期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
迎奥运 做好体育信息技术工作
1
作者 赵黎 《信息系统工程》 2001年第1期8-8,共1页
关键词 国家体育局 信息化建设 办公自动化 电子信息系统 中国体育信息网
下载PDF
教练员的工作目标与角色定位 被引量:10
2
作者 钟秉枢 《中国体育教练员》 2003年第4期7-9,共3页
2002年8月23日,江泽民同志在北京接见全国体育工作会议代表时指出:"举办2008年奥运会,不仅关系到我们对国际社会的承诺,也关系到祖国的荣誉.要通过筹备和举办奥运会,进一步推动我国体育事业的全面发展,出成果,出人才,为改革开放和... 2002年8月23日,江泽民同志在北京接见全国体育工作会议代表时指出:"举办2008年奥运会,不仅关系到我们对国际社会的承诺,也关系到祖国的荣誉.要通过筹备和举办奥运会,进一步推动我国体育事业的全面发展,出成果,出人才,为改革开放和现代化建设做出更大的贡献." 展开更多
关键词 教练员 工作目标 角色定位 运动训练 国家体育局 培训工作
下载PDF
Provably Secure General Aggregate Signcryption Scheme in the Random Oracle Model 被引量:13
3
作者 Qi Zhenghua Ren Xunyi Yang Geng 《China Communications》 SCIE CSCD 2012年第11期107-116,共10页
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggre... To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation. 展开更多
关键词 identity-based cryptography SIGNCRYPTION aggregate signature bilinear pairing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部