期刊文献+
共找到8,900篇文章
< 1 2 250 >
每页显示 20 50 100
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
1
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Cautionary Remarks When Testing Agreement between Two Raters for Continuous Scale Measurements: A Tutorial in Clinical Epidemiology with Implementation Using R
2
作者 Mohamed M. Shoukri 《Open Journal of Epidemiology》 2024年第1期56-74,共19页
Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting sub... Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest. 展开更多
关键词 Limits of agreement Pitman and Morgan Tests Test of Parallelism The Arcsine Variance Stabilizing Transformation Sample Size Estimation
下载PDF
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance
3
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2022年第11期3827-3845,共19页
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of images.Since the work is done offshore,these agreements or images must be shared through the Internet or stored over the cloud.The breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of danger.This article proposes a novel algorithm for securing the NDAs in the form of images.As an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the Internet.As the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of time.The confusion effects have been realized through an XOR operation between the confused image,and chaotic data.Besides,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it has.The machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images. 展开更多
关键词 Non-disclosure agreement encryption DECRYPTION secret key chaoticmap CONFUSION diffusion
下载PDF
An Automated Semantic Negotiation for Cloud Service Level Agreements
4
作者 Dr. K. Saravanan Dr. S. Silas Sargunam Dr. M. Rajaram 《Circuits and Systems》 2016年第9期2443-2451,共9页
Mostly, cloud agreements are signed between the consumer and the provider using online click-through agreements. Several issues and conflicts exist in the negotiation of cloud agreement terms due to the legal and ambi... Mostly, cloud agreements are signed between the consumer and the provider using online click-through agreements. Several issues and conflicts exist in the negotiation of cloud agreement terms due to the legal and ambiguous terms in Service Level Agreements (SLA). Semantic knowledge applied during the formation and negotiation of SLA can overcome these issues. Cloud SLA negotiation consists of numerous activities such as formation of SLA templates, publishing it in registry, verification and validation of SLA, monitoring for violation, logging and reporting and termination. Though these activities are interleaved with each other, semantic synchronization is still lacking. To overcome this, a novel SLA life cycle using semantic knowledge to automate the cloud negotiation has been formulated. Semantic web platform using ontologies is designed, developed and evaluated. The resultant platform increases the task efficiency of the consumer and the provider during negotiation. Precision and recall scores for Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) SLAs were calculated. And it reveals that applying semantic knowledge helps the extraction of meaningful answers from the cloud actors. 展开更多
关键词 Service Level agreements Semantic Web SLA Life Cycle NEGOTIATION
下载PDF
China, Philippines signed two power plants agreements
5
《Electricity》 1996年第4期36-36,共1页
China and Philippines signed agreements on the construction of two power plants in the Philippines on Nov. 27, 1996. China Shanghai Electric Corp signed an export credit supply contract with Philippines Magellan Utili... China and Philippines signed agreements on the construction of two power plants in the Philippines on Nov. 27, 1996. China Shanghai Electric Corp signed an export credit supply contract with Philippines Magellan Utilities Development Corp for the huilding of a 300 MW 展开更多
关键词 Philippines signed two power plants agreements China
下载PDF
Research on the Risk Management Issues of VAM Agreements in Private Equity Financing
6
作者 Cong Du 《Proceedings of Business and Economic Studies》 2022年第1期27-36,共10页
At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provid... At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provide enterprises with professional management concepts and even help growing enterprises to go public in advance.However,high returns must be accompanied by high risks.For example,private equity financing has information asymmetry risks,principal-agent risks,etc.,and these risks make it impossible to maximize the advantages of private equity financing.Therefore,in order to reduce the risks brought by financing,investment and financing parties should choose to sign gambling contracts to reduce the risk.In recent years,the use of VAM agreements has become more in China.However,according to incomplete statistics,less than 30%of VAM agreements are successful,and this result is mainly due to the insufficient depth and breadth of research on VAM agreements.Therefore,this article will comprehensively analyze the problems that need to be paid attention to when signing a gambling agreement by introducing the case of Anda Technology,and the issue of targeted risk prevention will also be discussed in this paper. 展开更多
关键词 Private equity financing Gambling agreement VAM agreement Risk prevention and control
下载PDF
ZTE Inks Strategic Agreements with Two Leading European Telecom System Integrators
7
《ZTE Communications》 2008年第1期61-61,共1页
ZTE Corporation has signed strategic telecommunications software agreement with two leading providers in Europe and Latin America to optimize its offerings for target customers in
关键词 ZTE Inks Strategic agreements with Two Leading European Telecom System Integrators
下载PDF
Improved quantum key agreement protocol with authentication
8
作者 郭继红 柏明强 +2 位作者 雷小燕 谢佳欣 莫智文 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期308-313,共6页
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica... In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks. 展开更多
关键词 quantum key agreement AUTHENTICATION six-particle entangled states
下载PDF
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
9
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
下载PDF
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
10
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
下载PDF
The Faithful Representation of Electrical Energy Sale and Purchase Agreements Under International Accounting Standards/International Financial Reporting Standards (IAS/IFRS) 被引量:1
11
作者 Massimiliano Celli 《Journal of Modern Accounting and Auditing》 2013年第8期1032-1045,共14页
关键词 会计准则 财务报告 IAS 国际 电能 协议 买卖 金融工具
下载PDF
EU's Association Agreements & Central America: No Milk Until the Cows Come Home
12
作者 Imtiaz Hussain 《International Relations and Diplomacy》 2014年第12期794-805,共12页
关键词 国际关系 外交 外交行政 外交政策
下载PDF
Macroeconomic and Social Impacts of Economic Partnership Agreements on Ivorian Economy: A New Assessment
13
作者 FE Doukoure Charles 《Economics World》 2014年第5期291-302,共12页
关键词 世界经济 政策 规划 经济问题
下载PDF
A Comparative Analysis of Owner-Contractor Agreements in the Turkish and US Construction Industry
14
作者 Pinar Irlayici Cakmak Elcin Tas 《Journal of Civil Engineering and Architecture》 2014年第4期492-498,共7页
关键词 标准协议 业主承包 美国标准 土耳其 建设项目 建筑行业 建设合同 成本效益
下载PDF
部际信用治理合作备忘录:性质、效力与优化 被引量:1
15
作者 李海平 孙媛 《北京航空航天大学学报(社会科学版)》 2024年第3期30-38,共9页
合作备忘录是部际信用合作治理的重要方式。不同于行政规范性文件,合作备忘录既是公法协定中的部际协定,也是一种契约治理形态。合作备忘录遵循契约相对性一般原理,具有相对效力,但这种效力相对性也是相对的。由于科层制特有的权力结构... 合作备忘录是部际信用合作治理的重要方式。不同于行政规范性文件,合作备忘录既是公法协定中的部际协定,也是一种契约治理形态。合作备忘录遵循契约相对性一般原理,具有相对效力,但这种效力相对性也是相对的。由于科层制特有的权力结构与行政服从义务、不完善的信用立法、对个人利益的保护等,合作备忘录的效力溢出至地方公权力主体和相对人。合作备忘录具有补充信用立法、强化行政协助、促进参与式治理等优势,也存在冲击法律体系、违反法律保留原则、规避监督、缺乏合作保障等不足,因而需从合法性、规范性、民主性等方面加以优化。 展开更多
关键词 合作备忘录 部际 契约 相对效力 信用
下载PDF
环境法典编纂纳入“双碳”目标的可行路径研究 被引量:1
16
作者 潘晓滨 刘尚文 《湖北师范大学学报(哲学社会科学版)》 2024年第1期77-88,共12页
习近平总书记在党的二十大报告中明确指出要积极稳妥推进碳达峰碳中和,自我国提出“双碳”目标以来不仅在全球气候变化治理发挥了积极作用,还进一步推进了国内能源、经济等领域的低碳发展转型。通过对“双碳”目标进行辨析,相关政策与... 习近平总书记在党的二十大报告中明确指出要积极稳妥推进碳达峰碳中和,自我国提出“双碳”目标以来不仅在全球气候变化治理发挥了积极作用,还进一步推进了国内能源、经济等领域的低碳发展转型。通过对“双碳”目标进行辨析,相关政策与法律现状进行梳理,发现我国当前保障“双碳”目标存在专门法缺失、相关法的保障制度仍需完善、配套政策保障手段不足的问题。结合对法国、瑞典与德国三国的立法经验进行分析,基于我国国情,未来可以尝试于环境法典以可持续发展衔接“双碳”目标价值内涵,建立环境法典、单行法与政策的协同机制,推进“双碳”因素纳入环境影响评价与环境行政许可,合理衔接刑事责任的方式保障“双碳”目标的顺利实现。 展开更多
关键词 “双碳”目标 《巴黎协定》 环境法典 单行法
下载PDF
药品数据专有权国际立法溯源与中国制度安排
17
作者 刘鑫 《科技进步与对策》 北大核心 2024年第6期139-148,共10页
药品上市审批对于药品安全有效性数据的专门审查要求,造就了涉及药品数据的独特知识产权保护机制。基于药品数据获取的高昂投入及其对于药品仿制与后续创新的重要价值,美欧发达国家在世界范围内率先建立了药品数据保护机制,其逐渐成为... 药品上市审批对于药品安全有效性数据的专门审查要求,造就了涉及药品数据的独特知识产权保护机制。基于药品数据获取的高昂投入及其对于药品仿制与后续创新的重要价值,美欧发达国家在世界范围内率先建立了药品数据保护机制,其逐渐成为一项国际性的法律规则。无论是美欧发达国家的立法,还是相关国际法律规则,对于药品数据的知识产权保护都呈现从商业秘密模式向专有权机制转变的立法格局。产业利益驱动无疑是其中的一个重要诱因,但归根结底是源自药品数据专有权有效兼顾原研发药企经济利益与社会公众健康权益的制度优势。鉴于此,在药品数据专有权保护的国际趋势下,我国应从本土药品产业激励创新与规范仿制的基本诉求出发,以必要的内部限制与外部监管明确药品数据专有权的法律边界,并通过药品数据动态化公示平台的设置与药品数据付费使用模式的创设,建构起与药品专利制度有机衔接的数据专有权保护机制。 展开更多
关键词 药品数据专有权 药品专利保护 商业秘密 TRIPS协定 TPP协定 CPTPP协定
下载PDF
智能家居网络下基于多因子的认证密钥协商方案
18
作者 张敏 冯永强 +1 位作者 许春香 张建华 《信息网络安全》 CSCD 北大核心 2024年第1期133-142,共10页
智能家居网络通过物联网技术将智能设备相连,用户可以远程查看和控制家居设备,但信息在不安全的公共网络上传输将面临各种网络威胁,因此研究和设计安全高效且符合智能家居网络的认证密钥协商协议非常必要。2020年,WAZID等人针对智能家... 智能家居网络通过物联网技术将智能设备相连,用户可以远程查看和控制家居设备,但信息在不安全的公共网络上传输将面临各种网络威胁,因此研究和设计安全高效且符合智能家居网络的认证密钥协商协议非常必要。2020年,WAZID等人针对智能家居网络提出轻量级认证密钥协商方案(Wazid-Das方案),经过安全性分析和证明后发现,该方案过于依赖智能家居网关节点(Gateway Node,GWN),系统健壮性不高;该方案将用户和设备密钥存储在GWN中,但GWN面临特权攻击和各种外部网络攻击,并不绝对安全,且没有考虑用户的访问控制。文章在Wazid-Das方案的基础上针对智能家居网络提出一种基于切比雪夫映射(Chebyshev Chaotic Map)和安全略图(Secure Sketch)的多因子认证密钥协商方案。安全性证明和仿真实验结果表明,该方案虽然计算开销有所增加,但安全性显著提高,且通信开销大幅降低。 展开更多
关键词 智能家居 安全略图 多因子认证 切比雪夫映射 密钥协商
下载PDF
自适应光学视觉模拟器测量波前像差的重复性及与OPD-Scan Ⅲ的一致性研究
19
作者 王艳 廖萱 +5 位作者 兰长骏 李彪 苗壮 谭青青 秦苏云 黄欢 《国际眼科杂志》 CAS 2024年第5期810-815,共6页
目的:评价自适应光学视觉模拟器(VAO)测量全眼高阶像差的重复性及与OPD-ScanⅢ测量全眼高阶像差的一致性。方法:采用横断面研究方法。纳入2023-08/09在成都东区爱尔眼科医院屈光科就诊的近视患者204例204眼(均取右眼数据)。由同一位操... 目的:评价自适应光学视觉模拟器(VAO)测量全眼高阶像差的重复性及与OPD-ScanⅢ测量全眼高阶像差的一致性。方法:采用横断面研究方法。纳入2023-08/09在成都东区爱尔眼科医院屈光科就诊的近视患者204例204眼(均取右眼数据)。由同一位操作熟练的检查者分别使用两种设备进行检查,使用VAO测量4.5 mm瞳孔直径下3-6阶的高阶像差,VAO和OPD-ScanⅢ测量3-6 mm瞳孔直径下全眼总高阶像差(tHOA)、球差(SA)、彗差(Coma)和三叶草像差(Trefoil),评估VAO测量全眼像差的重复性及两种设备的一致性。结果:VAO测量全眼的高阶像差均显示较高的重复性(0.767≤ICC≤0.941、Sw<0.01μm、TRT<0.1μm)。4-6 mm瞳孔直径下VAO与OPD-ScanⅢ的Coma测量值无差异(P>0.05),其余瞳孔直径下全眼总高阶像差的测量值均有差异(均P<0.05)。VAO与OPD-ScanⅢ的3 mm瞳孔直径下各阶像差以及4、5 mm瞳孔直径下的SA、4 mm瞳孔直径下的Coma测量值的95%LoA<0.1,显示一致性较好,其余瞳孔直径下的像差测量值的95%LoA>0.1,显示一致性较差,两种设备3 mm(r=0.218-0.317,P<0.01)、4 mm(r=0.406-0.672,P<0.01)、5 mm(r=0.538-0.839,P<0.01;r=0.030-0.109,P>0.01)以及6 mm(r=0.369-0.766,P<0.01)瞳孔直径下高阶像差测量值差异较大。结论:VAO测量3-6 mm瞳孔直径下全眼高阶像差结果时具有良好的重复性,但VAO与OPD-ScanⅢ的3-6 mm瞳孔直径下的全眼高阶像差测量值存在差异性,一致性较差,临床应用不可互换。 展开更多
关键词 自适应光学视觉模拟器 OPD-ScanⅢ 波前像差 重复性 一致性
下载PDF
面向车联网通勤的双阶段认证密钥协商协议
20
作者 张海波 余艺 +1 位作者 王冬宇 贺晓帆 《通信学报》 EI CSCD 北大核心 2024年第5期128-139,共12页
针对通勤车辆在车联网中向路边单元(RSU)获取服务的安全与效率问题,提出了一种双阶段的认证密钥协商协议。在初始认证阶段,利用车辆、RSU和可信机构(TA)间协商的3个独立会话密钥,保障2个实体间传输的隐私不被第三方实体窃取。在快速认... 针对通勤车辆在车联网中向路边单元(RSU)获取服务的安全与效率问题,提出了一种双阶段的认证密钥协商协议。在初始认证阶段,利用车辆、RSU和可信机构(TA)间协商的3个独立会话密钥,保障2个实体间传输的隐私不被第三方实体窃取。在快速认证阶段,车辆和RSU间利用车辆旅行时间表高效地完成相互认证。协议支持车辆匿名与匿名追溯,且能防止通勤路线等隐私泄露。此外,通过随机预言机证明了协议的安全性。仿真结果表明,在典型通勤场景下,所提方案比同类方案降低了59.35%的计算开销和44.21%的通信开销。 展开更多
关键词 车联网 认证密钥协商 匿名追溯 随机预言机
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部