期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
未成年人刑事审判程序中的合适成年人参与制度研究——以“吴中经验”为样本 被引量:1
1
作者 狄蕾 史华松 《唯实》 2011年第2期82-86,共5页
合适成年人参与制度的"吴中经验",是指由专业的合适成年人("爱心妈妈")介入少年刑事审判程序,开展审前社会调查,在庭审中对未成年被告人进行"全程保护"和感化教育,以社会调查员身份接受质询,并在判决后... 合适成年人参与制度的"吴中经验",是指由专业的合适成年人("爱心妈妈")介入少年刑事审判程序,开展审前社会调查,在庭审中对未成年被告人进行"全程保护"和感化教育,以社会调查员身份接受质询,并在判决后适当延伸介入未成年犯罪人的帮扶矫正环节等一系列做法构成的样式。"吴中经验"能够有效实现对未成年被告人的抚慰安定、疏导监督、关怀指引、感化教育及增进社会安宁等功能。 展开更多
关键词 合适成年人参与制度 “吴中经验” “全程保护” 感化教育
下载PDF
A Provably Secure Asynchronous Proactive RSA Scheme
2
作者 ZHANG Rui-shan(张瑞山) +3 位作者 LI Qiang(李强) CHEN Ke-fei(陈克非) 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第4期333-337,共5页
The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provabl... The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol, signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou. 展开更多
关键词 threshold RSA signature provably secure asynchronous verifiable secret sharing proactive RSA scheme
下载PDF
The Information Security of Digital Control Systems for Nuclear Power Plants
3
作者 Nadir Mengazetdinov Alexey Poletykin Vitaly G. Promyslov 《Journal of Energy and Power Engineering》 2012年第5期744-754,共11页
The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper... The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper considers, implemented by the authors within the project of advanced digital control system for NPP with the reactor VVER-1000, a system of unauthorized access protection, partially built up on the technology of AA (active audit) and expert system. The AA technology is based on response of the system on deviation of current signature of the automated process control system from stable state rather than on a certain signature of attack and relies on the estimation of the behavioral models of the particular digital control system. The advent of active audit reflects the current situation in the digital control systems where complex distributed platforms are used to construct automated process control system. The active audit allows one to make the digital control system functionally closed, provided that it is determinate. The methodology of the active audit does not give u external (barrier) and traditional (password, antivirus) methods of unauthorized access protection. These methods can be used when it is appropriate to achieve a required protection level. 展开更多
关键词 SECURITY instrumentation and control system expert system nuclear plant.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部