期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
新媒体环境下“码书”的应用
1
作者 邓娟 姜翠 《电脑乐园》 2019年第2期354-354,共1页
随着信息技术的发展,新媒体的出现使得社会生产生活方式都发生了巨大的变化。移动互联网时代,教学方式向“个性化、互 动化、社群化、数据化”变革,互联网改变了教师的传统观念,对教育技术提出了新的要求。电子书、平板电脑的普及对传... 随着信息技术的发展,新媒体的出现使得社会生产生活方式都发生了巨大的变化。移动互联网时代,教学方式向“个性化、互 动化、社群化、数据化”变革,互联网改变了教师的传统观念,对教育技术提出了新的要求。电子书、平板电脑的普及对传统教育的冲击 日渐显现,如何适当地应用新媒体服务教学,成为现代教育、教改亟需面对的课题。同时,随着信息化的普及,个性化教育的需求也日益 明显,对传统教材的改变以适应新媒体时代是大势所趋。 展开更多
关键词 新媒体 “码书”
下载PDF
Improvement on Quantum Secure Direct Communication with W State in Noisy Channel 被引量:4
2
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期232-234,共3页
An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bi... An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bit error rate induced by eavesdropper is 4.17% in C-protocol and 6.25% in Y-protocoL In this paper, another improvement on C-protocol is given. The quantum bit error rate of the eavesdropping will increase to 8.75%, which is 1.1 times larger than that in C-protocol and 0.4 times larger than that in Y-protocol. 展开更多
关键词 quantum cryptography quantum secure direct communication W state
下载PDF
AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL
3
作者 Wang Changji Yang Bo Wu Jianping 《Journal of Electronics(China)》 2005年第5期485-489,共5页
In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are describ... In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations. 展开更多
关键词 Authenticated key agreement Modification attack Computational Diffie-Hellman Assumption
下载PDF
Scaling Factor Optimization of Turbo-Polar Iterative Decoding
4
作者 Zhenzhen Liu Kai Niu +2 位作者 Jiaru Lin Jingyuan Sun Hao Guan 《China Communications》 SCIE CSCD 2018年第6期169-177,共9页
In this paper, we investigate the weighted iterative decoding to improve the performance of turbo-polar code. First of all, a minimum weighted mean square error criterion is proposed to optimize the scaling factors(SF... In this paper, we investigate the weighted iterative decoding to improve the performance of turbo-polar code. First of all, a minimum weighted mean square error criterion is proposed to optimize the scaling factors(SFs). Secondly, for two typical iterative algorithms,such as soft cancellation(SCAN) and belief propagation(BP) decoding, genie-aided decoders are proposed as the ideal reference of the practical decoding. Guided by this optimization framework, the optimal SFs of SCAN or BP decoders are obtained. The bit error rate performance of turbo-polar code with the optimal SFs can achieve 0.3 dB or 0.7 dB performance gains over the standard SCAN or BP decoding respectively. 展开更多
关键词 turbo-polar code BP decoder SCAN decoder mean square error scaling factors
下载PDF
Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings 被引量:7
5
作者 亓延峰 唐春明 +2 位作者 娄裕 徐茂智 郭宝安 《China Communications》 SCIE CSCD 2013年第11期37-41,共5页
Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi... Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure. 展开更多
关键词 certificateless signcryption iden-tity-based cryptography proxy signcryption elliptic curve discrete logarithm problem
下载PDF
Low-computation certificateless hybrid signcryption scheme 被引量:4
6
作者 Hui-fang YU Bo YANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第7期928-940,共13页
Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption. In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and cons... Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption. In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme. In the random oracle model, this scheme is proven to have indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the elliptic-curve computation Diffie-Hellman assumption. Also, it has a strong existential unforgeability against adaptive chosen-message attacks (sUF-CMA) under the elliptic-curve discrete logarithm assumption. Analysis shows that the cryptographic algorithm does not rely on pairing operations and is much more etticient than other algorithms. In addition, it suits well to applications in environments where resources are constrained, such as wireless sensor networks and ad hoc networks. 展开更多
关键词 Hybrid signcryption Scalar multiplication Certificateless cryptosystem Provable security
原文传递
The introduction of therapeutic equivalence evaluation codes and its influence on the selection of the reference listed drugs in China
7
作者 Dongsheng Yang Ningyi Wei +1 位作者 Jianzhao Niu Mingdi Xu 《Journal of Chinese Pharmaceutical Sciences》 CAS CSCD 2022年第8期646-651,共6页
The Approved Drug Products with Therapeutic Equivalence Evaluations(commonly known as the Orange Book)includes the products approved by Food and Drug Administration(FDA)to be marketed in the USA,and it is an essential... The Approved Drug Products with Therapeutic Equivalence Evaluations(commonly known as the Orange Book)includes the products approved by Food and Drug Administration(FDA)to be marketed in the USA,and it is an essential source for the selection of suitable reference listed drugs(RLD)for a chemical generic medicinal product.The Orange Book assigns a therapeutic equivalence(TE)evaluation code for approved multisource prescription drug products to serve as public information in the area of medicinal product selection.In the present study,we introduced the TE coding system and its influence on the selection of the RLD in China by taking the Topiramate Extended-release Capsules as an example.As a result,it was suggested to determine its TE evaluation code in the Orange Book previously when we choose an RLD and select suitable RLD the first letter of whose TE evaluation code is A to carry out the research and development of a generic medicinal product,which can improve the probability of success of clinical bioequivalence(BE)test and reduce the risk of generic medicinal product development. 展开更多
关键词 Reference listed drug Therapeutic equivalence evaluations code Generic medicinal product Orange Book
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部