Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d...Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed.展开更多
Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is ...Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is well known that routing is a challenging problem in VANETs due to the fast-changing network typology caused by high mobility at both ends of transmission. Moreover, under urban environment, there are two non-negligible factors in routing protocol design, the non-uniform vehicle distribution caused by traffic lights, and the network congestion due to high traffic demand in rush hours. In this paper, we propose a greedy traffic light and queue aware routing protocol(GTLQR) which jointly considers the street connectivity, channel quality, relative distance, and queuing delay to alleviate the packet loss caused by vehicle clustering at the intersection and balance the traffic load among vehicles. Through performance evaluation, we show that our proposed protocol outperforms both TLRC and GLSR-L in terms of packet delivery ratio and end-to-end delay.展开更多
Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate th...Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate the use of the technology into local or regional public safety and homeland security incidents. The purpose of this presentation is to explain several key factors to consider when using micro technologies and unmanned systems in support of public safety and homeland security officials. Real time information is critical to the decision making process for public safety and homeland security officials to make assessments and quickly resolve crisis situations. Unmanned micro-vehicles and micro technologies are well suited to remotely observe, gather essential information, and immediately relay it to incident responders. These technologies can provide extremely important support during responses to hostage situations, hazardous environments, search and rescue, natural disasters, border patrol and many others. The true benefit is having remote resources providing real time support to incident responders. This paper discusses the use of several different types of micro-vehicle platforms in public safety scenarios and their use of associated technologies such as GPS (Global Positioning System) autopilot, communication, and sensor devices.展开更多
The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on an...The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility.展开更多
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall...Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.展开更多
With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed co...With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed countries and a large quantity of observation data has been accumulated. How to apply these resources to economic construction and public safety has become an important issue worth studying. In order to improve earthquake prediction and earthquake emergency response, it is suggested in this paper that extracting valuable precursor information, improving earthquake rapid reporting ability and extending rapid intensity reporting function are key issues. Integrating network resources, building unified standards and a multifunction seismic monitoring network are preconditions of establishing a public safety service platform and earthquake observation resources will contribute significantly to the fields of engineering, ocean, meteorology, and environmental protection. Thus, the future directions of the development of the seismic network are exploring monitoring resources, enhancing independent innovation, constructing a technological platform and enlarging the service field.展开更多
Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planni...Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planning begins to perfect the contents and method. And regional research is an important aspect in the improvement of new era urban public safety planning. This paper chooses Tianjin, the important city in Bohai rim area as the example for research. Tianjin urban public safety planning includes not only comprehensive disaster prevention and reduction, effectively preventing and reducing disasters, ensuring the safety of the life and property of the residents, but also sharing resources and facilities from the view of megalopolis, eliminating hidden area troubles, reducing whole environment risks and so on.展开更多
Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of pub...Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges.展开更多
More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps...We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.展开更多
Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollutio...Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollution which is stable and infectious is the main part of water pollution. To fastly and accuratly detecte biological contamination of the water environment is extremely important for the control of disease outbreaks and water quality protection and public health security. This paper systematically introduces the research progress in biological water environment pollution detection methods in molecular biology aquatic environment, and explore molecular biology methods in the detection of biological contamination in water environment problems and trends.展开更多
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ...This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.展开更多
The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) is the first global policy framework of the United Nations’ post-2015 agenda. It represents a step in the direction of global policy coherence with e...The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) is the first global policy framework of the United Nations’ post-2015 agenda. It represents a step in the direction of global policy coherence with explicit reference to health, development, and climate change. To develop SFDRR, the United Nations Office for Disaster Risk Reduction(UNISDR) organized and facilitated several global, regional, national, and intergovernmental negotiations and technical meetings in the period preceding the World Conference on Disaster Risk Reduction(WCDRR) 2015 where SFDRR was adopted. UNISDR also worked with representatives of governments, UN agencies, and scientists to develop targets and indicators for SFDRR and proposed them to member states for negotiation and adoption as measures of progress and achievement in protecting lives and livelihoods. The multiple efforts of the health community in the policy development process, including campaigning for safe schools and hospitals, helped to put people’s mental and physicalhealth, resilience, and well-being higher up the disaster risk reduction(DRR) agenda compared with the Hyogo Framework for Action 2005–2015. This article reviews the historical and contemporary policy development process that led to the SFDRR with particular reference to the development of the health theme.展开更多
The 7th of April is always appointed to be ”World Health Day” by World Health O rganization (WHO), to celebrate the anniversary of its founding in 1946. World Health Day (WHD) 2004 focuses on road traffic injuries a...The 7th of April is always appointed to be ”World Health Day” by World Health O rganization (WHO), to celebrate the anniversary of its founding in 1946. World Health Day (WHD) 2004 focuses on road traffic injuries and measures to pre vent them, and the slogan for the WHD 2004 is ”Road Safety is No Accident”. 1 W HO calls all people to be concerned with road safety on WHD 2004 and beyond. In fact, almost everybody is related with road traffic, and everybody may be consid ered as a road user. Occurrence of road traffic injury (RTI) It is estimated that in 2002 road crashes killed 1.18 million people and inj ured about 20 to 50 million more. Millions were hospitalized for days, weeks or months. Perhaps 5 million were disabled for life. Every day as many as 140 000 people are injured because of road crashes. More than 3 000 die and about 15 000 are disabled for life. It is predicted that by the year 2020, the an nual number of deaths and disabilities from road traffic injuries will increase by 60% or more, and could take third place in the rank order of disease burden ( DALYs) by the year 2000 as compared with the ninth in 1990. 2展开更多
基金partially supported by he State Key Program of National Natural Science of China No. 61332019Major State Basic Research Development Program of China (973 Program) No. 2014CB340601+1 种基金the National Science Foundation of China No. 61202386, 61402339the National Cryptography Development Fund No. MMJJ201701304
文摘Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed.
基金supported by the Beijing University of Posts and Telecommunications project No.500418759the State Key Laboratory of Networking and Switching Technology project No.600118124
文摘Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is well known that routing is a challenging problem in VANETs due to the fast-changing network typology caused by high mobility at both ends of transmission. Moreover, under urban environment, there are two non-negligible factors in routing protocol design, the non-uniform vehicle distribution caused by traffic lights, and the network congestion due to high traffic demand in rush hours. In this paper, we propose a greedy traffic light and queue aware routing protocol(GTLQR) which jointly considers the street connectivity, channel quality, relative distance, and queuing delay to alleviate the packet loss caused by vehicle clustering at the intersection and balance the traffic load among vehicles. Through performance evaluation, we show that our proposed protocol outperforms both TLRC and GLSR-L in terms of packet delivery ratio and end-to-end delay.
文摘Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate the use of the technology into local or regional public safety and homeland security incidents. The purpose of this presentation is to explain several key factors to consider when using micro technologies and unmanned systems in support of public safety and homeland security officials. Real time information is critical to the decision making process for public safety and homeland security officials to make assessments and quickly resolve crisis situations. Unmanned micro-vehicles and micro technologies are well suited to remotely observe, gather essential information, and immediately relay it to incident responders. These technologies can provide extremely important support during responses to hostage situations, hazardous environments, search and rescue, natural disasters, border patrol and many others. The true benefit is having remote resources providing real time support to incident responders. This paper discusses the use of several different types of micro-vehicle platforms in public safety scenarios and their use of associated technologies such as GPS (Global Positioning System) autopilot, communication, and sensor devices.
基金supported by the national high technology research and development 863 program of China.(2008AA01Z103)
文摘The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility.
文摘Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.
基金This project was sponsored by the National Natural Science Foundation of China (50378086)
文摘With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed countries and a large quantity of observation data has been accumulated. How to apply these resources to economic construction and public safety has become an important issue worth studying. In order to improve earthquake prediction and earthquake emergency response, it is suggested in this paper that extracting valuable precursor information, improving earthquake rapid reporting ability and extending rapid intensity reporting function are key issues. Integrating network resources, building unified standards and a multifunction seismic monitoring network are preconditions of establishing a public safety service platform and earthquake observation resources will contribute significantly to the fields of engineering, ocean, meteorology, and environmental protection. Thus, the future directions of the development of the seismic network are exploring monitoring resources, enhancing independent innovation, constructing a technological platform and enlarging the service field.
文摘Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planning begins to perfect the contents and method. And regional research is an important aspect in the improvement of new era urban public safety planning. This paper chooses Tianjin, the important city in Bohai rim area as the example for research. Tianjin urban public safety planning includes not only comprehensive disaster prevention and reduction, effectively preventing and reducing disasters, ensuring the safety of the life and property of the residents, but also sharing resources and facilities from the view of megalopolis, eliminating hidden area troubles, reducing whole environment risks and so on.
文摘Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges.
文摘More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
基金Supported by National Natural Science Foundation of China under Grant No.10374025the Education Ministry of Hunan Province under Grant No.06A038the Natural Science Foundation of Hunan Province under Grant No.07JJ3013
文摘We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.
文摘Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollution which is stable and infectious is the main part of water pollution. To fastly and accuratly detecte biological contamination of the water environment is extremely important for the control of disease outbreaks and water quality protection and public health security. This paper systematically introduces the research progress in biological water environment pollution detection methods in molecular biology aquatic environment, and explore molecular biology methods in the detection of biological contamination in water environment problems and trends.
文摘This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.
文摘The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) is the first global policy framework of the United Nations’ post-2015 agenda. It represents a step in the direction of global policy coherence with explicit reference to health, development, and climate change. To develop SFDRR, the United Nations Office for Disaster Risk Reduction(UNISDR) organized and facilitated several global, regional, national, and intergovernmental negotiations and technical meetings in the period preceding the World Conference on Disaster Risk Reduction(WCDRR) 2015 where SFDRR was adopted. UNISDR also worked with representatives of governments, UN agencies, and scientists to develop targets and indicators for SFDRR and proposed them to member states for negotiation and adoption as measures of progress and achievement in protecting lives and livelihoods. The multiple efforts of the health community in the policy development process, including campaigning for safe schools and hospitals, helped to put people’s mental and physicalhealth, resilience, and well-being higher up the disaster risk reduction(DRR) agenda compared with the Hyogo Framework for Action 2005–2015. This article reviews the historical and contemporary policy development process that led to the SFDRR with particular reference to the development of the health theme.
文摘The 7th of April is always appointed to be ”World Health Day” by World Health O rganization (WHO), to celebrate the anniversary of its founding in 1946. World Health Day (WHD) 2004 focuses on road traffic injuries and measures to pre vent them, and the slogan for the WHD 2004 is ”Road Safety is No Accident”. 1 W HO calls all people to be concerned with road safety on WHD 2004 and beyond. In fact, almost everybody is related with road traffic, and everybody may be consid ered as a road user. Occurrence of road traffic injury (RTI) It is estimated that in 2002 road crashes killed 1.18 million people and inj ured about 20 to 50 million more. Millions were hospitalized for days, weeks or months. Perhaps 5 million were disabled for life. Every day as many as 140 000 people are injured because of road crashes. More than 3 000 die and about 15 000 are disabled for life. It is predicted that by the year 2020, the an nual number of deaths and disabilities from road traffic injuries will increase by 60% or more, and could take third place in the rank order of disease burden ( DALYs) by the year 2000 as compared with the ninth in 1990. 2