By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ...By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.展开更多
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl...Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.展开更多
The paper analyzes John Presper Eckert and John William Mauchly's endeavours to design, sell, and build the revolutionary new technology of the first-large and commercial computers. It discusses how Eckert and Mauchl...The paper analyzes John Presper Eckert and John William Mauchly's endeavours to design, sell, and build the revolutionary new technology of the first-large and commercial computers. It discusses how Eckert and Mauchly's conceptualization of the computer grew out of their Electronic Numerical Integrator and Calculator (ENIAC) and Electronic Discrete Variable Automatic Computer (EDVAC) projects at University of Pennsylvania. They incorporated their own business to gain profit from production and attain the freedom needed to develop their revolutionary new computer technology through a series of small and separate computer projects with private and government customers. The paper approaches innovation as a chaotic process and uses uncertainty to conceptualize the basic relations between actors and organizations.展开更多
The objective of this paper was to analyze the impact of online reviews on sales. Based on dual path model of commodity sales, an online reviews impact on the relationship between various factors, and then the theoret...The objective of this paper was to analyze the impact of online reviews on sales. Based on dual path model of commodity sales, an online reviews impact on the relationship between various factors, and then the theoretical hypothesis of each factor has been put forward in the model. As it is intuitive and strongly supported empirically, data including Chinese texts captured from Tmall. com was utilized, and then analyzed by SPSS and ROST CM6. Our empirical study on the reviews of TmalLcom indicated that the hypotheses are verified.展开更多
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di...Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising.展开更多
Interactive digital television is at early stage as regards the interface design, especially in business transactions (t-commerce). Current attempts to transpose the problem related to linearity of narrative and tem...Interactive digital television is at early stage as regards the interface design, especially in business transactions (t-commerce). Current attempts to transpose the problem related to linearity of narrative and temporal flows and audiovisual content obstruction by the interactive layer, although pointing out design perspectives--in addition to the structural and visual web patterns--are still insufficient as regards the design of interfaces connected and converged for t-commerce applications. This article considers that these problems arise from the structural basis that support television scripts and streamings. In this sense, this article proposes the hybridization between the linear model, inherited from analogue condition, and nonlinear model, intrinsic to digital media, as a methodological strategy aiming to strength the creation of interactive audiovisual content connected and convergent for this context.展开更多
A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protecti...A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protection program as a commerce application.Compared to the traditional digital watermarking schemes,our scheme operates in redundancy areas of maps and is scalable to topology changes.Experimental results show that,with respect to the geometric attacks and image transformed,the performance of our scheme is better than the classical algorithms based space or frequency domain with much lower complexity..展开更多
Based on the Lax operator L and Orlov-Shulman's M operator,the string equations of the q-KP hierarchy are established from the special additional symmetry flows,and the negative Virasoro constraint generators {L-n...Based on the Lax operator L and Orlov-Shulman's M operator,the string equations of the q-KP hierarchy are established from the special additional symmetry flows,and the negative Virasoro constraint generators {L-n,n ≥ 1} of the 2-reduced q-KP hierarchy are also obtained.展开更多
An ultra-highly precise and long-term stable frequency transmission system over 120 km commercial fiber link has been proposed and experimentally demonstrated. This system is based on digital output compensation techn...An ultra-highly precise and long-term stable frequency transmission system over 120 km commercial fiber link has been proposed and experimentally demonstrated. This system is based on digital output compensation technique to suppress phase fluctuations during the frequency transmission process. A mode-locked erbium-doped fiber laser driven by a hydrogen maser serves as an optical transmitter. Moreover, a dense wavelength division multiplexing system is able to separate forward and backward signals with reflection effect excluded. The ultimate fractional frequency instabilities for the long-distance frequency distributed system are up to 3.14×10^(-15) at 1 s and 2.96×10^(-19) at 10 000 s, respectively.展开更多
基金Projects 60473028 supported by the National Natural Science Foundation of China and 2006XXJ17 by the Natural Science Foundation of Zhengzhou Universityof Light Industry
文摘By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.
文摘Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.
文摘The paper analyzes John Presper Eckert and John William Mauchly's endeavours to design, sell, and build the revolutionary new technology of the first-large and commercial computers. It discusses how Eckert and Mauchly's conceptualization of the computer grew out of their Electronic Numerical Integrator and Calculator (ENIAC) and Electronic Discrete Variable Automatic Computer (EDVAC) projects at University of Pennsylvania. They incorporated their own business to gain profit from production and attain the freedom needed to develop their revolutionary new computer technology through a series of small and separate computer projects with private and government customers. The paper approaches innovation as a chaotic process and uses uncertainty to conceptualize the basic relations between actors and organizations.
基金Supported by National Natural Science Foundation of China under Grant (No.61075115), Soft Science Key issues of Shanghai Science and Technology Commission(No. 13692104900), Innovation Program of Shanghai Municipal Education Commission (12YZ152), Humanities and Social Science Fund of Ministry of Education (No. 13YJCZH 122) and Course Construction of SUES (No.K201203005).
文摘The objective of this paper was to analyze the impact of online reviews on sales. Based on dual path model of commodity sales, an online reviews impact on the relationship between various factors, and then the theoretical hypothesis of each factor has been put forward in the model. As it is intuitive and strongly supported empirically, data including Chinese texts captured from Tmall. com was utilized, and then analyzed by SPSS and ROST CM6. Our empirical study on the reviews of TmalLcom indicated that the hypotheses are verified.
文摘Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising.
文摘Interactive digital television is at early stage as regards the interface design, especially in business transactions (t-commerce). Current attempts to transpose the problem related to linearity of narrative and temporal flows and audiovisual content obstruction by the interactive layer, although pointing out design perspectives--in addition to the structural and visual web patterns--are still insufficient as regards the design of interfaces connected and converged for t-commerce applications. This article considers that these problems arise from the structural basis that support television scripts and streamings. In this sense, this article proposes the hybridization between the linear model, inherited from analogue condition, and nonlinear model, intrinsic to digital media, as a methodological strategy aiming to strength the creation of interactive audiovisual content connected and convergent for this context.
基金supported in part by National Science Fund for Distinguished Young Scholars under Grant No.61202455Research Funds for the Central Universities under Grant No.HEUCF100612Research Funds for the Doctoral Program of Higher Education of China under Grant No.20112304120025
文摘A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protection program as a commerce application.Compared to the traditional digital watermarking schemes,our scheme operates in redundancy areas of maps and is scalable to topology changes.Experimental results show that,with respect to the geometric attacks and image transformed,the performance of our scheme is better than the classical algorithms based space or frequency domain with much lower complexity..
基金supported by the National Natural Science Foundation of China (Nos.10971109,10971209,10825101)
文摘Based on the Lax operator L and Orlov-Shulman's M operator,the string equations of the q-KP hierarchy are established from the special additional symmetry flows,and the negative Virasoro constraint generators {L-n,n ≥ 1} of the 2-reduced q-KP hierarchy are also obtained.
基金supported by the National Natural Science Foundation of China(Nos.61571244 and 61501262)the Science and Technology Project of Tianjin(No.16YFZCSF00540)the Natural Science Foundation of Tianjin(No.15JCYBJC51600)
文摘An ultra-highly precise and long-term stable frequency transmission system over 120 km commercial fiber link has been proposed and experimentally demonstrated. This system is based on digital output compensation technique to suppress phase fluctuations during the frequency transmission process. A mode-locked erbium-doped fiber laser driven by a hydrogen maser serves as an optical transmitter. Moreover, a dense wavelength division multiplexing system is able to separate forward and backward signals with reflection effect excluded. The ultimate fractional frequency instabilities for the long-distance frequency distributed system are up to 3.14×10^(-15) at 1 s and 2.96×10^(-19) at 10 000 s, respectively.