In such an information age, multimedia teaching has changed into one of the most important educational ways in middle and primary schools. In contrast to traditional education, multimedia teaching owns numerous advant...In such an information age, multimedia teaching has changed into one of the most important educational ways in middle and primary schools. In contrast to traditional education, multimedia teaching owns numerous advantages. However, there are also a great number of shortcomings in it. In this paper, considering the current situation of education in middle and primary schools, the author carries out an analysis on the negative effects of multimedia teaching on education in middle and primary schools, and also proposes some personal suggestions, hopefully providing a reference for teaching personnel in middle and primary schools.展开更多
Language information output plays an important role in students' language acquisition process and is an important way to improve students' comprehensive language using ability and language level. Because college stu...Language information output plays an important role in students' language acquisition process and is an important way to improve students' comprehensive language using ability and language level. Because college students' English foundation is weak in our country at present stage, there are many problems in the process of language information output. In this case, we can increase the application of Intemet technology as a way to expand language output in English language teaching. This article is to explore college English teaching language information output ways in the Internent age.展开更多
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time ...In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.展开更多
Any linear code can be used to construct a linear secret sharing scheme.In this paper,it is shown how to decide optimal linear codes(i.e.,with the biggest information rate)realizing a given access structure over finit...Any linear code can be used to construct a linear secret sharing scheme.In this paper,it is shown how to decide optimal linear codes(i.e.,with the biggest information rate)realizing a given access structure over finite fields.It amounts to solving a system of quadratic equations constructed from the given access structure and the corresponding adversary structure.The system becomes a linear system for binary codes.An algorithm is also given for finding the adversary structure for any given access structure.展开更多
文摘In such an information age, multimedia teaching has changed into one of the most important educational ways in middle and primary schools. In contrast to traditional education, multimedia teaching owns numerous advantages. However, there are also a great number of shortcomings in it. In this paper, considering the current situation of education in middle and primary schools, the author carries out an analysis on the negative effects of multimedia teaching on education in middle and primary schools, and also proposes some personal suggestions, hopefully providing a reference for teaching personnel in middle and primary schools.
文摘Language information output plays an important role in students' language acquisition process and is an important way to improve students' comprehensive language using ability and language level. Because college students' English foundation is weak in our country at present stage, there are many problems in the process of language information output. In this case, we can increase the application of Intemet technology as a way to expand language output in English language teaching. This article is to explore college English teaching language information output ways in the Internent age.
基金the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036,90704004)
文摘In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.
基金supported by the Foundation of National Natural Science of China under Grant No.11271003the National Science Foundation (USA) under Grant No.DMS-0302549+1 种基金Guangdong Provincial Natural Science Foundation(China)under Grant No.S2012010009950High Level Talents Project of Guangdong,and Scientific Research Project of Education Bureau in Guangzhou under Grant No.2012A004
文摘Any linear code can be used to construct a linear secret sharing scheme.In this paper,it is shown how to decide optimal linear codes(i.e.,with the biggest information rate)realizing a given access structure over finite fields.It amounts to solving a system of quadratic equations constructed from the given access structure and the corresponding adversary structure.The system becomes a linear system for binary codes.An algorithm is also given for finding the adversary structure for any given access structure.