Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies...Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.展开更多
By using GDS dynamic hollow cylinder torsional apparatus, a series of cyclic torsional triaxial tests under complex initial consolidation condition are performed on Nanjing saturated fine sand. The effects of the init...By using GDS dynamic hollow cylinder torsional apparatus, a series of cyclic torsional triaxial tests under complex initial consolidation condition are performed on Nanjing saturated fine sand. The effects of the initial principal stress direction αo, the initial ratio of deviatoric stress η0, the initial average effective principal stress Po and the initial intermediate principal stress parameter b0 on the threshold shear strain γt of Nanjing saturated fine sand are then systematically investigated. The results show that γt increases as η0,p0 and b0 increase respectively, while the other three parameters remain constant. ao has a great influence on γt, which is reduced when ao increases from 0° to 45°and increased when α0 increases from 45° to 90°. The effect of α0 on γt, plays a leading role and the effect of η0 will weaken when ao is approximately 45°.展开更多
Along with the continuous development of the society, there are increasingly more marketing tools, but the role of posters in advertisement should be never ignored in any marketing methods. Regardless of all marketing...Along with the continuous development of the society, there are increasingly more marketing tools, but the role of posters in advertisement should be never ignored in any marketing methods. Regardless of all marketing methods changes, the role of posters has been contained in all sorts of marketing ideas, an also posters play a very important role in marketing ideas. Along with the progress of the times, the forms and contents of posters are in constant changes. In this paper, the application of traditional culture elements to poster design is mainly discussed.展开更多
With the rapid development of information networks and the overall development of e-commerce, online marketing has continued to assault the traditional business marketing model and methods of operation, and it makes g...With the rapid development of information networks and the overall development of e-commerce, online marketing has continued to assault the traditional business marketing model and methods of operation, and it makes great effects on existing business concepts and ideas from different angles and levels. For these weaker small and medium-sized enterprises, network marketing with its low cost, wide range of applications, the effect of strong natural advantages becomes marketing approach of small and medium-sized enterprises which they can hold up and afford, which also provides unprecedented opportunity for small and medium-sized enterprises to have the opportunity to compete with large-scale enterprises on the same stage.展开更多
The aim of this paper is to empirically research the use of Web 2.0 applications in the communication strategies of wine tourism destinations of excellence; main attention will be focused on the integration of these t...The aim of this paper is to empirically research the use of Web 2.0 applications in the communication strategies of wine tourism destinations of excellence; main attention will be focused on the integration of these tools within the "official" destination websites. The main research questions are: (1) Do wine tourism destinations of excellence worldwide make use of Web 2.0 tools in their official websites? (2) Is it possible to estimate the degree of intensity of use of such tools? The method used for the purpose of this research is inductive: starting from the observation of some specific cases we wanted to implement a scoring model that, taking into account the presence and intensity of the use of Web 2.0 tools selected by the wine tourism destinations of excellence, could be replicated in different contexts from the one analyzed here. The study reveals the interest in the tools of Web 2.0 by the institutional bodies responsible for management of destinations; however it also shows that there is not a full awareness of the scope of strategic and organizational development in the web 2.0 applications resulting in the relationship with potential visitors and those who have already experienced a tourist territory.展开更多
As a result of computer invention, especially the internet, changes have occurred in all walks of life in the global era including the marketing communication strategies which are inseparable parts of marketing and bu...As a result of computer invention, especially the internet, changes have occurred in all walks of life in the global era including the marketing communication strategies which are inseparable parts of marketing and business. This intensifies the role of marketing communication in achieving business goals. Furthermore, the established and successful philosophy, strategy, technique, and theories of marketing communication in the past are now outdated and unfit for achieving wanted business goals in this information technology era. Besides, information technology inventions have changed people's lifestyle especially the global consumer attitude which is responsible for the commotion in today's implementation of global marketing communications strategies. This paper examines the implementation of ideas that are considered responsive to the changes of conditions in the past three decades and the future which are completely different with the past development and implementations. This paper illustrates the changes that have occurred in the implementation of integrated marketing communications studies. This paper supports the assumption that integrated marketing communications is considered the business strategy that is able to overcome the present and future global market era challenges展开更多
Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the ac...Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the actual domestic fashion industry environment, ideal model that could quickly respond to the market's changes is proposed which includes naming brand, target-market position, circumstances analysis and popularity anticipation, brand concept and style setting, fashion design, fashion category component, and sale strategy.展开更多
With the rapid development of Chinese economy and improvement of people's living standard, cruise tourism, as a new way of leisure tourism is gradually into the Chinese market. This paper firstly describes the curren...With the rapid development of Chinese economy and improvement of people's living standard, cruise tourism, as a new way of leisure tourism is gradually into the Chinese market. This paper firstly describes the current situation of the cruise tourism in China. Then it studies the problems of cruise tourism marketing. Finally, it gives the solution to the problem. It is great significance to improve the market penetration rate and promote the rapid development of cruise tourism in China.展开更多
The purpose of this paper falls within the theoretical framework of green marketing. It investigates the relationships that exist between the motives relating to aquacultural products marketed under the private label ...The purpose of this paper falls within the theoretical framework of green marketing. It investigates the relationships that exist between the motives relating to aquacultural products marketed under the private label of a traditional retailer (Coop), the attitude towards their purchase, the perception of their quality, their reliability and the willingness to pay for them. Particular importance is given to the green motives, those that lead to a preference for a product made with specific renewable energies such as biogas. The structural equation models (SEM) technique is used to develop propositions representing a theoretical approach to the integration of green marketing, in the context of the process for purchasing Coop brand fish. With regard to distinguishing between the motives, we referred to the approach that sets out three different types of motive: clean, green and ethical. The resulting managerial implications make it possible to assess how much the different types of motive influence the choices of the consumers. Managers will benefit from the results of this paper by understanding better the benefits for consumers of aquacultural products from renewable energy such as biogas. The originality of the paper lies in its focusing on green purchase behaviour in a poorly investigated sector such as that of fish breeding. The paper contributes to an understanding of the factors that influence environmentally responsible purchase behaviour and their exact relationships, that are still unclear in literature. The fact that environmental issues and concerns are constantly changing implies that ongoing research into their influence on consumer behaviour is essential展开更多
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key...A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation.展开更多
The purpose of this article is to present an additional overloading assessment scheme to the current protection scheme, which can be applied in the low voltage distribution network to prevent overloading of network as...The purpose of this article is to present an additional overloading assessment scheme to the current protection scheme, which can be applied in the low voltage distribution network to prevent overloading of network assets. As higher penetration of distributed generators is envisioned among distribution networks, the network operators will have an challenging task in the future to maintain the reliability and quality of supply. The distribution networks are going to be challenged simultaneously by increasing penetration of distributed generators and by increasing loading (inter alia heat pumps, air conditioners or electric vehicles), which will change the operational perspective of the future distribution networks. Presented simulation results show that the increasing penetration of those appliances can jeopardize the functionality of current protection scheme in distribution networks. Therefore, an additional scheme for assessment of network overloading applicable at low voltage distribution networks is proposed and the application of this scheme, supported by smart metering infrastructure, is demonstrated in a case study. The proposed overloading assessment scheme should help the network operators to increase the flexibility of distribution networks, their hosting capacity, safety and reliability.展开更多
In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based struct...In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based structure is proposed, as Mu-Vmdharajan's scheme cannot securely remove subscribers with data redundancy. In the proposed scheme, we employ polynomial function and filter functions as the basic means of constructing broadcast encryption procedure in order to reduce computation and shortage overhead. Compared with existing schemes, our scheme requires low computation, corrmaunication and storage over- heads in receivers and can support the dynamics of the privileged users. Furthermore, our scheme can avoid n^assive message to exchange for estab-fishing the decryption key between members of the cluster. The analysis of security and perforrmnce shows that our scheme is more secure than Mu- Vmdharajan's scheme and has the same speed of encryption and decryption as theirs. So our scheme is particularly suitable for the devices with low power setting such as ad hoc networks.展开更多
基金supported by the NSFC(61173141,U1536206,61232016, U1405254,61373133,61502242,61572258)BK20150925+3 种基金Fund of Jiangsu Engineering Center of Network Monitoring(KJR1402)Fund of MOE Internet Innovation Platform(KJRP1403)CICAEETthe PAPD fund
文摘Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.
基金supported by the Key Research Project of National Natural Science Foundation of China under grant No. 90715018the Special Fund for the Commonweal Industry of China under grant No. 200808022the Key Basic Research Program of Natural Science of University in Jiangsu Province under grant No. 08KJA560001
文摘By using GDS dynamic hollow cylinder torsional apparatus, a series of cyclic torsional triaxial tests under complex initial consolidation condition are performed on Nanjing saturated fine sand. The effects of the initial principal stress direction αo, the initial ratio of deviatoric stress η0, the initial average effective principal stress Po and the initial intermediate principal stress parameter b0 on the threshold shear strain γt of Nanjing saturated fine sand are then systematically investigated. The results show that γt increases as η0,p0 and b0 increase respectively, while the other three parameters remain constant. ao has a great influence on γt, which is reduced when ao increases from 0° to 45°and increased when α0 increases from 45° to 90°. The effect of α0 on γt, plays a leading role and the effect of η0 will weaken when ao is approximately 45°.
文摘Along with the continuous development of the society, there are increasingly more marketing tools, but the role of posters in advertisement should be never ignored in any marketing methods. Regardless of all marketing methods changes, the role of posters has been contained in all sorts of marketing ideas, an also posters play a very important role in marketing ideas. Along with the progress of the times, the forms and contents of posters are in constant changes. In this paper, the application of traditional culture elements to poster design is mainly discussed.
文摘With the rapid development of information networks and the overall development of e-commerce, online marketing has continued to assault the traditional business marketing model and methods of operation, and it makes great effects on existing business concepts and ideas from different angles and levels. For these weaker small and medium-sized enterprises, network marketing with its low cost, wide range of applications, the effect of strong natural advantages becomes marketing approach of small and medium-sized enterprises which they can hold up and afford, which also provides unprecedented opportunity for small and medium-sized enterprises to have the opportunity to compete with large-scale enterprises on the same stage.
文摘The aim of this paper is to empirically research the use of Web 2.0 applications in the communication strategies of wine tourism destinations of excellence; main attention will be focused on the integration of these tools within the "official" destination websites. The main research questions are: (1) Do wine tourism destinations of excellence worldwide make use of Web 2.0 tools in their official websites? (2) Is it possible to estimate the degree of intensity of use of such tools? The method used for the purpose of this research is inductive: starting from the observation of some specific cases we wanted to implement a scoring model that, taking into account the presence and intensity of the use of Web 2.0 tools selected by the wine tourism destinations of excellence, could be replicated in different contexts from the one analyzed here. The study reveals the interest in the tools of Web 2.0 by the institutional bodies responsible for management of destinations; however it also shows that there is not a full awareness of the scope of strategic and organizational development in the web 2.0 applications resulting in the relationship with potential visitors and those who have already experienced a tourist territory.
文摘As a result of computer invention, especially the internet, changes have occurred in all walks of life in the global era including the marketing communication strategies which are inseparable parts of marketing and business. This intensifies the role of marketing communication in achieving business goals. Furthermore, the established and successful philosophy, strategy, technique, and theories of marketing communication in the past are now outdated and unfit for achieving wanted business goals in this information technology era. Besides, information technology inventions have changed people's lifestyle especially the global consumer attitude which is responsible for the commotion in today's implementation of global marketing communications strategies. This paper examines the implementation of ideas that are considered responsive to the changes of conditions in the past three decades and the future which are completely different with the past development and implementations. This paper illustrates the changes that have occurred in the implementation of integrated marketing communications studies. This paper supports the assumption that integrated marketing communications is considered the business strategy that is able to overcome the present and future global market era challenges
基金the national education ministry key research project 02107.
文摘Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the actual domestic fashion industry environment, ideal model that could quickly respond to the market's changes is proposed which includes naming brand, target-market position, circumstances analysis and popularity anticipation, brand concept and style setting, fashion design, fashion category component, and sale strategy.
文摘With the rapid development of Chinese economy and improvement of people's living standard, cruise tourism, as a new way of leisure tourism is gradually into the Chinese market. This paper firstly describes the current situation of the cruise tourism in China. Then it studies the problems of cruise tourism marketing. Finally, it gives the solution to the problem. It is great significance to improve the market penetration rate and promote the rapid development of cruise tourism in China.
文摘The purpose of this paper falls within the theoretical framework of green marketing. It investigates the relationships that exist between the motives relating to aquacultural products marketed under the private label of a traditional retailer (Coop), the attitude towards their purchase, the perception of their quality, their reliability and the willingness to pay for them. Particular importance is given to the green motives, those that lead to a preference for a product made with specific renewable energies such as biogas. The structural equation models (SEM) technique is used to develop propositions representing a theoretical approach to the integration of green marketing, in the context of the process for purchasing Coop brand fish. With regard to distinguishing between the motives, we referred to the approach that sets out three different types of motive: clean, green and ethical. The resulting managerial implications make it possible to assess how much the different types of motive influence the choices of the consumers. Managers will benefit from the results of this paper by understanding better the benefits for consumers of aquacultural products from renewable energy such as biogas. The originality of the paper lies in its focusing on green purchase behaviour in a poorly investigated sector such as that of fish breeding. The paper contributes to an understanding of the factors that influence environmentally responsible purchase behaviour and their exact relationships, that are still unclear in literature. The fact that environmental issues and concerns are constantly changing implies that ongoing research into their influence on consumer behaviour is essential
文摘A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation.
文摘The purpose of this article is to present an additional overloading assessment scheme to the current protection scheme, which can be applied in the low voltage distribution network to prevent overloading of network assets. As higher penetration of distributed generators is envisioned among distribution networks, the network operators will have an challenging task in the future to maintain the reliability and quality of supply. The distribution networks are going to be challenged simultaneously by increasing penetration of distributed generators and by increasing loading (inter alia heat pumps, air conditioners or electric vehicles), which will change the operational perspective of the future distribution networks. Presented simulation results show that the increasing penetration of those appliances can jeopardize the functionality of current protection scheme in distribution networks. Therefore, an additional scheme for assessment of network overloading applicable at low voltage distribution networks is proposed and the application of this scheme, supported by smart metering infrastructure, is demonstrated in a case study. The proposed overloading assessment scheme should help the network operators to increase the flexibility of distribution networks, their hosting capacity, safety and reliability.
基金This paper was supported in part by the National Natural Sci-ence Foundation of China under Crant No.61070164 the Science and Technology Planning Project of Guangdong Province, China under Crants No. 201013010600025, No. 2010A032000002 the Nat-ural Science Foundation of Guangdong Province, China under Ca-ant No. 815106 32010000022.
文摘In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based structure is proposed, as Mu-Vmdharajan's scheme cannot securely remove subscribers with data redundancy. In the proposed scheme, we employ polynomial function and filter functions as the basic means of constructing broadcast encryption procedure in order to reduce computation and shortage overhead. Compared with existing schemes, our scheme requires low computation, corrmaunication and storage over- heads in receivers and can support the dynamics of the privileged users. Furthermore, our scheme can avoid n^assive message to exchange for estab-fishing the decryption key between members of the cluster. The analysis of security and perforrmnce shows that our scheme is more secure than Mu- Vmdharajan's scheme and has the same speed of encryption and decryption as theirs. So our scheme is particularly suitable for the devices with low power setting such as ad hoc networks.