期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
语言学视角下沁水方言中“圪”头词的形式与传承研究
1
作者 胡沙沙 樊思凡 《成才之路》 2020年第26期40-42,共3页
晋语是指山西及毗连地区有入声的声音,沁水城东方言则隶属于晋语上党片,在语音、词汇、语法上都有其独特的一面,如“圪”字的使用。在沁水方言中,“圪”字的使用频率非常高。文章基于语言学视角,选取晋语中的沁水方言,从沁水方言中“圪... 晋语是指山西及毗连地区有入声的声音,沁水城东方言则隶属于晋语上党片,在语音、词汇、语法上都有其独特的一面,如“圪”字的使用。在沁水方言中,“圪”字的使用频率非常高。文章基于语言学视角,选取晋语中的沁水方言,从沁水方言中“圪”头词的构词形式出发,通过列举一些具体的“圪”头词,分析“圪”头词中“圪”的意义,并简要陈述“圪”头词的存在及其对保护传承方言的意义,提出保护方言的建议和策略。 展开更多
关键词 沁水方言 “圪”头词 方言安全 形式 传承
下载PDF
Semantics-Based Compliance An a lys is o f N e two rk S e cu rity Policy Hie ra rch ie s 被引量:1
2
作者 Yao Shan Xia Chunhe +2 位作者 Hu Junshun Jiao Jian Li Xiaojian 《China Communications》 SCIE CSCD 2012年第7期22-35,共14页
Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect... Network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflects the validity of the policy hierarchies yielded by the automated policy refinement process. However, little attention has been paid to the evaluation of the compliance between the derived lower level policy and the higher level policy. We present an ontology based on Ontology Web Language (OWL) to describe the semantics of security policy and their implementation. We also propose a method of estimating the semantic similarity between a given 展开更多
关键词 policy refinement network security policy semantic similarity ontology
下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
3
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部