期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
侥幸心理是交通安全的大敌
1
作者 戴廷荣 《汽车驾驶员》 2000年第8期44-44,共1页
关键词 安通安全 交通事故 事故分析 侥幸心理
下载PDF
Driving Behavior Shaping Model in Road Traffic System 被引量:2
2
作者 王武宏 《Journal of Beijing Institute of Technology》 EI CAS 2001年第3期331-336,共6页
In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analys... In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analysis, a new driving behavior shaping model is proposed, which could be used to assess the degree of effect of driving error upon road traffic safety. Driver behavior shaping model based on driving reliability and safety analysis could be used to identify the road traffic accident causation, to supply data for driver's behavior training, to evaluate driving procedures, to human factor design of road traffic system. 展开更多
关键词 driving errors driving behavior shaping factors driving reliability and safety analysis road traffic safety
下载PDF
Security integrated framework for semantic web based on social intelligence
3
作者 孟庆华 丁永生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期409-412,共4页
An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web mod... An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies. 展开更多
关键词 integrated security framework social intelligence closed-security-ring security-channel semantic web
下载PDF
STUDY ON SEAMLESS AND MULTILEVEL VPN
4
作者 陈兵 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2002年第2期182-186,共5页
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ... The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control. 展开更多
关键词 network security virtual private network FIREWALLS
下载PDF
An Authenticated Dynamic Key Management Scheme for Clustered Sensor Networks 被引量:2
5
作者 ZHOU Yajian PAN Anwei LI Jiguo 《China Communications》 SCIE CSCD 2010年第4期7-17,共11页
Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subjec... Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subject to node capture.Constrained energy,memory,and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the network.In this paper,an authenticated dynamic key management scheme,ADKM has been proposed.It provides efficient,scalable,and survivable dynamic keying in a clustered sensor network with a large number of sensor nodes.ADKM employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication.Analysis of security and performance demonstrate that ADKM is efficient in security of sensor networks. 展开更多
关键词 Wireless Sensor Networks Key Management Exclusion Basis Systems One-way Hash Chain
下载PDF
Critical safe distance design to improve driving safety based on vehicle-to-vehicle communications 被引量:5
6
作者 陈晨 吕宁 +2 位作者 刘雷 裴庆祺 李晓记 《Journal of Central South University》 SCIE EI CAS 2013年第11期3334-3344,共11页
A critical safe distance(CSD)model in V2V(vehicle-to-vehicle)communication systems was proposed to primarily enhance driving safety by disseminating warning notifications to vehicles when they approach calculated CSD.... A critical safe distance(CSD)model in V2V(vehicle-to-vehicle)communication systems was proposed to primarily enhance driving safety by disseminating warning notifications to vehicles when they approach calculated CSD.By elaborately analyzing the vehicular movement features especially when braking,our CSD definition was introduced and its configuration method was given through dividing radio range into different communication zones.Based on our definition,the needed message propagation delay was also derived which could be used to control the beacon frequency or duration.Next,the detailed CSD expressions were proposed in different mobility scenarios by fully considering the relative movement status between the front and rear vehicles.Numerical results show that our proposed model could provide reasonable CSD under different movement scenarios which eliminates the unnecessary reserved inter-vehicle distance and guarantee the safety at the same time.The compared time-headway model always shows a smaller CSD due to focusing on traffic efficiency whereas the traditional braking model generally outputs a larger CSD because it assumes that the following car drives with a constant speed and did not discuss the scenario when the leading car suddenly stops.Different from these two models,our proposed model could well balances the requirements between driving safety and traffic throughput efficiency by generating a CSD in between the values of the two models in most cases. 展开更多
关键词 vehicle-to-vehicle communication systems collsion avoidance saftey distance
下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
7
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security Trusted Computing Direct Anonymous Attestation Trusted Domain.
下载PDF
Secure Communication Based on Quantum Key 被引量:1
8
作者 SONG Jie XIA Yan SONG He-Shan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第3期635-638,共4页
We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the... We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient. 展开更多
关键词 secure communication EPR pairs unitary operation
下载PDF
Henon CSK Secure Communication System Using Chaotic Turbo Codes 被引量:1
9
作者 周小林 Song +4 位作者 Wentao Liu Jianbo Luo Hanwen 《High Technology Letters》 EI CAS 2002年第3期48-51,共4页
In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. S... In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system. 展开更多
关键词 chaotic secure communication Henon CSK modulation/demodulation chaotic turbo codes
下载PDF
ESSA: An Efficient and Secure Splitting Algorithm for Distributed Storage Systems
10
作者 CHEN Zhao YAO Wenbin XIAO Da WU Chunhua LIU Jianyi WANG Cong 《China Communications》 SCIE CSCD 2010年第4期89-95,共7页
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente... The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing. 展开更多
关键词 Distributed System Secure Storage Information Dispersal knight's tour problem
下载PDF
Authenticated Key Agreement Protocol
11
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
下载PDF
Formal verification of safety protocol in train control system 被引量:6
12
作者 ZHANG Yan TANG Tao +4 位作者 LI KePing MERA Jose Manuel ZHU Li ZHAO Lin XU TianHua 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第11期3078-3090,共13页
In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the sa... In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the safety protocols may be formidable due to the system complexity.In this paper,interface automata(IA) are used to describe the safety service interface behaviors of safety communication protocol.A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN.A case study of using this method to describe and verify a safety communication protocol is included.The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks,livelocks and several mandatory consistency properties.A prototype of safety protocols is also developed based on the presented formally verifying method. 展开更多
关键词 train control system safety communication protocol interface automata VERIFICATION
原文传递
The European New Car Assessment Programme: A historical review 被引量:4
13
作者 Michiel van Ratingen Aled Williams +5 位作者 Anders Lie Andre Seeck Pierre Castaing Reinhard Kolke Guido Adriaenssens Andrew Miller 《Chinese Journal of Traumatology》 CAS CSCD 2016年第2期63-69,共7页
Established in 1997, the European New Car Assessment Programme (Euro NCAP) provides consumers with a safety performance assessment for the majority of the most popular cars in Europe. Thanks to its rigorous crash te... Established in 1997, the European New Car Assessment Programme (Euro NCAP) provides consumers with a safety performance assessment for the majority of the most popular cars in Europe. Thanks to its rigorous crash tests, Euro NCAP has rapidly become an important driver safety improvement to new cars. After ten years of rating vehicles, Euro NCAP felt that a change was necessary to stay in tune with rapidly emerging driver assistance and crash avoidance systems and to respond to shifting priorities in road safety. A new overall rating system was introduced that combines the most important aspects of vehicle safety under a single star rating. The overall rating system has allowed Euro NCAP to continue to push for better fitment and higher performance for vehicles sold on the European market. In the coming years, the safety rating is expected to play an important role in the support of the roll-out of highly automated vehicles. 展开更多
关键词 European New Car Assessment ProgrammeVehicle safetySafety ratingCrash testing
原文传递
Relationship between religion and school students' road behavior in southern Iran
14
作者 Reza Tabrizi Maryam Akbari +8 位作者 Kamran B. Lankarani Seyed Taghi Heydari Alireza Masoudi Amir Hossein Shams Armin Akbarzadeh Saba Moalemi Maryam Mahmoodi Mehr Abroad Kalateh Sadati Payam Peymani 《Chinese Journal of Traumatology》 CAS CSCD 2017年第5期264-269,共6页
Purpose: Unsafe behaviors are an important cause of accidents in adolescent age groups. This study was designed to examine the behaviors of adolescent pedestrians in southern Iran. Methods: This is a descriptive ana... Purpose: Unsafe behaviors are an important cause of accidents in adolescent age groups. This study was designed to examine the behaviors of adolescent pedestrians in southern Iran. Methods: This is a descriptive analytical cross-sectional study. The study population consisted of high school students in Shiraz, capital city of Fars Province, Iran. Five hundred and sixteen students were selected by multi-stage sampling. Data were collected by the use of three questionnaires, which included Persian copies of adolescent road user behavior questionnaire (ARBQ), Duke University Religious Index (DUREL), as well as the context and independent variables questionnaire. Results: The results showed that a decrease in dangerous behaviors on the road resulted in an increase in respondents' intrinsic religiosity. Also, engagement in unsafe crossing behavior in the road decreased with increasing respondents' intrinsic religiosity. Another finding showed that female students were less involved in dangerous play and planned protective behaviors on the road. Conclusion: Findings clearly indicate that intrinsic religiosity has a significant role in reducing the risky road behaviors of students. Hence, religion may improve road safety in school students' road behavior in Iran. 展开更多
关键词 Religion Traffic accidents Road behaviors Students
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部