期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
二十世纪女性艺术中“私密化叙事”的文化探析
1
作者 刘玥 《天津美术学院学报》 2016年第11期90-92,共3页
中国女性艺术家从男性话语权中分离出来,转向对自我成长经验、性别体验的关注和自身价值的探寻,部分女性艺术家在艺术创作中第一次明确地将女性的身体置于历史的舞台上,使之不再处于中国文化领域遗失缺席的境地,这将对我国现当代女性艺... 中国女性艺术家从男性话语权中分离出来,转向对自我成长经验、性别体验的关注和自身价值的探寻,部分女性艺术家在艺术创作中第一次明确地将女性的身体置于历史的舞台上,使之不再处于中国文化领域遗失缺席的境地,这将对我国现当代女性艺术的发展具有很重要的现实意义。 展开更多
关键词 “私化叙事” 20世纪女性艺术 身体
下载PDF
武清别墅:细化使用功能 营造私密庭院
2
作者 侯现红 《城市住宅》 2011年第6期62-65,共4页
室外空间是别墅区别于普通住宅楼的最大优势,因此也是别墅规划设计中的重要部分。别墅室内的空间大体是两层、三层,跟复式住宅没有太大区别,但别墅建筑之外的环境却能使人真正置身于私家花园,享受到清新自然的优美景色。
关键词 武清别墅 居住建筑 建筑面积 “私庭院”
下载PDF
“私密防火墙”海尔天智星9000
3
《数码》 2003年第1期21-21,共1页
关键词 “私防火墙” 海尔 天智星9000 手机
下载PDF
海尔推出带有“私密防火墙”的手机
4
《少年电世界》 2002年第12期72-72,共1页
关键词 海尔 “私防火墙” 手机
下载PDF
《六度集经》词语札记
5
作者 陈秀兰 杨孝容 《南阳师范学院学报》 CAS 2003年第7期58-59,共2页
《六度集经》是汉文佛典本缘部的重要经典,口语性较强,反映了公元2世纪的语言实际。考释该经中的五条词语:等人、在产、私密、(?)薄、所由,可为汉语词汇史及汉语犬型工具书的编修提供新的研究成果。
关键词 《六度集经》 佛教经典 词语考释 “等人” “在产” “私密” “葌薄” “所由” “汉语” 词义
下载PDF
A Generic Construction of Ciphertext-Policy Attribute- Based Encryption Supporting Attribute Revocation 被引量:7
6
作者 WU Qiuxin 《China Communications》 SCIE CSCD 2014年第A01期93-100,共8页
Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its ap... Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its application is how to revoke the attributes of the users, though some ABE schemes have realized revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or attribute revocation under the indirect revocation model such that all the users' private keys will be affected by the revocation. In this paper, we define the model of CP-ABE supporting the attribute revocation under the direct revocation model, in which the revocation list is embed in the ciphertext and none of the users' private keys will be affected by the revocation process. Then we propose a generic construction, and prove its security with the decision q-BDHE assumption. 展开更多
关键词 attribute revocation attribute based encryption ciphertext-Policy generic construction.
下载PDF
Quantum Privacy Amplification for a Sequence of Single Qubits 被引量:6
7
作者 DENG Fu-Guo 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第3X期443-446,共4页
We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are perform... We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are performed with the unitary gate operation, and a measurement is made on one photon and the other one is retained. The retained qubit carries the state information of the discarded one. In this way, the information leakage is reduced. The procedure can be performed repeatedly so that the information leakage is reduced to any arbitrarily low level. With this QPA scheme, the quantum secure direct communication with single qubits can be implemented with arbitrarily high security. We also exploit this scheme to do privacy amplification on the single qubits in quantum information sharing for long-distance communication with quantum repeaters. 展开更多
关键词 quantum privacy amplification quantum secure direct communication
下载PDF
Big Data Security and Privacy: A Review 被引量:3
8
作者 MATTURDI Bardi ZHOU Xianwei +1 位作者 LI Shuai LIN Fuhong 《China Communications》 SCIE CSCD 2014年第A02期135-145,共11页
While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contrad... While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy. 展开更多
关键词 big data value of big data security and privacy
下载PDF
Alliance-Authentication Protocol in Clouds Computing Environment 被引量:7
9
作者 Zhang Qikun Li Yuanzhang +1 位作者 Song Danjie Tan Yuan 《China Communications》 SCIE CSCD 2012年第7期42-54,共13页
Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p... Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or public clouds. Mu tual authentication protocol among entities in the IntraCloud and InterCloud is proposed. Blind signature and bilinear mapping of automorphism groups are adopted to achieve the InterCloud Alli anceAuthentication, which overcome the complexi ty of certificate transmission and the problem of communication bottlenecks that happen in tradi tional certificatebased scheme. Blind key, instead of private key, is adopted for register, which avoids 展开更多
关键词 Alliance-Authentication direct product DECOMPOSITION bilinear mapping cloud computing
下载PDF
Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2
10
作者 Wu Qiuxin Zhang Miao 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app... Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. 展开更多
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure
下载PDF
Distributed certification application via a trusted dealer 被引量:1
11
作者 刘端阳 潘雪增 平玲娣 《Journal of Zhejiang University Science》 EI CSCD 2003年第5期555-559,共5页
Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as IT... Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as ITTC,etc.,is unsaf e ,inefficient and impracitcal in actual network environment,this paper brings u p a new distributed certification scheme,which although it generates key shares concentratively,it updates key shares distributedly,and so,avoids single-po in t failure like ITTC. It not only enhances robustness with Feldman verification and SSL protocol,but can also change the threshold (t,k) flexibly and robu stly,and so,is much more practical. In this work,the authors implement the prototype sy stem of the new scheme and test and analyze its performance. 展开更多
关键词 Distributed certification Trusted dealer ROBUST Flex ible
下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
12
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
Identity-based threshold key-insulated signature 被引量:3
13
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
他和她:私密处各有各的小烦恼
14
《父母必读》 2011年第4期46-48,共3页
龟头发红、撒尿不直、外阴肿胀、阴唇粘连……不管是男宝宝还是女宝宝,他(她)的私密处都会经历一些小麻烦,需要我们帮他(她)解决。
关键词 生理卫生 护理 婴幼儿保健 “私处”
原文传递
私密地带必修课
15
作者 斯琴 《健康伴侣》 2010年第12期27-27,共1页
你了解自己的私密V地带吗“V”是阴道英文的第一个字母,据此我们称这个隐私部位为“V地带”。
关键词 个人卫生 女性 “私地带” 阴部干燥
原文传递
Enhanced biometric encryption algorithm for private key protection in BioPKI system
16
作者 Cheol-Joo Chae Kwang-Nam Choi +2 位作者 Kiseok Choi Jae-Soo Kim Yong Ju Shin 《Journal of Central South University》 SCIE EI CAS 2014年第11期4286-4290,共5页
Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in ... Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in this PKI system. Recently, studies have been conducted on Bio PKI system that uses the biometric information of users in order to replace the password type of private key protection in PKI system. However, Bio PKI system also has vulnerability in that biometric information used for protection of private key cannot be reused once it is stolen or lost. So, we propose the method to protect the private key using FIDSEQi which binds sequence to biometric information. The proposed method enhances reusability of biometric information and presents higher attack complexity than the method of authentication by cross matching single biometric information. 展开更多
关键词 BioPKI system fingerprint biometric encryption secret share
下载PDF
A Location Privacy Preserving Solution to Resist Passive and Active Attacks in VANET 被引量:2
17
作者 ZHU Xiaoling HU Donghui HOU Zhengfeng DING Liang 《China Communications》 SCIE CSCD 2014年第9期60-67,共8页
Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular a... Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET. 展开更多
关键词 vehicular ad hoc network locationbased services location k-anonymity securemulti-party computation
下载PDF
Certificateless key-insulated signature without random oracles 被引量:6
18
作者 Zhong-mei WAN Xue-jia LAI +3 位作者 Jian WENG Sheng-li LIU Yu LONG Xuan HONG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第12期1790-1800,共11页
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat... Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures. 展开更多
关键词 KEY-INSULATED Key leakage CERTIFICATELESS Bilinear map
原文传递
Arbitrated quantum signature scheme based on reusable key 被引量:1
19
作者 YU ChaoHua GUO GongDe LIN Song 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第11期2079-2085,共7页
An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is show... An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is shown that the proposed scheme is secure against several well-known attacks.Specifically,it can stand against the receiver’s disavowal attack.Moreover,compared with previous relevant arbitrated quantum signature schemes,the scheme proposed has the advantage of less transmission complexity. 展开更多
关键词 signature signer receiver secret message cryptography encryption entangled reused resist
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部