期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
中国之歌——《名门》中的异域文化观
1
作者 李嘉欣 《长春教育学院学报》 2024年第2期44-50,共7页
《名门》是英国女作家谢福芸的代表作。小说中主人公因辛亥革命住进了中国的家庭,开启了中国之旅。该小说视角多变,构建的中国空间立体真实。运用波特兰·韦斯特法尔的多重聚焦理论,从内源性、外源性、异源性3个视角展开空间分析,... 《名门》是英国女作家谢福芸的代表作。小说中主人公因辛亥革命住进了中国的家庭,开启了中国之旅。该小说视角多变,构建的中国空间立体真实。运用波特兰·韦斯特法尔的多重聚焦理论,从内源性、外源性、异源性3个视角展开空间分析,整合不同视角下中国空间的不同特点,能够还原一个更加客观的小说空间,反映出作者客观包容的异域文化观及其反文化霸权主义的思想。 展开更多
关键词 《名门》 异域文化观 空间构建 多重聚焦
下载PDF
Taking Agricultural Landscapes into the Development System of Scenic Spot —with the Detail Plan of Yanmen Mountain Scenic Spot in Zhaixing Mountain as a Study Case 被引量:1
2
作者 翟付顺 陈翠俊 郭美锋 《Journal of Landscape Research》 2010年第2期16-18,21,共4页
As a kind of landscape resources, agricultural landscapes play a crucial role in rural tourism. It is a new attempt by taking agricultural landscapes into the development system of scenic spot for their mutual support... As a kind of landscape resources, agricultural landscapes play a crucial role in rural tourism. It is a new attempt by taking agricultural landscapes into the development system of scenic spot for their mutual support and promotion. With the detail plan of Yanmen Mountain Scenic Spot in Zhaixing Mountain Scenic Area as a study case, the authors studied how to take agricultural landscapes into the development system of scenic spot. 展开更多
关键词 Agricultural landscapes Scenic spot Yanmen Mountain
下载PDF
Improved PBFT protocol based on phase voting and threshold signature 被引量:1
3
作者 Chen Liquan Hu Jie Gu Pengpeng 《Journal of Southeast University(English Edition)》 EI CAS 2022年第3期213-218,共6页
The communication complexity of the practical byzantine fault tolerance(PBFT)protocol is reduced with the threshold signature technique applied to the consensus process by phase voting PBFT(PV-PBFT).As most communicat... The communication complexity of the practical byzantine fault tolerance(PBFT)protocol is reduced with the threshold signature technique applied to the consensus process by phase voting PBFT(PV-PBFT).As most communication occurs between the primary node and replica nodes in PV-PVFT,consistency verification is accomplished through threshold signatures,multi-PV,and multiple consensus.The view replacement protocol introduces node weights to influence the election of a primary node,reducing the probability of the same node being elected primary multiple times.The experimental results of consensus algorithms show that compared to PBFT,the communication overhead of PV-PBFT decreases by approximately 90% with nearly one-time improvement in the throughput relative and approximately 2/3 consensus latency,lower than that of the scalable hierarchical byzantine fault tolerance.The communication complexity of the PBFT is O(N^(2)),whereas that of PV-PBFT is only O(N),which implies the significant improvement of the operational efficiency of the blockchain system. 展开更多
关键词 blockchain practical byzantine fault tolerance(PBFT) threshold signature phase voting
下载PDF
Identity-based threshold key-insulated signature 被引量:3
4
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
An Efficient Proactive RSA Scheme for Ad Hoc Networks
5
作者 张瑞山 陈克非 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期46-51,共6页
A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The sc... A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The scheme consists of three protocols: the initial secret share distribution protocol, the signature generation protocol and the secret share refreshing protocol. Our scheme has three advantages. First, the signature generation protocol is efficient. Second, the signature generation protocol is resilient. Third, the share refreshing protocol is efficient. 展开更多
关键词 CRYPTOGRAPHY Threshold signature Proactivesecret sharing RSA Provable security.
下载PDF
Notes on the genus Gaeolaelaps(Acari: Laelapidae) with a newly recorded species from China
6
作者 Yi YAN Qian ZHANG +1 位作者 Xianguo GUO Lixia XIEI 《Entomotaxonomia》 CSCD 2018年第4期257-266,共10页
The genus Gaeolaelaps Evans & Till from China,including 20 species,is reviewed and an identification key to the Chinese species is provided.G.gillespiei Beaulieu,2009 is reported from China for the first time,with... The genus Gaeolaelaps Evans & Till from China,including 20 species,is reviewed and an identification key to the Chinese species is provided.G.gillespiei Beaulieu,2009 is reported from China for the first time,with redescription and illustrations.Three new mammal hosts are reported (Anourosorex squamipes,Eothenomys miletus and Rattus steni). 展开更多
关键词 MESOSTIGMATA Hypoaspidinae CHECKLIST key new host
下载PDF
Threshold Ring Signature Scheme Based on TPM
7
作者 Gong Bei Jiang Wei +2 位作者 Lin Li Li Yu Zhang Xing 《China Communications》 SCIE CSCD 2012年第1期80-85,共6页
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature schen. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate. 展开更多
关键词 ring signature TPM THRESHOLD Chinese remainder theorem RANK
下载PDF
古希腊悲剧的当代重述
8
作者 陈戎女 周琳玥 《上海文化》 CSSCI 2021年第12期27-36,共10页
古希腊文学经典母题--阿特柔斯家族的世族仇杀故事,曾见诸荷马和三大悲剧家的七部悲剧的改编和重述。两千年后的西方现当代文学仍在持续重述,人物依旧,主题改弦更张。当代爱尔兰作家科尔姆·托宾的《名门》用小说重述了阿伽门农家... 古希腊文学经典母题--阿特柔斯家族的世族仇杀故事,曾见诸荷马和三大悲剧家的七部悲剧的改编和重述。两千年后的西方现当代文学仍在持续重述,人物依旧,主题改弦更张。当代爱尔兰作家科尔姆·托宾的《名门》用小说重述了阿伽门农家族的血亲仇杀和宫廷叛乱的悲剧,在远古与现代的碰撞中显现出对传统既继承又颠覆的特性。其中,对神祇的态度转变、对人物性格和内心的多维度补充塑造,以及对当下爱尔兰社会的隐含指涉,是小说最独异的亮点所在,但当代作家的重述与改写也折射出托古喻今的碎片化倾向与边缘人的无力感。 展开更多
关键词 古希腊悲剧 当代重述 科尔姆·托宾 《名门》
原文传递
穿越—重生小说中的现代价值——以希行小说为例 被引量:3
9
作者 薛静 《中国现代文学研究丛刊》 CSSCI 北大核心 2016年第8期62-67,共6页
在"现代性"已被本质化、进而被搁置的今天,网络文学作家希行,通过一系列穿越—重生小说,带领读者重新回到前现代的背景中,观察现代价值体系是如何从每一个体的生命经验中生长出来的。希行并不是为现实寻找合法性、为历史证明... 在"现代性"已被本质化、进而被搁置的今天,网络文学作家希行,通过一系列穿越—重生小说,带领读者重新回到前现代的背景中,观察现代价值体系是如何从每一个体的生命经验中生长出来的。希行并不是为现实寻找合法性、为历史证明必然性,而是回到现代价值的本源,提出知识精英的责任,发现今日对"现代"的异化并提出疗救的可能。她的作品在通俗过瘾的"爽"之外,重新唤起人们对现代性的敏感体察,也将重新探寻改变现实的可能。 展开更多
关键词 网络文学 希行 现代性《名门医女》 《诛砂》
原文传递
THRESHOLD PROXY RE-SIGNATURE 被引量:7
10
作者 Piyi YANG Zhenfu CAO Xiaolei DONG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第4期816-824,共9页
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to... The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach. 展开更多
关键词 Proxy re-signature ROBUST THRESHOLD unforgeable.
原文传递
The security analysis of a threshold proxy quantum signature scheme 被引量:5
11
作者 SHI JianHong ZHANG ShengLi CHANG ZhengGang 《Science China Chemistry》 SCIE EI CAS 2013年第3期519-523,共5页
In the YW threshold proxy quantum signature scheme proposed by Yang and Wen,it is found that the basic signature key is the same as the basic verification key,which means that the bitwise exclusive OR(XOR) of the t pr... In the YW threshold proxy quantum signature scheme proposed by Yang and Wen,it is found that the basic signature key is the same as the basic verification key,which means that the bitwise exclusive OR(XOR) of the t proxy signature keys is exactly the XOR of the t proxy verification keys.Therefore,the proxy signers can deny their signature and the specific verifiers can forge a legal signature.Furthermore,an attacker can obtain a legal threshold proxy signature for an arbitrary new message.These findings show that there are hidden security loopholes that should be carefully constructed in designing more efficent YW-scheme. 展开更多
关键词 quantum cryptography quantum signature threshold proxy signature secret sharing
原文传递
A Universal Composability Framework for Analysis of Proxy Threshold Signature
12
作者 洪璇 李详学 +1 位作者 龚征 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期107-111,共5页
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol compositio... The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol composition operation.In the paper,we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area.The proposed scheme is suitable for the mobile agents,which should migrate across different environment through network.Furthermore,we give the concrete analysis of the reduction to prove the security of the proposed scheme. 展开更多
关键词 proxy threshold signature universal composability RSA cryptosystem mobile agents
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部