According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. Fir...According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.展开更多
Six new chrysophycean stomatocysts ornamented with reticulum were illustrated based on SEM observation. They were described following the guidelines of the International Statospore Working Group (ISWG). All samples we...Six new chrysophycean stomatocysts ornamented with reticulum were illustrated based on SEM observation. They were described following the guidelines of the International Statospore Working Group (ISWG). All samples were collected from the Great Xing'an Mountains, China. Their taxonomic characteristics and habitats were described to provide new information on the biodiversity of chrysophycean stomatocysts. As is common with many morphotypes, their biological affinities remain unknown.展开更多
The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which in...The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security.展开更多
An earthquake measuring 5.1 on the Richter scale struck Wen'an county,Hebei Province on July 4,2006. No casualties have been reported,with only slight damage. The disaster level of this event is the slightest on t...An earthquake measuring 5.1 on the Richter scale struck Wen'an county,Hebei Province on July 4,2006. No casualties have been reported,with only slight damage. The disaster level of this event is the slightest on the M4.9~5.1 events record tally since the CCDSN (China Center of Digital Seismic Network) was built in 1999. The epicenter intensity of this earthquake was low,while in areas like Beijing,which is 100km far away,abnormal high intensity zones appeared. This article discusses the reasons behind this abnormal phenomenon,with the diagrams of intensity isolines drawn by the intense seismic stations and networks in the capital circle area as references,as well as the seismogenic mechanism in the source,the seismic histories,the geological structures and the ray pathways of seismic waves in areas within 150km around the epicenter. It was concluded that the special dynamic and geological situations were the main causes for the lower intensity degree and slight damage in the epicenter area,but higher intensity in the surrounding areas.展开更多
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.
基金Supported by the National Natural Science Foundation of China (Nos.31070181, 30870162)the Leading Academic Discipline Project of Shanghai Municipal Education Commission (No. J50401)
文摘Six new chrysophycean stomatocysts ornamented with reticulum were illustrated based on SEM observation. They were described following the guidelines of the International Statospore Working Group (ISWG). All samples were collected from the Great Xing'an Mountains, China. Their taxonomic characteristics and habitats were described to provide new information on the biodiversity of chrysophycean stomatocysts. As is common with many morphotypes, their biological affinities remain unknown.
文摘The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security.
基金funded by the project "Demonstration of typical changes of vulne rability of disasters in urban-rural fringe:a case study of seismic disaster in the Beijing-Tianjin-Tangshan region" of National Natural Science Foundation (Grant No.40771011)
文摘An earthquake measuring 5.1 on the Richter scale struck Wen'an county,Hebei Province on July 4,2006. No casualties have been reported,with only slight damage. The disaster level of this event is the slightest on the M4.9~5.1 events record tally since the CCDSN (China Center of Digital Seismic Network) was built in 1999. The epicenter intensity of this earthquake was low,while in areas like Beijing,which is 100km far away,abnormal high intensity zones appeared. This article discusses the reasons behind this abnormal phenomenon,with the diagrams of intensity isolines drawn by the intense seismic stations and networks in the capital circle area as references,as well as the seismogenic mechanism in the source,the seismic histories,the geological structures and the ray pathways of seismic waves in areas within 150km around the epicenter. It was concluded that the special dynamic and geological situations were the main causes for the lower intensity degree and slight damage in the epicenter area,but higher intensity in the surrounding areas.