期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
秦汉玺印姓名考析(续十) 被引量:1
1
作者 魏宜辉 《出土文献》 CSSCI 2022年第4期61-70,155,共11页
本文结合传世文献及秦汉简牍资料,对十例秦汉玺印中的双字名进行考察,探讨其人名取义,同时对其存在的同名异写现象进行了分析。
关键词 秦印 汉印 双字名
下载PDF
秦汉玺印姓名考析(续五) 被引量:2
2
作者 魏宜辉 《出土文献》 2020年第2期108-116,158,共10页
本文结合传世文献,对秦汉玺印中的十例双字名及复姓进行了考析,分析了这些名字的取义及复姓的来源,同时对这些姓名在玺印及文献中存在的同名异写现象进行了探讨。
关键词 秦印 汉印 双字名 复姓
下载PDF
Security of Application System 被引量:1
3
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME 被引量:2
4
作者 Ming Yang Wang Yumin 《Journal of Electronics(China)》 2008年第2期226-231,共6页
In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payme... In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payment,etc. Recently,Zheng,et al. presented an IDentity(ID) -based proxy blind sig-nature. In this paper,a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed,which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng,et al.'s scheme. The proposed scheme is more practical in the real world. 展开更多
关键词 Blind signature Proxy signature Bilinear pairing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部