期刊文献+
共找到77篇文章
< 1 2 4 >
每页显示 20 50 100
安加事件的道德追问
1
作者 章采 《广东质量》 2002年第9期49-49,共1页
关键词 东莞市 安加鞋厂 安加事件 道德
下载PDF
加味四妙勇安汤抗大鼠心肌缺血再灌注损伤作用及机制初探 被引量:1
2
作者 王琛 宋丹丹 《辽宁中医药大学学报》 CAS 2024年第5期7-12,F0003,共7页
目的该研究旨在初步探讨加味四妙勇安汤对大鼠心肌缺血再灌注损伤的影响及其机制。方法首先构建大鼠心肌缺血再灌注损伤模型,随机分为正常对照组、模型组、NLRP3抑制剂(MCC950)组、四妙勇安汤组及加味四妙勇安汤组。分别检测心脏超声,... 目的该研究旨在初步探讨加味四妙勇安汤对大鼠心肌缺血再灌注损伤的影响及其机制。方法首先构建大鼠心肌缺血再灌注损伤模型,随机分为正常对照组、模型组、NLRP3抑制剂(MCC950)组、四妙勇安汤组及加味四妙勇安汤组。分别检测心脏超声,血清肌酸激酶同工酶(CK-MB)及高敏C反应蛋白(hs-CRP),血浆D-二聚体,血清NLRP3炎症相关因子caspase-1、IL-1β、IL-18含量的变化。通过HE、马松染色观察心肌病理变化及胶原纤维含量;采用TUNEL法检测心肌细胞凋亡;免疫组织化学法检测炎症通路相关基因阳性表达。结果与正常对照组比较,模型组大鼠左室射血分数(LVEF)、左心室短轴缩短率(LVFS)、左室心输出量(LVCO)、左室舒张末期前壁厚度(LVAWd)、左室收缩末期前壁厚度(LVAWs)明显降低(P<0.05);与模型组比较,给药组大鼠LVEF、LVFS、LVCO、LVAWs、LVAWd均升高。此外与模型组相比,给药组显著降低血清心肌酶CK-MB、炎症因子hs-CRP以及血浆D-二聚体含量(P<0.05),降低血清NLRP3通路相关炎症因子caspase-1、IL-1β、IL-18含量(P<0.05);TUNEL检测细胞凋亡结果提示,与正常对照组相比,模型组细胞凋亡显著增加(P<0.05),给药组均可明显减少心肌细胞凋亡(P<0.05)。心肌组织HE染色提示正常组大鼠心肌结构与形态均好,心肌纤维排列有序,模型组大鼠表现出急性损伤心肌坏死、中性粒细胞浸润和间质水肿,而经药物干预后的心肌纤维排列、中性粒细胞浸润和间质水肿均较模型组改善。马松染色表明正常对照组无明显胶原纤维沉积,模型组胶原纤维沉积显著增加(P<0.05),药物干预后心肌胶原纤维沉积较模型组显著减少(P<0.05)。免疫组化结果提示,NLRP3、caspase-1、IL-1β蛋白在心肌细胞质呈黄色或棕黄色为阳性表达,与正常对照组比较,模型组NLRP3、caspase-1、IL-1β蛋白表达明显增加(P<0.05),药物干预后阳性细胞表达明显降低(P<0.05)。结论加味四妙勇安汤具有保护大鼠心肌缺血再灌注损伤的作用,表现为改善大鼠心功能、缓解炎症反应、改善血液高凝状态、改善心肌损伤、减少细胞凋亡及胶原纤维沉积等,其机制可能与抑制NLRP3炎症通路的激活有关。且与单纯四妙勇安汤比较,加味四妙勇安汤在改善心功能、减轻细胞凋亡等方面更具优势。 展开更多
关键词 加味四妙勇安汤 心肌缺血再灌注损伤 NLRP3炎症通路
下载PDF
Some Remarks on Cocks'Identity-Based Encryption Scheme
3
作者 ZHAO Xiaopeng 《Journal of Donghua University(English Edition)》 CAS 2024年第4期447-450,共4页
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However... The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme. 展开更多
关键词 identity-based encryption(IBE) quadratic residue SECURITY Cocks’IBE scheme
下载PDF
安加族人的木乃伊
4
作者 Ulla Lohmann 《人与自然》 2017年第3期34-43,共10页
有人以为现在参观安加人置于岩架上的烟熏木乃伊已不是难事,只要肯出点费用。事实绝非如此。他们确实收些费用维持生活,但如果安加族人不喜欢你,他们也不会喜欢你的钱。
关键词 安加族人 部落 木乃伊 风俗习惯
原文传递
带上家人去肯尼亚的安加马马拉
5
作者 霁涵 《商业周刊(中文版)》 2016年第15期106-107,共2页
“拉着孩子们横跨半个地球!到非洲去!”如果从未有过这样的念头,那说明你是一个非常理智的家长。但是,尽管游猎听起来让人却步,但东非大草原上每年数以百万计的斑马、角马、羚羊及其他一些动物的年度大迁徙却也的确和学校的假期不谋... “拉着孩子们横跨半个地球!到非洲去!”如果从未有过这样的念头,那说明你是一个非常理智的家长。但是,尽管游猎听起来让人却步,但东非大草原上每年数以百万计的斑马、角马、羚羊及其他一些动物的年度大迁徙却也的确和学校的假期不谋而合(每年的7月到10月)。 展开更多
关键词 肯尼亚 安加马马拉 旅游 风景名胜
原文传递
四妙勇安汤加味结合电针夹脊穴治疗Wagner 0级糖尿病足临床效果观察 被引量:6
6
作者 劳美铃 王甫能 +6 位作者 魏爱生 吕丽雪 黄丽容 誉昭红 梁佩玲 张珏 谢春艳 《中华中医药学刊》 CAS 北大核心 2023年第7期247-250,共4页
目的 观察四妙勇安汤加味结合电针夹脊穴治疗Wagner 0级糖尿病足临床效果,为临床治疗Wagner 0级糖尿病足提供可靠的方法。方法 将医院收治的260例Wagner 0级糖尿病足患者(2019年1月-2022年1月)进行试验研究,并以随机数字表法将患者分成... 目的 观察四妙勇安汤加味结合电针夹脊穴治疗Wagner 0级糖尿病足临床效果,为临床治疗Wagner 0级糖尿病足提供可靠的方法。方法 将医院收治的260例Wagner 0级糖尿病足患者(2019年1月-2022年1月)进行试验研究,并以随机数字表法将患者分成两组,对照组与观察组各130例,对照组给予西医常规治疗,观察组常规治疗并予四妙勇安汤加味结合电针夹脊穴治疗。两组数据观察:临床疗效、治疗前后中医证候(患肢麻木疼痛、肢软乏力、纳差、身热口干等)积分变化及下肢感觉神经传导速度(胫后神经及腓肠神经、腓浅神经及腓总神经)变化、趾肱指数(toe brachial index, TBI)和踝肱指数(ankle brachial index, ABI)变化、血清白介素-1(interleukin-1,IL-1)及白介素-6(interleukin-6,IL-6)、肿瘤坏死因子α(tumor necrosis factor Alpha, TNF-α)变化、治疗后多伦多临床神经病变量表(Toronto clinical scoring system, TCSS)情况和不良反应。结果 观察组患者治疗总有效率(97.69%,127/130)比对照组(91.54%,119/130)更高(P<0.05);两组患者治疗前中医证候(患肢麻木疼痛、肢软乏力、纳差、身热口干等)积分、下肢感觉神经传导速度、TBI及ABI、IL-1及IL-6、TNF-α水平等指标比较,P>0.05,治疗后各组患者中医证候(患肢麻木疼痛、肢软乏力、纳差、身热口干等)积分、下肢感觉神经传导速度、TBI及ABI、IL-1及IL-6、TNF-α水平等指标均改善,观察组患者治疗后中医证候(患肢麻木疼痛、肢软乏力、纳差、身热口干等)积分、下肢感觉神经传导速度、TBI及ABI、IL-1及IL-6、TNF-α水平等指标均优于对照组(P<0.05);观察组患者治疗后TCSS评分情况优于对照组(P<0.05);两组未见不良反应。结论 四妙勇安汤加味结合电针夹脊穴治疗Wagner 0级糖尿病足效果显著,无不良反应,值得应用。 展开更多
关键词 Wagner 0级糖尿病足 四妙勇安汤加味 电针夹脊穴 疗效 多伦多临床神经病变 不良反应
下载PDF
GM-L65电控柴油机突加减速特性试验研究 被引量:2
7
作者 吴伶 易雪梅 刘玉德 《北京工商大学学报(自然科学版)》 CAS 2007年第4期23-25,共3页
介绍了GM-L65电控柴油机的性能及控制参数,阐述了柴油机的特性与车辆性能及变速器换档之间的联系.通过柴油机突加减速特性试验,分析了柴油机突加减速特性及相应的加速踏板位置传感器信号变化特性,为动力传动系统的一体化控制以及换档规... 介绍了GM-L65电控柴油机的性能及控制参数,阐述了柴油机的特性与车辆性能及变速器换档之间的联系.通过柴油机突加减速特性试验,分析了柴油机突加减速特性及相应的加速踏板位置传感器信号变化特性,为动力传动系统的一体化控制以及换档规律设计提供了依据. 展开更多
关键词 电控调逮柴油机 安加减速特性 动力传动一体化控制
下载PDF
加味安神养血汤联合艾司唑仑对心脾两虚型亚健康失眠症患者睡眠质量的影响 被引量:10
8
作者 贾海波 王春葳 +3 位作者 辛红 李建波 梁晓香 多慧玲 《辽宁中医杂志》 CAS 2021年第6期143-147,共5页
目的探讨加味安神养血汤联合艾司唑仑治疗心脾两虚型亚健康失眠症患者的临床价值。方法选取2017年8月1日—2018年12月31日该院中医内科门诊60例顽固性失眠患者作为本次研究对象,按照随机数字表原则将其分为对照组和治疗组,均30例。对照... 目的探讨加味安神养血汤联合艾司唑仑治疗心脾两虚型亚健康失眠症患者的临床价值。方法选取2017年8月1日—2018年12月31日该院中医内科门诊60例顽固性失眠患者作为本次研究对象,按照随机数字表原则将其分为对照组和治疗组,均30例。对照组常规艾司唑仑干预,治疗组在此基础上口服安神养血汤综合调理,比较两组患者治疗30 d后临床总有效率,匹兹堡睡眠质量(PSQI)评分,睡眠质量及不良反应发生改善情况。结果治疗30 d后,治疗组总有效率为96.67%(29/30),对照组总有效率为73.33%(22/30),治疗组总有效率显著高于对照组(P<0.05),差异具统计学意义。治疗前,两组患者PQSI评分和睡眠质量比较无统计学意义(P>0.05);治疗30 d后,治疗组较对照组PQSI评分指数均明显降低,睡眠质量显著升高(P<0.05),差异具统计学意义。治疗组不良反应率为6.67%(2/30),对照组不良反应发生率为10.00%(3/30),治疗组不良反应发生率明显低于对照组(P<0.05),差异具统计学意义。结论加味安神养血汤联合艾司唑仑综合调理心脾两虚型亚健康失眠患者较单纯西药治疗具有显著临床疗效,不仅总体提升了患者睡眠质量,而且安全系数高,不良反应少,值得临床广泛应用和基层推广。 展开更多
关键词 失眠 加味安神养血汤 心脾两虚 亚健康 PQSI
下载PDF
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS 被引量:1
9
作者 陈原 陈丹 董庆宽 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期301-305,共5页
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ... Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one. 展开更多
关键词 information security public-key encryption chosen ciphertext security Tag-KEM scheme
下载PDF
从“心部于表”论述加味四妙勇安方治疗急性放射性皮炎 被引量:4
10
作者 王寅 孙立巧 +4 位作者 康宁 孙颖 宋凤丽 高辰 李仝 《辽宁中医杂志》 CAS 2022年第8期42-45,共4页
急性放射性皮炎是放疗相关常见不良反应,严重影响患者生活质量。中医药为我国的特色治疗方法,外用药在治疗急性放射性皮炎方面可发挥明显优势。以“心部于表”为理论指导的皮肤病与急性放射性皮炎在临床表现及治疗用药方面有契合之处。... 急性放射性皮炎是放疗相关常见不良反应,严重影响患者生活质量。中医药为我国的特色治疗方法,外用药在治疗急性放射性皮炎方面可发挥明显优势。以“心部于表”为理论指导的皮肤病与急性放射性皮炎在临床表现及治疗用药方面有契合之处。故以入心经为主的中药创立加味四妙勇安方,在“心部于表”的理论指导下治疗急性放射性皮炎取得了较好的疗效,为中医药治疗急性放射性皮炎提供新的思路。 展开更多
关键词 心部于表 心经 加味四妙勇安方 急性放射性皮炎
下载PDF
Security of Application System 被引量:1
11
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
加味六安煎对咳嗽变异性哮喘豚鼠血清IL-2、IL-12及IL-13水平影响 被引量:4
12
作者 张宁宁 吴力群 +6 位作者 陈海鹏 霍婧伟 廖欣婷 徐方蔚 李盼盼 路晨 陈宇航 《辽宁中医药大学学报》 CAS 2021年第10期21-24,共4页
目的观察咳嗽变异性哮喘(cough variant asthma,CVA)模型豚鼠血清白细胞介素-2(interleukin-2,IL-2)、白细胞介素-12(interleukin-12,IL-12)、白细胞介素-13(interleukin-13,IL-13)水平的变化,探讨加味六安煎治疗咳嗽变异性哮喘的作用机... 目的观察咳嗽变异性哮喘(cough variant asthma,CVA)模型豚鼠血清白细胞介素-2(interleukin-2,IL-2)、白细胞介素-12(interleukin-12,IL-12)、白细胞介素-13(interleukin-13,IL-13)水平的变化,探讨加味六安煎治疗咳嗽变异性哮喘的作用机制,为临床治疗提供依据。方法将30只雄性豚鼠随机分为正常组,CVA模型组,孟鲁司特钠组,加味六安煎低、中、高剂量组。以卵蛋白、氢氧化铝致敏并吸入卵蛋白激发法复制CVA豚鼠模型,观察各组大鼠咳嗽次数及血清IL-2、IL-12及IL-13水平变化。结果(1)咳嗽次数:与正常组相比,CVA模型组咳嗽次数明显增加(P<0.05);与CVA模型组相比,各治疗组咳嗽次数明显减少(P<0.05);各治疗组组间比较差异无统计学意义(P>0.05)。(2)IL-2:与正常组相比,CVA模型组IL-2水平升高(P<0.05);与CVA模型组相比,各治疗组IL-2水平差异无统计学意义(P>0.05);各治疗组组间比较差异无统计学意义(P>0.05)。(3)IL-12:与正常组相比,CVA模型组IL-12水平升高(P<0.05);与CVA模型组相比,加味六安煎高剂量组IL-12水平降低(P<0.05),孟鲁司特钠组及加味六安煎低、中剂量组差异无统计学意义(P>0.05),各治疗组组间比较差异无统计学意义(P>0.05)。(4)IL-13:与正常组相比,CVA模型组IL-13水平升高(P<0.05);与CVA模型组相比,孟鲁司特钠组差异无统计学意义(P>0.05),加味六安煎各剂量组IL-13水平降低(P<0.05);与孟鲁司特钠组相比,加味六安煎各剂量组IL-13水平降低(P<0.05);加味六安煎各剂量组组间比较差异无统计学意义(P>0.05)。结论加味六安煎可以通过调节IL-2、IL-13及IL-12的水平,调节Th1/Th2的平衡状态,减轻气道炎症水平及气道高反应性,延缓气道上皮下纤维化,进而减少咳嗽次数,改善气道重塑,从而达到防治本病的目的。 展开更多
关键词 加味六安煎 咳嗽变异性哮喘 豚鼠 白细胞介素-2 白细胞介素-12 白细胞介素-13
下载PDF
Identity-Based Encryption with Keyword Search from Lattice Assumption 被引量:6
13
作者 Xiaojun Zhang Chunxiang Xu +1 位作者 Liming Mu Jie Zhao 《China Communications》 SCIE CSCD 2018年第4期164-178,共15页
Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor... Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor corresponding to the keyword. The PEKS is useful to keep the management of large data storages secure such as those in a cloud. In this paper, to protect against quantum computer attacks, we present a lattice-based identity-based encryption scheme with key- word search. We have proved that our scheme can achieve ciphertext indistinguishability in the random oracle model, and our scheme can also achieve trapdoor security. In particular, our scheme can designate a unique tester to test and return the search results, therefore it does not need a secure channel. To the best of our knowledge, our scheme is the first iden- tity-based encryption scheme with keyword search from lattice assumption. 展开更多
关键词 public key encryption keywordsearch ciphertext indistinguishability latticeassumption.
下载PDF
Distributed certification application via a trusted dealer 被引量:1
14
作者 刘端阳 潘雪增 平玲娣 《Journal of Zhejiang University Science》 EI CSCD 2003年第5期555-559,共5页
Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as IT... Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as ITTC,etc.,is unsaf e ,inefficient and impracitcal in actual network environment,this paper brings u p a new distributed certification scheme,which although it generates key shares concentratively,it updates key shares distributedly,and so,avoids single-po in t failure like ITTC. It not only enhances robustness with Feldman verification and SSL protocol,but can also change the threshold (t,k) flexibly and robu stly,and so,is much more practical. In this work,the authors implement the prototype sy stem of the new scheme and test and analyze its performance. 展开更多
关键词 Distributed certification Trusted dealer ROBUST Flex ible
下载PDF
THE RESEARCH AND DESIGN OF RECONFIGURABLE COMPUTING FOR BLOCK CIPHER 被引量:1
15
作者 Yang Xiaohui Dai Zibin Zhang Yongfu Yu Xuerong 《Journal of Electronics(China)》 2008年第4期503-510,共8页
This paper describes a new specialized Reconfigurable Cryptographic for Block ciphersArchitecture(RCBA).Application-specific computation pipelines can be configured according to thecharacteristics of the block cipher ... This paper describes a new specialized Reconfigurable Cryptographic for Block ciphersArchitecture(RCBA).Application-specific computation pipelines can be configured according to thecharacteristics of the block cipher processing in RCBA,which delivers high performance for crypto-graphic applications.RCBA adopts a coarse-grained reconfigurable architecture that mixes the ap-propriate amount of static configurations with dynamic configurations.RCBA has been implementedbased on Altera’s FPGA,and representative algorithms of block cipher such as DES,Rijndael and RC6have been mapped on RCBA architecture successfully.System performance has been analyzed,andfrom the analysis it is demonstrated that the RCBA architecture can achieve more flexibility and ef-ficiency when compared with other implementations. 展开更多
关键词 Reconfigurable computing Block cipher Reconfigurable Cryptographic for Block ciphers Architecture (RCBA)
下载PDF
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT 被引量:1
16
作者 Han Yanyan Hu Yupu He Wencai 《Journal of Electronics(China)》 2009年第5期631-636,共6页
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect. 展开更多
关键词 Visual cryptography Digital signature Time-stamp
下载PDF
Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2
17
作者 Wu Qiuxin Zhang Miao 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app... Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. 展开更多
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure
下载PDF
ASIP for Elliptic Curve Cryptography Based on VLIW Architecture 被引量:1
18
作者 YANG Xiaohui DAI Zibin ZHANG Jun ZHANG Yongfu 《China Communications》 SCIE CSCD 2010年第4期161-166,共6页
The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on an... The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility. 展开更多
关键词 Elliptic Curve Cryptography Application Specific Instruction-Set Processor VLIW Architecture
下载PDF
Safety Assessment for Autonomous Aerial Refueling Based on Reachability Analysis 被引量:1
19
作者 REN Jinrui MA Haibiao +1 位作者 QUAN Quan HANG Bin 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第2期216-224,共9页
Autonomous aerial refueling(AAR)has demonstrated significant benefits to aviation by extending the aircraft range and endurance.It is of significance to assess system safety for autonomous aerial refueling.In this pap... Autonomous aerial refueling(AAR)has demonstrated significant benefits to aviation by extending the aircraft range and endurance.It is of significance to assess system safety for autonomous aerial refueling.In this paper,the reachability analysis method is adopted to assess system safety.Due to system uncertainties,the aerial refueling system can be considered as a stochastic system.Thus,probabilistic reachability is considered.Since there is a close relationship between reachability probability and collision probability,the collision probability of the AAR system is analyzed by using reachability analysis techniques.Then,the collision probability is accessed by using the Monte-Carlo experiment method.Finally,simulations demonstrate the effectiveness of the proposed safety assessment method. 展开更多
关键词 aerial refueling safety assessment collision probability probabilistic reachability Monte-Carlo method
下载PDF
Verifiably Encrypted Signatures Without Random Oracles 被引量:3
20
作者 李祥学 陈克非 +1 位作者 刘胜利 李世群 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期230-235,共6页
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satis... Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption. 展开更多
关键词 PAIRINGS verifiably encrypted signatures short signatures tight security reduction
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部