期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
电商领域交易统计码技术与制度研究
1
作者 葛万军 《中国商论》 2022年第2期57-63,共7页
在产业转型升级大背景下,我国电子商务蓬勃发展,电商领域交易呈现交易量大面广、爆发增长和组织形式多样两种趋势,出现了平台电商、自营电商、社交电商和微商等各种形式的电商组织。本文通过搜集国内外研究前沿,访谈相关政府职能部门,... 在产业转型升级大背景下,我国电子商务蓬勃发展,电商领域交易呈现交易量大面广、爆发增长和组织形式多样两种趋势,出现了平台电商、自营电商、社交电商和微商等各种形式的电商组织。本文通过搜集国内外研究前沿,访谈相关政府职能部门,重点电商企业、电商产业园和社区微商,从多维电商交易主体角度,研究电商领域统计制度与方法。同时提出改善统计立法环境,提高纳税入统意识,破除企业隐私障碍,规范电商交易行为,推广使用电子商务交易码、创新电商交易数据统计方法等完善企业电商交易统计制度与方法的设想。 展开更多
关键词 电子 交易 统计制度 统计方法
下载PDF
Zp^2上长度为pn的循环码 被引量:1
2
作者 王冬银 朱士信 开小山 《中国科学技术大学学报》 CAS CSCD 北大核心 2008年第5期481-487,共7页
给出了环GR(p2,m)上长为p的循环码结构,即扩环GR(p2,m)[u]/〈up-1〉的理想结构,并给出了环Zp2上长度为pn循环码的结构以及计数情形.
关键词 循环 GALOIS环 离散傅立叶变换 商码
下载PDF
环F_2+uF_2上线性码的结构特性 被引量:4
3
作者 耿普 李超 《电子与信息学报》 EI CSCD 北大核心 2007年第12期2912-2914,共3页
该文研究了环F2+uF2上线性码的结构特性,讨论了环F2+uF2上线性码及其剩余码、挠码和商码之间的关系,通过这些关系。给出了线性码(特别是循环码)的深度分布与深度谱。
关键词 剩余 商码 深度谱 深度分布
下载PDF
打击非法四方支付,斩断黑产资金链条 被引量:3
4
作者 仲海宁 徐夏杰 《信息网络安全》 CSCD 北大核心 2020年第S02期144-147,共4页
第四方支付又称聚合支付,是第三方支付发展的产物。中国人民银行已明确聚合支付机构为支付企业外包服务机构。第四方支付具有违规行为隐蔽性强的特点,常被犯罪分子用于诈骗、网络赌博、洗钱等非法用途,是网络黑产犯罪链条中的支付环节... 第四方支付又称聚合支付,是第三方支付发展的产物。中国人民银行已明确聚合支付机构为支付企业外包服务机构。第四方支付具有违规行为隐蔽性强的特点,常被犯罪分子用于诈骗、网络赌博、洗钱等非法用途,是网络黑产犯罪链条中的支付环节。文章汇总分析了常见第四方支付的平台模式,并梳理适用法律,为打击黑产犯罪提供经验参考。 展开更多
关键词 第四方支付平台 水房账户 法律适用 支付通道
下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
5
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
下载PDF
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce 被引量:1
6
作者 XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen 《Journal of China University of Mining and Technology》 EI 2006年第4期470-474,共5页
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack. 展开更多
关键词 digital signature nominative signature proxy signature
下载PDF
Analysis of Telephone Call Detail Records based on Fuzzy Decision Tree 被引量:1
7
作者 Ding Liping Gu jian +1 位作者 Wang Yongji Wu Jingzheng 《China Communications》 SCIE CSCD 2010年第6期120-127,共8页
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di... Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising. 展开更多
关键词 FORENSICS digital evidence telephonecall records fuzzy decision tree
下载PDF
User Behaviors Analysis in Website Identification Registration 被引量:1
8
作者 甘曈 林福宏 +2 位作者 陈常嘉 郭宇春 郑毅 《China Communications》 SCIE CSCD 2013年第3期76-81,共6页
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S... Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords. 展开更多
关键词 user behaviors website identifi- cation COMPLEXITY CORRELATION PREFERENCE
下载PDF
Access to Healthy Food Stores for Residents of Aboriginal Reserves in Rural British Columbia
9
《Journal of Food Science and Engineering》 2017年第7期342-350,共9页
The rate of food insecurity has increased tremendously over the past decade in Canada. This increase has been more pronounced in rural and remote areas especially among Aboriginal peoples. Substantial studies indicate... The rate of food insecurity has increased tremendously over the past decade in Canada. This increase has been more pronounced in rural and remote areas especially among Aboriginal peoples. Substantial studies indicated that nearly half of the on-reserve Aboriginal households in British Columbia (BC) suffer from some degree of food insecurity. Despite the valuable research about obtaining traditional food, the issue of access to market food has been less discussed in the literature. The aim of this study was to assess the local food environment of on-reserve Aboriginal peoples by using a proximity-based approach tool in terms of access to healthy food stores such as supermarket and grocery stores. In the first stage, the addresses of all healthy food stores were geocoded into a map layer. Then the locations of Aboriginal reserves were geocoded to a separate map layer. In the second stage, using "Closest Facility Analysis" tool in ArcGIS Version 10.3, the distance based on a 15-minute driving time was measured from each reserve to the closest healthy food destination on CanMapRouteLogistics network. The results indicated that 25% of Aboriginal reserves did not have reasonable access to healthy food stores. We concluded that Aboriginal peoples in low access rural reserves with lower socioeconomic status are at potential risk of perpetuate food insecurity. 展开更多
关键词 Food security rural aboriginal reserves network analysis ArcGIS.
下载PDF
Iterative Multiuser Receiver Based on Factor Graph for Asynchronous Coded CDMA Systems
10
作者 张爱萍 Luo +2 位作者 Hanwen Wang Haoxing 《High Technology Letters》 EI CAS 2003年第1期41-46,共6页
Factor graph, so named because it graphically represents function factorization, with which and its sum-product algorithm the iterative algorithm can be derived clearly. An iterative multiuser receiver based on factor... Factor graph, so named because it graphically represents function factorization, with which and its sum-product algorithm the iterative algorithm can be derived clearly. An iterative multiuser receiver based on factor graph for asynchronous coded CDMA system is proposed. In this paper, the a posteriori probability of users information bits conditioned on the noise-whitening filters output is represented by factor graphs, after numbers of iterations with the sum-product algorithm the information bits are estimated. The authors also propose a reduced complexity algorithm. Simulation results show that with this proposed receiver, near-single-user performance can be achieved, and small performance degradation for the reduced complexity algorithm with significant complexity reduction. 展开更多
关键词 multiuser detection iterative algorithm multiuser decoding
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部