期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
官不在大,有签字权则灵
1
作者 杜建明 《四川财政》 1995年第12期70-70,共1页
官不在大,有签字权则灵现在有人根据“山不在高,有仙则灵;水不在深,有龙则及”这句活演绎出“官不在大,有签字权则灵”;初次听到觉得有点道理,细细想家却意义深刻。这实际上反映了人民群众对有权之士的忠告:要让用手中之权,要... 官不在大,有签字权则灵现在有人根据“山不在高,有仙则灵;水不在深,有龙则及”这句活演绎出“官不在大,有签字权则灵”;初次听到觉得有点道理,细细想家却意义深刻。这实际上反映了人民群众对有权之士的忠告:要让用手中之权,要用好手中之权。当前.无论是行政机关... 展开更多
关键词 签字 旺苍县 综合素质 正确行使 签字机 人失误 难得糊涂 人民群众 字频率 所有制
下载PDF
Security of Application System 被引量:1
2
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
Forward-Secure Blind Signature Schemes Based on the Variants of EIGamal
3
作者 LIU Yali QIN Xiaolin LI Bohan 《China Communications》 SCIE CSCD 2010年第4期58-64,共7页
Due to forward-secure-digital-signature's capability of effectively reducing loss caused by exposure of secret keys and significant in-application benefits of blind signature aiming at protecting senders' privacy, t... Due to forward-secure-digital-signature's capability of effectively reducing loss caused by exposure of secret keys and significant in-application benefits of blind signature aiming at protecting senders' privacy, they have been hot spots for decades in the field of cryptography. Illuminated by the integration of forward secure digital signature and blind signature, based on the variants of E1Gamal and assumption of difficulty in solving the discrete logarithm problem in galois field, a forward-secure weak blind signature scheme and a forward-secure strong blind signature scheme are proposed and their security is analyzed thoroughly in this paper. It turns out that forward security, blindness and aptitude of resisting forging attack demonstrated by these two schemes benefit a lot theoretically and practically. 展开更多
关键词 Forward-secure Blind Signature ElGamal Signature Scheme
下载PDF
Signature Verification for Multiuser Online Kanji Learning System
4
作者 Jungpil Shin Junichi Sato 《Computer Technology and Application》 2012年第3期211-218,共8页
Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' res... Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system. 展开更多
关键词 Signature verification character learning method dynamic programming.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部