期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
“中世纪”的“私人性”——弗朗索瓦·维庸与白居易妓女题材诗歌比较
1
作者 沈德玮 《法国研究》 2010年第4期13-22,66,共11页
本文试图以广义的人类"中世纪"为背景,从维庸和白居易妓女题材的诗歌入手,探讨中西方"私人性"的共通之处与特定所指,认为维庸代表的欧洲中世纪语境下的"私人性",主要是神的观念的反动,即对人的承认,而白... 本文试图以广义的人类"中世纪"为背景,从维庸和白居易妓女题材的诗歌入手,探讨中西方"私人性"的共通之处与特定所指,认为维庸代表的欧洲中世纪语境下的"私人性",主要是神的观念的反动,即对人的承认,而白居易代表的中唐中国,其"私人性"则指对儒家"公"的家国意识形态的逆反。可以说,这两种"私人性"既相似又植根于各自文化逻辑之中,预示着近代以后中西文明的根本差别。 展开更多
关键词 “中世纪” “私人性” 维庸 白居易 妓女 时间
下载PDF
“私人”性质的建立与消解——以90年代语境下陈染的《私人生活》为例 被引量:1
2
作者 聂莉 《海南师范大学学报(社会科学版)》 2014年第4期58-63,67,共7页
20世纪90年代,陈染以先锋姿态创作出《与往事干杯》《私人生活》等作品,其内容被一些批评家认为具有"个人化"、"私人化"性质,其写作被称为"女主主义写作",作品被认作是"私小说"。在陈染及其代... 20世纪90年代,陈染以先锋姿态创作出《与往事干杯》《私人生活》等作品,其内容被一些批评家认为具有"个人化"、"私人化"性质,其写作被称为"女主主义写作",作品被认作是"私小说"。在陈染及其代表作《私人生活》面临经典化的当下,不同的当代文学史对于陈染及其创作的命名并未取得一致,但其创作的"私人"性质基本上得到了确认。论文试图以90年代对陈染及当时与其写作具有相似性的林白等人创作的评论为出发点,从"私人性"的获得、"私人化"产生的异议、"个人化"的消解与"私人化"仿制等方面来探讨批评家们在90年代对于陈染等写作的不同定位及在市场化环境下"私人"性质的建立与消解。 展开更多
关键词 陈染 私人生活》 “私人性” 异议 消解 仿制
下载PDF
Identity-based threshold key-insulated signature 被引量:3
3
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
Public and Private Investment in the Port Sector in Mexico, 2000-2010: A Study Through Data Envelopment Analysis
4
作者 Odette V. Delfin-Ortega César L. Navarro-Chàvez 《Chinese Business Review》 2014年第1期34-41,共8页
Knowing the level of efficiency of investment applied in ports of Mexico is relevant information for the design of port policies that contribute to its development and thus to greater freight movement. The objective o... Knowing the level of efficiency of investment applied in ports of Mexico is relevant information for the design of port policies that contribute to its development and thus to greater freight movement. The objective of this paper is to analyze the technical efficiency obtained from International Mexican Ports, through the use of the technique of Data Envelopment Analysis (DEA). It uses data regarding public and private investment in ports applied during the period 2000-2010 and its influence on the number of Twenty-foot Equivalent Unit (TEU). Because it has been applied the DEA-CCR (the linear programming model) model input oriented, thus not only the efficiency is calculated in ports, but benchmarking is also obtained to determine the efficient ports that serve as reference to those who were found to be inefficient. The results obtained showed that Manzanillo and Progreso were the most efficient ports. On the other hand, the ports that were not efficient for any of the years reviewed were Mazatlan and Lazaro Cardenas. Generally, public investment has been increasing over the period, and public policies are not designed to allow the ports to have an international projection. 展开更多
关键词 ports INVESTMENT Data Envelopment Analysis (DEA) technical efficiency
下载PDF
Quantum Private Comparison Protocol Based on Bell Entangled States 被引量:3
5
作者 刘文 王永滨 崔巍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第4期583-588,共6页
In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The c... In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information. 展开更多
关键词 quantum private comparison protocol Bell entangled state PRIVATE
原文传递
Information Revelation in Sequential Auctions with Uncertainties About Future Objects
6
作者 HU Erqin ZHAO Yong RAO Congjun 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第6期1617-1628,共12页
In many auctions,buyers know beforehand little about objects to be sold in the future.Whether and how to reveal information about future objects is an important decision problem for sellers.In this paper,two objects a... In many auctions,buyers know beforehand little about objects to be sold in the future.Whether and how to reveal information about future objects is an important decision problem for sellers.In this paper,two objects are sold sequentially and each buyer's valuation for the second object is k times that for the first one,and the true value of k is sellers' private information.The authors identify three factors which affect sellers' revelation strategies: The market's competition intensity which is characterized by the number of buyers,buyers' prior information about the second object,and the difference degree between two objects which is characterized by k.The authors give not only conditions under which revealing information about the second object in advance benefits the seller,but also the optimal releasing amount of information in the market with two sellers and one seller,respectively. 展开更多
关键词 Future objects revelation strategy sequential auctions unit-demands.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部