期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
“文攻”在反“台独”中的作用及力量发挥初探
1
作者 邹慧君 张文生 《重庆社会主义学院学报》 2007年第2期48-51,共4页
“文攻”是遏制和打击“台独”分裂势力的多种非军事手段的综合运用。反“台独”斗争的历史经验与现实态势,都决定了必须强化对台“文攻”。在运筹对台“文攻”的过程中,要注意遵循必要的方法论原则,如正义性原则、系统性原则、攻心为... “文攻”是遏制和打击“台独”分裂势力的多种非军事手段的综合运用。反“台独”斗争的历史经验与现实态势,都决定了必须强化对台“文攻”。在运筹对台“文攻”的过程中,要注意遵循必要的方法论原则,如正义性原则、系统性原则、攻心为上原则、主动性原则、奇胜原则和长效性原则等。 展开更多
关键词 “文攻” “台独”分裂势力 斗争
下载PDF
Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext 被引量:6
2
作者 Zhu Congxu Sun Kehui 《China Communications》 SCIE CSCD 2012年第1期73-79,共7页
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process... A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications. 展开更多
关键词 skew tent map chaotic system image encryption secure corrrrmnieation
下载PDF
Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain 被引量:1
3
作者 Ramadan Noha Ahmed HossamEldin H +1 位作者 El-khamy Said E Abd El-Samie Fathi E 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第9期2049-2057,共9页
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat... A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks. 展开更多
关键词 Backer map chaotic encryption fractional Fourier transform (FRFT) modified Logistic map
下载PDF
Adaptive image encryption scheme based on chaotic map
4
作者 邱劲 Liao Xiaofeng +1 位作者 Xiao Di Xiang Tao 《High Technology Letters》 EI CAS 2013年第1期76-81,共6页
Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is propo... Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is proposed, where a simple post-processing by compressing is employed. A new adaptive image encryption scheme with the substitution-diffusion architecture is designed using the new pseu- do-random bit generator. In the scheme, the session key for the pseudo-random bit generator is dependent on the content of the image which ensures that the scheme can effectively resist knownplaintext and chosen-plaintext attacks. Theoretical analysis and computer simulation indicate that the proposed algorithm is efficient and highly secure. 展开更多
关键词 image encryption chaotic map substitution-diffusion chaotic key stream
下载PDF
Treatment of aggressive pancreatic solid pseudo-papillary neoplasms with apatinib plus S-1 chemotherapy:A case report and literature review
5
作者 Yang Tang Li Yang Xianglin Yuan 《Oncology and Translational Medicine》 2018年第5期219-221,共3页
Solid pseudopapillary neoplasm(SPN) is a rare indolent pancreatic neoplasm that occurs mostly in females. Although the malignancy potential is quite limited for SPN, these tumors can sometimes be aggressive and lead t... Solid pseudopapillary neoplasm(SPN) is a rare indolent pancreatic neoplasm that occurs mostly in females. Although the malignancy potential is quite limited for SPN, these tumors can sometimes be aggressive and lead to inferior prognosis for male patients. In this case report, we present a special case of a male patient with SPN who experienced an aggressive tumor expansion after two surgical resections. For further treatment, we decided to administer chemotherapy with apatinib and S-1, and subsequent CT/MRI tumor monitoring indicated satisfactory control of tumor expansion. The effectiveness of apatinib plus the S-1 regimen should be tested for more patients with SPN in the future. 展开更多
关键词 solid pseudopapillary neoplasm apatinib S1 CHEMOTHERAPY
下载PDF
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
6
作者 Ding Ning Gu Dawu Liu Zhiqiang 《China Communications》 SCIE CSCD 2010年第6期56-63,共8页
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are ... In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes. 展开更多
关键词 symmetric encryption OBFUSCATION ANTI-FORENSICS
下载PDF
CAPT:Context-Aware Provenance Tracing for Attack Investigation
7
作者 Cheng Tan Lei Zhao +2 位作者 Weijie Liu Lai Xu Lina Wang 《China Communications》 SCIE CSCD 2018年第2期153-169,共17页
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ... APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%. 展开更多
关键词 attack investigation provenance tracing CONTEXT-AWARE virtualization technol-ogies APT attacks panoramic view
下载PDF
Aggressive Behaviour During Breaks as a Manifestation of Different Types of Culture at School
8
作者 Marzanna Farnicka 《Sociology Study》 2014年第1期18-26,共9页
The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of ... The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of these expectations as predictors of pro-social and anti-social behaviour has been analysed. The research is based on the assumption that every culture develops specific benchmarks in reference to which people judge various social phenomena. Creation of an individual conception of oneself and making a plan for one's life is based, to some extent, on social values which constitute the crucial element of every culture. The hypothesis to be verified in this study was the presence of a significant link between the occurrence of anti-social and pro-social behaviour and the adopted axiological assumptions concerning students and their behaviour. The subjects of the study were students and teachers from 18 schools representing three types of culture and three educational levels (primary, lower secondary, and upper secondary). The total number of 1,212 students were observed (Goldsmith's Observational Questionnaire), and 36 teachers were interviewed. The results indicate a link between the adopted school culture and teachers' functioning, and open perspectives of further research on the connection between the values in school curricula and the occurrence of behaviour violating social norms and bounds. 展开更多
关键词 AGGRESSION social behaviour SCHOOL school culture values in education
下载PDF
The Babysitter: A Feminist Interpretation
9
作者 LIU Ke-dong LI Shuang-shuang 《Journal of Literature and Art Studies》 2014年第7期521-526,共6页
Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and... Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and of two of her male peers and the children's father altogether exploring their obsession towards her and, moreover, traces the evaluation and devaluation of women to the presentation of TV exploring its influence on his heroines, namely Mrs. Tucker and the babysitter serving as victims of the patriarchal society. Through a close engagement with the sexual objectification theory, this paper analyzes in detail men's aggressive oppressions upon women as well as women's compromise and rebellion towards the sexual violence, and investigates that the awakening of female independent consciousness is a key factor in effectively helping women achieve the gender equality between sexes. 展开更多
关键词 Robert Coover The Babysitter OBJECTIFICATION
下载PDF
Efficient hierarchical identity based encryption scheme in the standard model over lattices 被引量:2
10
作者 Feng-he WANG Chun-xiao WANG Zhen-hua LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第8期781-791,共11页
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q b... Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and(n, m, q)are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is(2dm^2+ mn + m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry's encryption scheme, by which m^2 bits of plaintext are encrypted into m^2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks. 展开更多
关键词 Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with errors problem GAUSSIAN
原文传递
An Identity-Based Encryption Scheme with Compact Ciphertexts
11
作者 刘胜利 郭宝安 张庆胜 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期86-89,共4页
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key s... This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management. Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciphertext attack (CCA). 展开更多
关键词 identity-based encryption compact ciphertext ehosen-ciphertext attack (CCA)
原文传递
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
12
作者 路献辉 来学嘉 何大可 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期90-93,共4页
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a... To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security are studied. This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps. These gaps are categorized, analyzed and measured. Finally the methods to bridge these gaps are described. This explains the existing design approaches and gives an intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions. 展开更多
关键词 public key encryption adaptive chosen ciphertext security intractable vroblem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部