期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
幼犬全结肠秘结的手术治疗
1
作者 马常熙 《吉林畜牧兽医》 2002年第6期33-33,共1页
幼犬全结肠秘结的病例并不多见,临床经诊一例自上行结肠、横结肠、下行结肠至直肠全部阻塞,经及时采取肠管分段切开的方法得以治愈.现报告如下.
关键词 幼犬 结肠 手术治疗 症状
下载PDF
中医药治疗老年Ⅱ型糖尿病性便秘60例 被引量:3
2
作者 黄永俨 《辽宁中医杂志》 CAS 2002年第1期28-28,共1页
关键词 Ⅱ型糖尿病 并发症 全秘 中医药治疗 老年人
下载PDF
排座次
3
作者 诤言 《秘书》 1995年第10期10-10,共1页
县妇联的仇秘书完成了“庆三八,迎四大”会议的最后一份材料后,感到全身轻松,便拿起桌上的《莫愁》杂志看起来。 “小仇!”妇联的严主任在门口说,“将明天大会主席台上四套班子领导的座次排一下。” “是,十分钟后完成任务。”小仇若... 县妇联的仇秘书完成了“庆三八,迎四大”会议的最后一份材料后,感到全身轻松,便拿起桌上的《莫愁》杂志看起来。 “小仇!”妇联的严主任在门口说,“将明天大会主席台上四套班子领导的座次排一下。” “是,十分钟后完成任务。”小仇若无其事地说。 “嘿,小仇,可不要小看排座次这份活儿。去年,全秘书还权衡了半天啦。这座次非同小可。 展开更多
关键词 座次 主任 全秘 完成任务 县政协 主席台 县政府 副县长 组织部 妇联
下载PDF
MAVP-FE:Multi-Authority Vector Policy Functional Encryption with Efficient Encryption and Decryption 被引量:1
4
作者 WANG Jing HUANG Chuanhe +3 位作者 YANG Kan WANG Jinhai WANG Xiaomao CHEN Xi 《China Communications》 SCIE CSCD 2015年第6期126-140,共15页
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte... In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice. 展开更多
关键词 cloud storage data access control functional encryption hidden access policy efficiency
下载PDF
Projections of the impacts of climate change on the water deficit and on the precipitation erosive indexes in Mantaro River Basin, Peru 被引量:1
5
作者 Sly C.WONGCHUIG Carlos R.MELLO Sin C.CHOU 《Journal of Mountain Science》 SCIE CSCD 2018年第2期264-279,共16页
Projections of climate change are essential to guide sustainable development plans in the tropical Andean countries such as Peru. This study assessed the projections of precipitation and potential evaporation, rain er... Projections of climate change are essential to guide sustainable development plans in the tropical Andean countries such as Peru. This study assessed the projections of precipitation and potential evaporation, rain erosive potential, and precipitation concentration in the Mantaro River Basin, in the Peruvian Andes, which is important for agriculture and energy production in Peru. We assumed the Intergovernmental Panel on Climate Change (IPCC) AIB greenhouse gas emission scenario and simulated the global climate change by the HadCM3 global climate model. Due to the steepness of the mountain slopes and the narrowness of the river valley, this study uses the downscaling of the global model simulations by the regional Eta model down to 2o-km resolution. The downscaling projections show decrease in the monthly precipitation with respect to the baseline period, especially during the rainy season, between February and April, until the end of the 21st century. Meanwhile, a progressive increase in the monthly evaporation from the baseline period is projected. The Modified Fournier Index (MFI) shows a statistically significant downward trend in the Mantaro River Basin, whieh suggests a possible reduction in the rain erosive potential. The Precipitation Concentration Index (PCI) shows a statistically significant increasing trend, which indicates increasingly more irregular temporal distribution of precipitation towards the end of the century. The results of this study allow us to conclude that there should be a gradual increase in water deficit and precipitation concentration. Both changes can be negative for agriculture, power generation, and water supply in the Mantaro River Basin in Peru. 展开更多
关键词 PRECIPITATION EVAPORATION PrecipitationConcentration Index (PCI) Modified Fournier Index(MFI) Climate change Tropical Andes
下载PDF
Quantum Secure Direct Communication Using Six-Particle Maximally Entangled States and Teleportation 被引量:2
6
作者 XIU Xiao-Ming DONG Li GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第3期429-432,共4页
The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the re... The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the receiver. The receiver performs the unitary transformations and makes projective measurements on his particles to obtain the secret information. Using teleportation, the transmission of three-qubit secret information can be completed in each quantum channel 展开更多
关键词 quantum secret direct communication quantum teleportation six-particle maximally entangled state
下载PDF
A New Approach to Provide Global Certificate Service in Virtual Enterprise
7
作者 李彪 Zhang Shensheng 《High Technology Letters》 EI CAS 2003年第1期82-86,共5页
Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the... Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the new trend in enterprise cooperation, namely virtual enterprise (VE). In this paper a new idea - virtual certificate authority (VCA), is proposed, as well as its implemen-tation. The goal of VCA is to provide global certificate service over vital enterprise while keeping CA of each participant intact as much as possible. Unlike PEM, PGP, and BCA, by using secret sharing scheme, virtual CA avoids the need for TTP and supports virtual enterprise's feature of dynamical construction and destruction. 展开更多
关键词 global certificate service virtual enterprise virtual certificate authority
下载PDF
Quantum Dialogue Protocol Using a Class of Three-Photon W States 被引量:5
8
作者 DONG Li XIU Xiao-Ming GAO Ya-Jun CHI Feng 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第11期853-856,共4页
A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmitti... A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmittingof single photon with the aid of two-bit classical information. 展开更多
关键词 quantum communication quantum dialogue W state
下载PDF
Privacy-preserving Distributed Location Proof Generating System 被引量:3
9
作者 LIU Mengjun LIU Shubo +3 位作者 ZHANG Rui Li Yongkai WANG Jun CAO Hui 《China Communications》 SCIE CSCD 2016年第3期203-218,共16页
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr... The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results. 展开更多
关键词 computer software and theory location proof secret-sharing location privacy
下载PDF
Reexamining Security of Improved Multiparty Quantum Secret Splitting and Quantum State Sharing
10
作者 林崧 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第6期1059-1061,共3页
In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (... In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (2006) 190.] was presented. We study the security of the improved protocol and find that two or more dishonest participants may recover the secret from the dealer. Hence we further modify the improved protocol, which make it stand against this kind of attack. 展开更多
关键词 quantum secret sharing entanglement swapping
下载PDF
Set (k, n)-Exactly covering problem
11
作者 吴振寰 Gao +2 位作者 Ying Wu Zhehui 《High Technology Letters》 EI CAS 2010年第4期433-436,共4页
With the ( k, n )-threshold scheme of secret sharing in the field of information security technology as an application background, the concept of set ( k, n )-exact cover is presented in this paper. It is a modifi... With the ( k, n )-threshold scheme of secret sharing in the field of information security technology as an application background, the concept of set ( k, n )-exact cover is presented in this paper. It is a modification of the original concept of set covering problem. It is also different from the concept of exact cover defined by J.E. Hopcmft. Some properties of (k, n ) -exact cover are investigated; a sufficient condition for a set to be ( k, n ) -exactly coverable is given. It follows that a feasible assignment scheme of a set for the ( k, n) -exact eover is obtained if this set satisfies the sufficient condition. 展开更多
关键词 SET k n) -exact cover exactly covering match feasible assignment
下载PDF
A New Method to Construct Secret Sharing Schemes Based on Linear Codes
12
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期89-94,共6页
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin... Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme. 展开更多
关键词 Linear code parity-check matrix secret sharing scheme minimal codeword minimal access set.
下载PDF
透明的袁立
13
作者 李彦 《大众电影》 2001年第1期13-13,共1页
R 如果用一个字描述袁立,那就是“爽”。我自报家门以后,她在电话的那一端干脆利落地说:“那好,就明天吧。”三两分钟内我们就约好了时间和地点。快得有些不像女孩子做事情,爽得一点儿都不拖泥带水。
关键词 “爽” 全秘 字描述 白书 进厅 手本 时间和地点 女孩子 导演 事情
原文传递
Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication 被引量:1
14
作者 赖红 Orgun A.Mehmet +2 位作者 肖井华 Pieprzyk Josef 薛理银 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第4期459-465,共7页
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised... In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. 展开更多
关键词 (2 3) threshold quantum state sharing RECURRENCE distributed fountain codes EFFICIENCY Trojan horse attacks
原文传递
Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
15
作者 黄征 龚征 李强 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期112-116,共5页
This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works ... This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network. 展开更多
关键词 secret share secure multi-party computation asynchronous network
原文传递
A novel and efficient multiparty quantum secret sharing scheme using entangled states 被引量:4
16
作者 MASSOUD Hadian Dehkordi ELHAM Fattahi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第10期1828-1831,共4页
We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our ... We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes. 展开更多
关键词 quantum secret sharing entangled state MULTIPARTY quantum cryptography
原文传递
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
17
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部