期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
“無名子”與唐代科舉
1
作者 郭桂坤 《中华文史论丛》 CSSCI 2013年第3期195-211,400-401,共17页
中晚唐以前"無名子"一詞在史料中的一般意義即爲"無名氏",泛指不知姓名爲何的人。中唐以降科舉制度開始深刻影響時人生活狀態乃至滲透於其話語形式,"無名子"逐漸被賦予了兩點特殊用義:其一,它所使用的語... 中晚唐以前"無名子"一詞在史料中的一般意義即爲"無名氏",泛指不知姓名爲何的人。中唐以降科舉制度開始深刻影響時人生活狀態乃至滲透於其話語形式,"無名子"逐漸被賦予了兩點特殊用義:其一,它所使用的語境應該與科舉考試密切相關;其二,所指稱者必定是針對科舉考試進行匿名造謗的人。隨着時代的變遷和生活場景的轉換,後人對其含義的理解開始變得模糊起來。通過排比史料可以發現,它在中晚唐一般語境中所特具的科舉内涵,自宋代開始又逐漸從人們日常生活的話語中消失。 展开更多
关键词 唐代 科举 名子
下载PDF
论中国宋代的“诡名子户”现象及其法律应对——兼论我国目前的“一人多户口”现象
2
作者 谢舒晔 《辽宁行政学院学报》 2014年第7期94-98,共5页
宋代存在着较为严重的"诡名子户"现象,即一些民户将产业和人丁化整为零,诡立好几个或虚或实的户头,借以逃避税役。这一现象在唐代初成雏形,在宋代成泛滥之势并严重影响了国家财政收入以及导致了社会矛盾的激化。宋朝政府为此... 宋代存在着较为严重的"诡名子户"现象,即一些民户将产业和人丁化整为零,诡立好几个或虚或实的户头,借以逃避税役。这一现象在唐代初成雏形,在宋代成泛滥之势并严重影响了国家财政收入以及导致了社会矛盾的激化。宋朝政府为此在不同时期针对不同表现方式,颁布不同法令以期减少这一现象发生的恶劣程度。该文主要揭示宋代的这一现象及其朝廷的法律应对;同时以此引发对目前我国"一人多户口"现象如何扼制提供一点历史启示。 展开更多
关键词 名子 逃避税役 一人多户口
下载PDF
“无名子”快餐:兴衰岂无凭
3
作者 黄迪祺 《工厂管理》 2003年第10期50-52,共3页
过去的几年间,厦门的繁华地 段陆续出现了一些引人注目 的以“清粥小菜”为诉求点的“蓝与白”、“龙门客栈”等中式快餐连锁店,“无名子”是其中的一个典型。 1998年,台湾的家族企业“可利亚”火锅店来到厦门,在厦门创办了第一家“无... 过去的几年间,厦门的繁华地 段陆续出现了一些引人注目 的以“清粥小菜”为诉求点的“蓝与白”、“龙门客栈”等中式快餐连锁店,“无名子”是其中的一个典型。 1998年,台湾的家族企业“可利亚”火锅店来到厦门,在厦门创办了第一家“无名子”中式快餐店。 展开更多
关键词 “无名子”快餐 营业模式 餐厅布局 经营管理 营销定位 产品质量 店堂服务
下载PDF
论日野名子对禅思想的接受 被引量:1
4
作者 邱春泉 《日语学习与研究》 CSSCI 2017年第4期73-82,共10页
本文以镰仓时代的女性日记《竹向日记》为对象,讨论了日记作者日野名子的佛教信仰。主要分析了日野名子皈依禅宗的原因,她对禅宗教义的理解,以及名子禅修行的本质。在把握名子对禅宗思想的接受方式的基础上,探讨了古代日本贵族佛教信仰... 本文以镰仓时代的女性日记《竹向日记》为对象,讨论了日记作者日野名子的佛教信仰。主要分析了日野名子皈依禅宗的原因,她对禅宗教义的理解,以及名子禅修行的本质。在把握名子对禅宗思想的接受方式的基础上,探讨了古代日本贵族佛教信仰的共同特征,以及佛教信仰对作品创作的影响。 展开更多
关键词 女性日记 佛教信仰 禅宗 日野名子
原文传递
蓝&白——风雨历程、千锤百炼
5
作者 崔炳男 《管理工程师》 2004年第B02期28-29,共2页
一含辛茹苦,事业起步——无名子诞生时仅是一个“路边摊”;照搬模式,初尝苦果——巴比龙餐馆的夭折。
关键词 巴比龙餐馆 “无名子”连锁分店 名子海鲜餐厅超市 创业
下载PDF
Phylogenetic Relationships among 12 Species of Tetrigidae (Orthoptera:Tetrigoidea) Based on Partial Sequences of 12S and 16S Ribosomal RNA 被引量:11
6
作者 陈爱辉 蒋国芳 《Zoological Research》 CAS CSCD 北大核心 2004年第6期510-514,共5页
Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representin... Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representing 6 genera of family Tetrigidae.The collated sequences were aligned using Clustal X version 1.81 and then,the sequence variability and heredity distances based on Kimura 2-parameter model were calculated using Mega 2.1.In obtained sequences (736 bp),the average A+T content is 73.9%,ranging from 71.2% to 77.5%;the overall G+C content is 26.1%,ranging from 22.5% to 28.8%.Based on alignment of the combined sequences,185 parsimony-informative sites were revealed in 755 available base pairs.Phylogenetic trees were reconstructed using NJ,MP and ML methods with Cylindraustralia kochii as outgroup.The results indicated that the monophyletic nature of Tetrix is questioned and suggest that T.tubercarina may be given tribal rank.Our results also show that Coptltettix huanjiangensis and C.gongshanensis are the same species,i.e.Coptltettix gongshanensis Zheng,and C.huanjiangensis is the synonyms of C.gongshanensis. 展开更多
关键词 TETRIGIDAE Phylogeny 12S rRNA gene 16S rRNA gene
下载PDF
我国阿月浑子发展进程 被引量:1
7
作者 易首全 李慧民 何健 《新疆林业》 2019年第3期18-19,共2页
阿月浑子,别名胡榛子,维吾尔语称皮斯坦,又名必思答、绿仁果、无名子等,商业名称'开心果',漆树科黄连木属落叶小乔木.阿月浑子是世界四大干果之一,也是我国新疆喀什地区特有的兼具珍贵木本油料、干果、药用等多种用途的经济树种... 阿月浑子,别名胡榛子,维吾尔语称皮斯坦,又名必思答、绿仁果、无名子等,商业名称'开心果',漆树科黄连木属落叶小乔木.阿月浑子是世界四大干果之一,也是我国新疆喀什地区特有的兼具珍贵木本油料、干果、药用等多种用途的经济树种.果实富含维生素、矿物质和抗氧化元素,具有低脂肪、低卡路里、高纤维等的显著特点,对心脑血管疾病、老年性视网膜病变、抗衰老等方面具有积极的保健功效,是世界坚果市场十分畅销的保健休闲食品. 展开更多
关键词 仁果 名子 世界 喀什地区 开心果 视网膜 干果 元素
下载PDF
蓝&白——风雨历程、千锤百炼
8
作者 崔炳男 《管理工程师》 2003年第8期30-31,共2页
一含辛茹苦,事业起步--无名子诞生时仅是一个"路边摊";照搬模式。
关键词 名子品牌 台湾省 王文政 总经理 蓝与白餐饮连锁有限公司
下载PDF
有益计算机族的饮品
9
作者 东方 《安全与健康》 2004年第05S期56-56,共1页
这里帮你找出几种最适合计算机族喝的茶饮,或是点心,不但可以帮您对抗辐身的侵害还可保护您的眼睛,抗烦躁呢! 绿豆薏仁汤 绿豆可以清热解毒、利尿消肿,薏仁则可以健脾止泻,轻身益气。
关键词 计算机 绿茶 维他命C 保健知识 名子 构杞茶
下载PDF
Restricted common data in anonymous E-cash system 被引量:1
10
作者 张向军 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期595-600,共6页
Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficien... Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems. 展开更多
关键词 blind signatures anonymity E-cash system restricted common data
下载PDF
A NEW ANONYMITY CONTROLLED E-CASH SCHEME 被引量:1
11
作者 Zhang Fangguo Wang Changjie Wang Yumin (Key Lab. on ISN, Xidian Univ., Xi’an, 710071) 《Journal of Electronics(China)》 2002年第4期369-374,共6页
E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) ... E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented. 展开更多
关键词 E-CASH Anonymity control One-time key pairs digital signature ECC
下载PDF
Threshold Ring Signature Scheme Based on TPM
12
作者 Gong Bei Jiang Wei +2 位作者 Lin Li Li Yu Zhang Xing 《China Communications》 SCIE CSCD 2012年第1期80-85,共6页
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature schen. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate. 展开更多
关键词 ring signature TPM THRESHOLD Chinese remainder theorem RANK
下载PDF
Atomic and anonymous e-Cash transaction protocol with off-line TTP
13
作者 王茜 李朝阳 杨德礼 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第5期558-563,共6页
Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an ... Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest participants, but also features high efficiency and practicability. The new protocol also avoids transaction from an ambiguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction protocol. 展开更多
关键词 E-CASH ATOMICITY ANONYMITY security electronic commerce
下载PDF
Specific VpU Codon Changes were Significantly associated with gp120 V3 Tropic Signatures in HIV-1 B-subtype
14
作者 Salvatore Dimonte Muhammed Babakir-Mina +1 位作者 Stefano Aquaro Carlo-Federico Perno 《Virologica Sinica》 CAS CSCD 2012年第6期360-368,共9页
After infection and integration steps, HIV-1 transcriptions increase sharply and singly-spliced mRNAs are produced. These encode Env (gpl20 and gp41) and auxiliary proteins Vif, Vpr and VpU. The same localization wi... After infection and integration steps, HIV-1 transcriptions increase sharply and singly-spliced mRNAs are produced. These encode Env (gpl20 and gp41) and auxiliary proteins Vif, Vpr and VpU. The same localization within the unique structure of the mRNAs suggests that the VpU sequence prior to the Env could affect the Env polyprotein expression.The HIV-I infection process begins when the gpl20 subunit of the envelope glycoprotein complex interacts with its receptor(s) on the target cell. The V3 domain of gpl20 is the major determinant of cellular co-receptor binding. According to phenotypic information of HIVol isolates, sequences from the VpU to V3 regions (119 in R5- and 120 X4-tropic viruses; one per patient) were analysed. The binomial correlation phi coefficient was used to assess covariation among VpU and gpl20v3 signatures. Subsequently, average linkage hierarchical agglomerative clustering was performed. Beyond the classical V3 signatures (R5-viruses: SI1, E25D; X4-viruses: SllKR, E25KRQ), other specific V3 and novel VpU signatures were found to be statistically associated with co-receptor usage. Several statistically significant associations between V3 and VpU mutations were also observed. The dendrogram showed two distinct large clusters: one associated with R5-tropic sequences (bootstrap=0.94), involving: (a) H13NPv3, E25Dv3, Sllv3, T22Av3 and Q61Hvpu, (b) E25Av3 and L12Fvpu, (c) D44Evpu, R18Qv3 and D80Nvpu; and another associated with X4-tropic sequences (bootstrap=0.97), involving: (i) E25Iv3 and V10Avpu, (ii) 0-1insVvpc, H13Rv3, I46Lvpc, I30Mv3 and 60-62delvpu, (iii) SllKRv3 and E25KRQv3. Some of these pairs of mutations were encoded always by one specific codon. These data indicate the possible VpU mutational patterns contributing to regulation of HIV-I tropism. 展开更多
关键词 HIV VPU gpl20 V3 Mutations TROPISM Cluster analysis
下载PDF
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce 被引量:1
15
作者 XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen 《Journal of China University of Mining and Technology》 EI 2006年第4期470-474,共5页
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack. 展开更多
关键词 digital signature nominative signature proxy signature
下载PDF
Identity-based proxy multi-signature applicable to secure E-transaction delegations
16
作者 刘建华 Wu Qianhong +1 位作者 Liu Jianwei Shang Tao 《High Technology Letters》 EI CAS 2016年第2期199-206,共8页
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro... To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures. 展开更多
关键词 MULTI-SIGNATURE E-transaction DELEGATION provable security information security
下载PDF
A chaos-based quantum group signature scheme in quantum cryptosystem
17
作者 娄小平 陈志刚 Moon Ho Lee 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第7期2604-2611,共8页
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp... A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers. 展开更多
关键词 group signature chaotic encryption quantum entanglement quantum cryptography
下载PDF
Compare Differences Between Different Bible Translations in the View of Globalization: Illustrated by the Case of “ψυχη” in the New Testament
18
作者 CHANG Cheng-hao 《Cultural and Religious Studies》 2017年第10期622-638,共17页
The purpose of Bible translation is to enable readers to fully understand what the Bible says in their own context. The different Bible translations use different translation principles, therefore, they show different... The purpose of Bible translation is to enable readers to fully understand what the Bible says in their own context. The different Bible translations use different translation principles, therefore, they show different translated results from each other. In general, translators will make translation choices between the “word-for-word translation” and “sense-for-sense translation”. A good translation usually has two translation choices and the difference is just which kind of choice to use more. In addition to this, whether the same word can be translated consistently is also worthy of being discussed, especially in the case of a proper noun or vocabulary with special meaning. If a vocabulary with special meaning in the Bible is translated into different words, it is not only impossible to clarify the conceptual connection or logical relationship between certain words in the Bible, but also makes it possible for readers who read different Bible translations to have the different understanding of the vocabulary. Under the influence of globalization, Christian communication has become more frequent. After different readers read different Bible translations, the problem of inconsistent understanding of the same word or paragraph will be gradually revealed. This article uses the Greek word “ψυχη” to explore the above issues. “ψυχη” is a vocabulary with special meaning in the New Testament and it is mostly discussed in the anthropology of Christian theology. This article compares three English Bible translations and six Chinese Bible translations on the Greek word “ψυχη” and then finds that the Greek word “ψυχη was translated into multiple different words in a single Bible translation and in different Bible translations. This situation shows that the difference in translation may make the readers of different Bible translations have different understandings after reading. 展开更多
关键词 Bible TRANSLATE translation SOUL SPIRIT heart
下载PDF
Anonymity control in electronic check systems
19
作者 马春光 Yang Yixian Hu Zhengming 《High Technology Letters》 EI CAS 2005年第4期355-358,共4页
Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. ... Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refired cheeks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairmess is also an important issue in check systelns. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonylnity revocation is introduced to electronic check system for the fitst thne, and a model of fair electronic check system is proposed. An effieient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is elnployed to revoke the anonymity of unhonest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements. 展开更多
关键词 electronic check anonymity revocation RSA-based partially blind signature
下载PDF
Digital Signatures for e-Government - a Long-Term Security Architecture 被引量:1
20
作者 Przemyslaw Blaskiewicz Przemyslaw Kubiak Miroslaw Kutylowski 《China Communications》 SCIE CSCD 2010年第6期64-70,共7页
The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarante... The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side. 展开更多
关键词 MRSA PSS padding hash based signatures kleptography deterministic signatures
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部