期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
涉警网络舆情中公安机关公信力建设探究 被引量:3
1
作者 邹秋仁 刘须群 《广西警官高等专科学校学报》 2014年第6期1-4,共4页
网络媒体的崛起构建着涉警网络舆情生态。正面、负面或中性类型的舆情都与公安机关公信力相关联。当前公安机关公信力危机的主要症结在于自身建设不过硬和涉警网络舆情引导培育不到位两个方面。公安机关必须采取"软""硬&... 网络媒体的崛起构建着涉警网络舆情生态。正面、负面或中性类型的舆情都与公安机关公信力相关联。当前公安机关公信力危机的主要症结在于自身建设不过硬和涉警网络舆情引导培育不到位两个方面。公安机关必须采取"软""硬"兼施策略:既练好网下硬功夫,取信于民,又增强网上软实力,授信于众,稳步创建和提升涉警网络舆情中的公安机关公信力。 展开更多
关键词 涉警网络舆情 公安机关公 引导培育
下载PDF
深圳市公安短信平台的建设与应用
2
作者 赖培勤 《警察技术》 2006年第4期36-38,共3页
本文阐述了公安短信平台建设的背景、原理、特点、发挥的作用及下一步发展规划。
关键词 移动通 公安 公安平台 科技强警
下载PDF
基层社会矛盾纠纷的防范化解——以重庆市长寿区为例
3
作者 蒋成会 徐建锋 《重庆行政(公共论坛)》 2015年第5期61-62,共2页
化解社会矛盾是一项长期性、基础性的工作,事关党的执政根基、国家的长治久安、人民群众的切身利益,是公安机关义不容辞的固有职责。如何把矛盾纠纷在基层,化解在萌芽状态,保证社会持续稳定,是当前一项极其重要的工作,也是落实依法治区... 化解社会矛盾是一项长期性、基础性的工作,事关党的执政根基、国家的长治久安、人民群众的切身利益,是公安机关义不容辞的固有职责。如何把矛盾纠纷在基层,化解在萌芽状态,保证社会持续稳定,是当前一项极其重要的工作,也是落实依法治区、维护群众切身利益的实际性工作。一、社会矛盾纠纷的特征及诱因分析当前,长寿区社会总体保持稳定,但是影响社会和谐的因素仍然大量存在。2011年至2014年。 展开更多
关键词 社会矛盾纠纷 长寿区 防范化解 诱因分析 执政根基 群体性事件 实际性 调解委员会 息分析 公安信
下载PDF
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS 被引量:1
4
作者 陈原 陈丹 董庆宽 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期301-305,共5页
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ... Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one. 展开更多
关键词 information security public-key encryption chosen ciphertext security Tag-KEM scheme
下载PDF
涉警网络舆情处置与公安机关公信力提升的实证研究 被引量:2
5
作者 徐梓童 《网络安全技术与应用》 2022年第7期152-154,共3页
随着互联网技术的快速发展,一些社会热点问题往往会在传播中迅速发酵,涉警舆情也是其中的一部分。近年来,由于少数民警自身执法规范程度不足、服务意识不强等原因,再加上一些媒体的恶意炒作与丑化,导致公安机关公信力下降。本文通过实... 随着互联网技术的快速发展,一些社会热点问题往往会在传播中迅速发酵,涉警舆情也是其中的一部分。近年来,由于少数民警自身执法规范程度不足、服务意识不强等原因,再加上一些媒体的恶意炒作与丑化,导致公安机关公信力下降。本文通过实证分析的方式分析了涉警网络舆情处置与公安机关公信力的关系,并提出建立信息发布机制和跟踪报道机制、民警规范化执法的同时应兼具服务意识、加强对大学生的思想意识教育等对策,以期达到提升公安机关公信力的效果。 展开更多
关键词 涉警网络舆情 公安机关公 舆情处置
原文传递
Restricted common data in anonymous E-cash system 被引量:1
6
作者 张向军 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期595-600,共6页
Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficien... Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems. 展开更多
关键词 blind signatures ANONYMITY E-cash system restricted common data
下载PDF
ASIP for Elliptic Curve Cryptography Based on VLIW Architecture 被引量:1
7
作者 YANG Xiaohui DAI Zibin ZHANG Jun ZHANG Yongfu 《China Communications》 SCIE CSCD 2010年第4期161-166,共6页
The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on an... The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility. 展开更多
关键词 Elliptic Curve Cryptography Application Specific Instruction-Set Processor VLIW Architecture
下载PDF
Authenticated Key Agreement Protocol
8
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
下载PDF
Combining Micro Technologies and Unmanned Systems to Support Public Safety and Homeland Security 被引量:1
9
作者 Richard E. Baker 《Journal of Civil Engineering and Architecture》 2012年第10期1399-1404,共6页
Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate th... Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate the use of the technology into local or regional public safety and homeland security incidents. The purpose of this presentation is to explain several key factors to consider when using micro technologies and unmanned systems in support of public safety and homeland security officials. Real time information is critical to the decision making process for public safety and homeland security officials to make assessments and quickly resolve crisis situations. Unmanned micro-vehicles and micro technologies are well suited to remotely observe, gather essential information, and immediately relay it to incident responders. These technologies can provide extremely important support during responses to hostage situations, hazardous environments, search and rescue, natural disasters, border patrol and many others. The true benefit is having remote resources providing real time support to incident responders. This paper discusses the use of several different types of micro-vehicle platforms in public safety scenarios and their use of associated technologies such as GPS (Global Positioning System) autopilot, communication, and sensor devices. 展开更多
关键词 Public safety first responders unmanned systems improved incident response
下载PDF
CONTROL OF VEHICLE PLATOONS FOR HIGHWAY SAFETY AND EFFICIENT UTILITY:CONSENSUS WITH COMMUNICATIONS AND VEHICLE DYNAMICS 被引量:6
10
作者 WANG Le Yi SYED Ali +2 位作者 YIN Gang George PANDYA Abhilash ZHANG Hongwei 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2014年第4期605-631,共27页
Platoon formation of highway vehicles is a critical foundation for autonomous or semiautonomous vehicle control for enhanced safety,improved highway utility,increased fuel economy,and reduced emission toward intellige... Platoon formation of highway vehicles is a critical foundation for autonomous or semiautonomous vehicle control for enhanced safety,improved highway utility,increased fuel economy,and reduced emission toward intelligent transportation systems.Platoon control encounters great challenges from vehicle control,communications,team coordination,and uncertainties.This paper introduces a new method for coordinated control of platoons by using integrated network consensus decisions and vehicle control.To achieve suitable coordination of the team vehicles based on terrain and environmental conditions,the emerging technology of network consensus control is modified to a weighted and constrained consensus-seeking framework.Algorithms are introduced and their convergence properties are established.The methodology employs neighborhood information through on-board sensors and V2 V or V2 I communications,but achieves global coordination of the entire platoon.The ability of the methods in terms of robustness,disturbance rejection,noise attenuation,and cyber-physical interaction is analyzed and demonstrated with simulated case studies. 展开更多
关键词 Collision avoidance COMMUNICATIONS consensus control networked systems platoon con-trol SAFETY vehicle dynamics.
原文传递
Public-key encryption and authentication of quantum information 被引量:7
11
作者 LIANG Min YANG Li 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第9期1618-1629,共12页
Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and t... Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and then construct an informationtheoretic secure instance.Then,we propose a quantum public-key authentication scheme,which can protect the integrity of quantum messages.This scheme can both encrypt and authenticate quantum messages.It is information-theoretic secure with regard to encryption,and the success probability of tampering decreases exponentially with the security parameter with regard to authentication.Compared with classical public-key cryptosystems,one private-key in our schemes corresponds to an exponential number of public-keys,and every quantum public-key used by the sender is an unknown quantum state to the sender. 展开更多
关键词 quantum cryptography AUTHENTICATION quantum public-key private quantum channel
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部