期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A Note on a Misuirewicz's Theorem
1
作者 周作领 《Chinese Quarterly Journal of Mathematics》 CSCD 1992年第2期12-15,共4页
In this paper,we improve a Misuirewicz's theorem and give a new proof of small conjecture on topological entropy.
关键词 continuous self-map measure-preserving system topological entropy invariant measure
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:23
2
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ... Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 provable secure certificateless public key encryption keyword search
下载PDF
TWO BIAS CORRECTION SCHEMES FOR ATOVS RADIANCE DATA 被引量:1
3
作者 崔丽梅 孙建华 齐琳琳 《Journal of Tropical Meteorology》 SCIE 2010年第1期71-76,共6页
To better assimilate Advanced TIROS Operational Vertical Sounder(ATOVS) radiance data and provide more accurate initial fields for a numerical model,two bias correction schemes are employed to correct the ATOVS radian... To better assimilate Advanced TIROS Operational Vertical Sounder(ATOVS) radiance data and provide more accurate initial fields for a numerical model,two bias correction schemes are employed to correct the ATOVS radiance data.The difference in the two schemes lies in the predictors use in air-mass bias correction.The predictors used in SCHEME 1 are all obtained from model first-guess,while those in SCHEME 2 are from model first-guess and radiance observations.The results from the two schemes show that after bias correction,the observation residual became smaller and closer to a Gaussian distribution.For both land and ocean data sets,the results obtained from SCHEME 1 are similar to those from SCHEME 2,which indicates that the predictors could be used in bias correction of ATOVS data. 展开更多
关键词 ATOVS radiance data bias correction schemes model first-guess
下载PDF
Security Analysis and Improvement of Authentication Scheme Based on a One-way Hash Function and Diffie-Hellman Key Exchange Using Smart Card 被引量:1
4
作者 Kang-seok CHAE Dai-hoon KIM +1 位作者 Jae-duck CHOI Souh-wan JUNG 《Journal of Measurement Science and Instrumentation》 CAS 2010年第4期360-363,共4页
A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing a... A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed. 展开更多
关键词 AUTHENTICATION guessing attack DIFFIE-HELLMAN smart card
下载PDF
On the Four Conjectures of G G Lorentz Type in L_ρ~2[-a,a]
5
作者 王元恒 杨文善 《Chinese Quarterly Journal of Mathematics》 CSCD 2009年第3期343-348,共6页
In the space C[-1,1],G G Lorentz proposed four conjectures on the properties of the polynomials of the best approximation in 1977,1978 and 1980.The present paper transplants the four conjectures in the space Lρ2[-a,a... In the space C[-1,1],G G Lorentz proposed four conjectures on the properties of the polynomials of the best approximation in 1977,1978 and 1980.The present paper transplants the four conjectures in the space Lρ2[-a,a] and proves them being all right in only one theorem under the corresponding conditions,although each of the original conjectures is very difficulty. 展开更多
关键词 best approximation Lorentz's conjecture different norms property of polynomial
下载PDF
猜测
6
作者 陈则尧 《初中生之友(青春号)(中)》 2010年第11期52-53,共2页
周经纬是我们班很有才的一个同学,综合他各方面的表现,我对他未来的职业做了几种猜测。
关键词 中学 作文 语文教学 《猜测》
原文传递
A RECONSIDERATION OF GUESSING STRATEGY IN THE FRAMEWORK OF COGNITIVE LINGUISTICS 被引量:4
7
作者 曲春红 《Chinese Journal of Applied Linguistics》 2005年第6期25-30,127,共7页
Guessing strategy is a traditional and effective way for EFL students to improve their reading. Almost all readers apply this method, to a greater or lesser extent, when reading different kinds of materials. This is p... Guessing strategy is a traditional and effective way for EFL students to improve their reading. Almost all readers apply this method, to a greater or lesser extent, when reading different kinds of materials. This is partly because readers simply do not have the time to look up every new word in the dictionary. Linguistics developments in recent years make it possible to reconsider this kind of strategy in the framework of cognitive grammar. A number of theories have provided more evidence regarding the effectiveness of a guessing strategy. Linguistic theories dealing with terms such as schemata, prototype, etc. make it possible to reconsider the strategy in a broader context. Schemata theory tells us that the context of a given word is not the only source and basis of guessing. Other factors include background knowledge and the given word itself. Prototype theory, on the other hand, shows how readers guess the meaning of a familiar word form with a completely new part of speech or meaning. Even though cognitive linguistics has shown the effectiveness of a guessing strategy in reading, the applicability of the method needs to be reconsidered. Some materials may not be suitable for the application of a guessing strategy. 展开更多
关键词 guessing strategy CONTEXT culture model prototypical meaning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部