese characteristics research
13
作者 Du wenjuan 《International English Education Research》 2015年第5期81-83,共3页
The first 20 years of this century is the period of strategic opportunities of building a weU-offsociety in an all-round way, at the same time, China's social development is also facing a lot of systemic risk. Econom... The first 20 years of this century is the period of strategic opportunities of building a weU-offsociety in an all-round way, at the same time, China's social development is also facing a lot of systemic risk. Economic change and social transformation puts forward new requirements for the social security system reform. This paper studies the theoretical basis of the social security system reform, analyzes the status quo of China's social security system and the existing problems and experience in social security system of other countries for reference, on the basis of perfecting China's pension, medical, unemployment and other social security system, the construction is suitable for the situation of our country's social security system with Chinese characteristics, ensuring and improving people's livelihood, the achievements of reform and opening to the public to achieve genuine sharing is of great significance. 展开更多
关键词 social security system with Chinese characteristics the problem research experience for reference
下载PDF
Learning with Errors Public Key Cryptosystem with Its Security
14
作者 Zhiyong Zheng Kun Tian +1 位作者 Yi Zhang Yunfan Lu 《Journal of Information Security》 2023年第1期25-38,共14页
The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous res... The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous research results. Then we prove the security of LWE public key cryptosystem by Regev in detail. For not only independent identical Gaussian disturbances but also any general independent identical disturbances, we give a more accurate estimation probability of decryption error of general LWE cryptosystem. This guarantees high security and widespread applications of the LWE public key cryptosystem. 展开更多
关键词 Learning With Errors problem CRYPTOSYSTEM Decryption Error PROBABILITY security
下载PDF
Several issues in reform and development of China’s old-age security system
15
作者 王延中 《China Economist》 2010年第1期13-21,共9页
Since China’s reform and opening to the outside world,especially since the mid-1990s,China's social security system has undergone a number of reforms and adjustments.We can say that the basic framework of social ... Since China’s reform and opening to the outside world,especially since the mid-1990s,China's social security system has undergone a number of reforms and adjustments.We can say that the basic framework of social insurance system had been established,but it is still facing many difficulties such as small coverage,high payment rates,"empty" individual accounts,etc.The question is whether China will choose the proper way from so many suggestions inside and outside China to solve the above issues.I will analyze some important issues on pension reform and old age security system construction and give my own view in this paper. 展开更多
关键词 PENSION REFORM OLD age security system problems and solutions
全文增补中
Secure Network Coding Based on Lattice Signature 被引量:2
16
作者 SHANG Tao PEI Hengli LIU Jianwei 《China Communications》 SCIE CSCD 2014年第1期138-151,共14页
To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- u... To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation. 展开更多
关键词 secure network coding pollution attack lattice signature fixed length vector problem
下载PDF
Defining Non-Traditional Security and Its Implications for China 被引量:1
17
作者 Yizhou Wang 《China & World Economy》 SCIE 2004年第5期59-66,共8页
Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs ... Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs to curb various NTS threats, given a countryslimited resources and capacities? By raising thought-provoking questions, the author triesto explain the perplexity concerning NTS issues, arguing that NTS is important in economic,political and security sense, but that more efforts are needed from the academics in order toreach a consensus in understanding and dealing with NTS issues. 展开更多
关键词 security Defining non-traditional security and Its Implications for China
原文传递
ESSA: An Efficient and Secure Splitting Algorithm for Distributed Storage Systems
18
作者 CHEN Zhao YAO Wenbin XIAO Da WU Chunhua LIU Jianyi WANG Cong 《China Communications》 SCIE CSCD 2010年第4期89-95,共7页
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente... The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing. 展开更多
关键词 Distributed System secure Storage Information Dispersal knight's tour problem
下载PDF
Analysis of Problems and Countermeasures in the Maintenance of Computer Network
19
作者 Yan Jiao 《International Journal of Technology Management》 2016年第5期19-21,共3页
With the continuous development of economy in our country, the level of science and technology requirements are also become greater. In the process of scientific and technological progress, ensuring that technology ca... With the continuous development of economy in our country, the level of science and technology requirements are also become greater. In the process of scientific and technological progress, ensuring that technology can serve the public better is a problem that needs to be faced in our study. In our daily life, computer networks have become essential to everyone, and the use of computers can bring a lot of convenience to the public which is also an important guarantee for the continuous development of society. However, when we use computers, we will face the problems related to computer network security. These problems will bring a lot of negative results for users or industries. Based on these considerations, in the process of using a computer network, we have to maintain the network system. In this paper, we discussed the development situation and problems of computer network security at the present stage. And in the process, we are looking for more solutions to maintain the security of computer network. 展开更多
关键词 COMPUTER NETWORK security SAFETY problem SOLUTIONS
下载PDF
Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation
20
作者 Y.M.Mahaboob John G.Ravi 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3653-3666,共14页
Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To redu... Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To reduce this drawback,this paper proposes a new secure routing algorithm based on real-time partial ME(Mobility,energy)approximation.The routing method RRME(Real-time Regional Mobility Energy)divides the whole network into several parts,and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly.It is done in the path discovery phase,estimated to identify and remove malicious nodes.In addition,Trusted Forwarding Factor(TFF)calculates the various nodes based on historical records and other characteristics of multiple nodes.Similarly,the calculated QoS Support Factor(QoSSF)calculating by the Data Forwarding Support(DFS),Throughput Support(TS),and Lifetime Maximization Support(LMS)to any given path.One route was found to implement the path of maximizing MANET QoS based on QoSSF value.Hence the proposed technique produces the QoS based on real-time regional ME feature approximation.The proposed simulation implementation is done by the Network Simulator version 2(NS2)tool to produce better performance than other methods.It achieved a throughput performance had 98.5%and a routing performance had 98.2%. 展开更多
关键词 Mobile ad-hoc network(MANET) routing problem regional approximation secure routing QoS support factor trusted forwarding factor data forwarding support(DFS) mobility energy
下载PDF
上一页 1 2 74 下一页 到第
使用帮助 返回顶部