期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
A NEW ANONYMITY CONTROLLED E-CASH SCHEME 被引量:1
1
作者 Zhang Fangguo Wang Changjie Wang Yumin (Key Lab. on ISN, Xidian Univ., Xi’an, 710071) 《Journal of Electronics(China)》 2002年第4期369-374,共6页
E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) ... E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented. 展开更多
关键词 E-CASH Anonymity control One-time key pairs digital signature ECC
下载PDF
Atomic and anonymous e-Cash transaction protocol with off-line TTP
2
作者 王茜 李朝阳 杨德礼 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第5期558-563,共6页
Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an ... Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest participants, but also features high efficiency and practicability. The new protocol also avoids transaction from an ambiguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction protocol. 展开更多
关键词 E-CASH ATOMICITY ANONYMITY security electronic commerce
下载PDF
Cryptanalysis of Threshold-proxy Threshold-signature Schemes 被引量:1
3
作者 HAN Jin-guang KANG Bao-yuan 《Chinese Quarterly Journal of Mathematics》 CSCD 2010年第3期459-463,共5页
Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then onl... Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can cooperatively generate threshold-proxy threshold-signature.In this scheme,they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers.However,in this paper,we will give a attack to show that their scheme can not resist impersonation attacks. 展开更多
关键词 CRYPTANALYSIS impersonate attacks threshold-proxy threshold-signature
下载PDF
Genetic Similarity Analysis of Hunan Rice Landraces with Same or Similar Name in Household and Genebank Conservations
4
作者 JIN Jian-chu LI Xiao-xiang +7 位作者 LI Yong-chao PAN Xiao-wu LIU Wen-qiang DUAN Yong-hong YU Ya-ying SHENG Xin-nian ZHAO Wen-jin WEI Xiu-cai 《Agricultural Science & Technology》 CAS 2018年第3期9-20,共12页
This study was conducted to analyze the phenotypic and genotypic similarity or diversity of rice (Oryza sativa L.) landraces in household and hypothermic genebank conservations in Hunan Province and identify the gen... This study was conducted to analyze the phenotypic and genotypic similarity or diversity of rice (Oryza sativa L.) landraces in household and hypothermic genebank conservations in Hunan Province and identify the genetic distance between the rice landraces with the same or similar names. A total of 92 accessions of rice landraces were divided into seven groups according to their local names, but the morphological traits showed large variations even within the same group as well as between household and genebank conservations. The SSR marker analysis showed that, in all the groups except Group E, the allelic variations within each subgroup of the household conservation were less than those of the genebank conservation, indicating the household-conserved rice landraces’ many-generation purifcation from natural and artifcial selections in the process of their cultivation year after year; and the similarity coeffcient among the household rice landraces was the highest except for Groups C and E. Thus, the study suggested that the same-name or similar-name rice resources retained by farmers would be valuable for collection and evaluation. 展开更多
关键词 Rice Rice landrace with same or similar name SSR marker Phenotypic trait Genetic similarity
下载PDF
The Avenue of Sphinxes: Restoration of a Legend
5
作者 Adham Abulnour 《Journal of Civil Engineering and Architecture》 2014年第8期952-962,共11页
The redevelopment of historic cities is often challenged by intricate--and in many cases contradictory--missions. From one side, there is the urge to comprehensively preserve cultural resources. At the same time, oppo... The redevelopment of historic cities is often challenged by intricate--and in many cases contradictory--missions. From one side, there is the urge to comprehensively preserve cultural resources. At the same time, opportunities of economic growth should be made available and needs of contemporary living maintained and nourished. The main aim of this paper is to reconcile probable incompatibilities between such missions through promoting "sensitive" redevelopment approaches in historic cities. The paper focuses on the city of Luxor, Egypt with its immensely capturing yet quite undermined legend: the Avenue of Sphinxes. In Luxor, the injection of nonintrusive interventions presents itself as a highly potential candidate in protecting and enhancing the experience of the avenue while meeting contemporary needs of living. Adopting less sensitive development approaches can lead the quality of experiencing the whole city to be worsened for the increasing numbers of tourists and locals. 展开更多
关键词 Noninvasive interventions image of the city sense of place SELECTIVITY RESPONSIVENESS
下载PDF
《教师教育研究》征订
6
《教师教育研究》 CSSCI 北大核心 2019年第3期130-130,共1页
倡导学术创新促进学术交流提高学术水平《教师教育研究》(原《高等师范教育研究》)为全国性教育科学学术刊物,于1989年创办,于2003年11月更为现名,我国著名教育家顾明远任主编。《教师教育研究》为'全国中文核心期刊'、'全... 倡导学术创新促进学术交流提高学术水平《教师教育研究》(原《高等师范教育研究》)为全国性教育科学学术刊物,于1989年创办,于2003年11月更为现名,我国著名教育家顾明远任主编。《教师教育研究》为'全国中文核心期刊'、'全国教育类核心期刊'及'CSSCI'来源期刊. 展开更多
关键词 教育 期刊 教师 全国 研究 现名 学术
原文传递
《教师教育研究》征订
7
《教师教育研究》 CSSCI 北大核心 2019年第4期130-130,共1页
倡导学术创新·促进学术交流·提高学术水平《教师教育研究》(原《高等师范教育研究》)为全国性教育科学学术刊物,于1989年创办,于2003年11月更为现名,我国著名教育家顾明远任主编。
关键词 教育家 教育 现名 教师 研究 学术 学术刊物
原文传递
Anonymous-address-resolution model
8
作者 Guang-jia SONG Zhen-zhou JI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第10期1044-1055,共12页
Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditio... Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node, The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery. 展开更多
关键词 Network security Address resolution Neighbor discovery ANONYMOUS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部