期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Nabbing the Pirates of Cyberspace
1
作者 Philip Elmer Dewitt 赵忠德 《语言教育》 1999年第4期67-68,共2页
Software piracy,illegal software duplication,seems to beas rampant as an epidemic disease all over the world andboth software publishers and government officials are frus-trated.The loss for the software publishers du... Software piracy,illegal software duplication,seems to beas rampant as an epidemic disease all over the world andboth software publishers and government officials are frus-trated.The loss for the software publishers due to the unau-thorized copying of computer programs amounted to ■1.6 bil-lion in the U.S.The figure could reach ■7.5 billion if over-seas markets were included.Some countries such as Italy 展开更多
关键词 Nabbing the pirates of Cyberspace
下载PDF
《擒获王直》作者考论 被引量:1
2
作者 李贤强 吴宏岐 《海洋史研究》 2021年第1期233-249,共17页
海防文献的整理与研究历来是一个学术热点,特别是明人郑若曾编纂的《筹海图编》,学者们对此的研究已有相当成就。①《筹海图编》卷九《大捷考》记载了诸多战役,最引人注目的要数佚名的《擒获王直》。《擒获王直》详细地记载了胡宗宪平... 海防文献的整理与研究历来是一个学术热点,特别是明人郑若曾编纂的《筹海图编》,学者们对此的研究已有相当成就。①《筹海图编》卷九《大捷考》记载了诸多战役,最引人注目的要数佚名的《擒获王直》。《擒获王直》详细地记载了胡宗宪平定王直的过程,由于此文涉及海盗、倭寇、徽商、海贸等诸多题材,因此为海洋史、经济史、军事史、中外关系史等领域的学者广泛征引,其重要性不言而喻。然而,学界对这篇文献的真正作者是谁,以及它是如何产生的等相关问题的研究还很薄弱。本文拟对此进行探讨,希望可以推进相关领域的研究。 展开更多
关键词 Wang Zhi Tian Rucheng Japanese pirates Chou Hai Tu Bian
下载PDF
国外舰载搜索跟踪技术发展研究 被引量:4
3
作者 于彦梅 王丹伟 《情报指挥控制系统与仿真技术》 2003年第5期7-10,共4页
红外搜索跟踪系统(IRST)采用被动探测方式,具有较好的隐身能力,不易遭受攻击,是雷达探测警戒的重要补充手段,也是信息战尤其是光电对抗的重要组成部分。本文论述了舰载IRST系统的组成和工作原理,介绍了国外舰载IRST系统的装备情况,并分... 红外搜索跟踪系统(IRST)采用被动探测方式,具有较好的隐身能力,不易遭受攻击,是雷达探测警戒的重要补充手段,也是信息战尤其是光电对抗的重要组成部分。本文论述了舰载IRST系统的组成和工作原理,介绍了国外舰载IRST系统的装备情况,并分析了舰载搜索跟踪技术的发展趋势。 展开更多
关键词 舰载搜索跟踪技术 红外搜索服踪系统 系统组成 工作原理 美国 加拿大 AN/SAR-8 SIRST ELOp公司 IRST 法国 “旺皮尔”系列 荷兰 IRSCAN “天狼星” 英国 ARISE PIRATE
下载PDF
The Danube, an Empire Boundary River: Settlements, Invasions, Navigation, and Trade Pathway
4
作者 Kenneth R. Olson Edward Krug 《Journal of Water Resource and Protection》 2020年第10期884-897,共14页
The Danube River basin was home to some of the world’s earliest human cultures such as the Danubian Neolithic cultures including the Linear Pottery culture. The Vucedol culture was famous for ceramics during the thir... The Danube River basin was home to some of the world’s earliest human cultures such as the Danubian Neolithic cultures including the Linear Pottery culture. The Vucedol culture was famous for ceramics during the third millennium BC. Early settlement required fortresses and castles to be built on the Danube River to defend the settlements from invading forces. These included the Persia, Roman and Ottoman empires. Cities included Vienna, Budapest, Belgrade and Ruse. The risks include stream capture, settlement, invasions, navigation, trade, pollution, industrial and urban wastewater, over fishing, food insecurity, locks and dams, shoreline erosion and flooding. The primary objective was to document the settlement history on the Danube River which became Eastern Europe’s pathway for settlement, invasions, navigation and trade in the Danube basin has put the river at risk for more than 2500 years. River capturing of the Danube by the Rhine River has reduced the length and flow of the Danube. The Danube River has had a huge economic, social and environmental impact on 10 European countries. However, with 10 countries sharing the river it has been difficult to manage and mitigate the risks and threats to the Danube River and its water quality. 展开更多
关键词 LOCKS Dams Flooding Shoreline Erosion Fishing Drinking Water OTTOMAN ROMAN Hydroelectric Pirate Attacks
下载PDF
Pirate decoder for the broadcast encryption schemes from Crypto 2005 被引量:2
5
作者 WENG Jian LIU ShengLi CHEN KeFei 《Science in China(Series F)》 2007年第3期318-323,共6页
In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they giv... In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they give an open question to construct a traitor tracing algorithm for their broadcast encryption schemes, and combine the two systems to obtain an efficient trace-and-revoke system. In this paper, we give a negative answer to their open question. More precisely, we show that three or more insider users are able to collude to forge a valid private key for pirate decoding against their schemes. Moreover, we prove that there exists no traitor tracing algorithm to identify the colluders. Our pirate decoding can also similarly be applied to Lee et al.'s broadcast encryption schemes in ISPEC'06. 展开更多
关键词 broadcast encryption pirate decoder traitor tracing
原文传递
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
6
作者 吴永东 Member, IEEE 邓慧杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第2期362-374,共13页
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of... In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of defeating most multiple-round based traitor tracing schemes such as the schemes based on the black-box confirmation method. In particular, the proposed pirate decoder is customized to defeat the private key and the public key fully collusion resistant traitor tracing (FTT) schemes, respectively. We show how the decoder prolongs a trace process so that the tracer has to give up his effort. FTT schemes are designed to identify all the traitors. We show that decoder enables the FTT schemes to identify at most 1 traitors. Finally, assuming the decoder is embedded with several bytes of memory, we demonstrate how the decoder is able to frame innocent users at will. 展开更多
关键词 broadcast encryption multi-key pirate decoder traitor tracing
原文传递
Is Microsoft Justified to “Black Out” Pirated Software Users?
7
《Beijing Review》 2008年第46期46-47,共2页
Microsoft came down hard on pirate users of its operating system in China on October 21,causing
关键词 OFFICE Black Out Is Microsoft Justified to Pirated Software Users
原文传递
I want to be a pirate
8
作者 顾沁怡 《中学生百科(小文艺)》 2011年第6期54-56,共3页
笔名月半残。因为喜欢残月的朦胧清丽而取,希望大家可以亲切地叫我月。性格冲动豪爽大方.被死党戏称为“大口吃肉大嗓门的豪放派”。
关键词 中学 课外阅读 阅读材料 《I WANT to BE a pirate》
原文传递
Pirate Ship
9
《英语角》 2018年第12期67-67,49,共2页
There are six differences between two pictures below.Please point them out.
关键词 Pirate SHIP DIFFERENCES
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部