期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
CA安全认证系统自安全性的研究与实现 被引量:2
1
作者 汤建忠 顾华江 沈瑾 《计算机工程与设计》 CSCD 北大核心 2009年第18期4231-4234,共4页
为提高CA(certification authority)安全认证系统的自身安全性,提出了从物理安全和环境安全、CA系统核心组件安全、证书管理安全和系统安全审计等方面入手,从而构建一个行业级的CA安全认证系统。通过CA自身安全的加强,避免由于自身系统... 为提高CA(certification authority)安全认证系统的自身安全性,提出了从物理安全和环境安全、CA系统核心组件安全、证书管理安全和系统安全审计等方面入手,从而构建一个行业级的CA安全认证系统。通过CA自身安全的加强,避免由于自身系统的脆弱性而产生的风险,有效地提高了整个CA系统的安全性、完整性和有效性,从而保证构建在CA系统上各个业务系统的正常运行。该方案在烟草某省实施后,实际运行结果表明该方案切实可行。 展开更多
关键词 CA系统 自安全性 安全认证 证书管理 安全审计
下载PDF
Characteristics and the Issue of Eco-safety for the Plant Biodiversity in Longtan Nature Reserve
2
作者 贾桂康 欧钟慧 《Agricultural Science & Technology》 CAS 2013年第7期1049-1052,共4页
The characteristic and status quo of plant biodiversity in Longtan Nature Reserve was evaluated from the three aspects of species diversity, genetic diversity and ecosystem dioversity. And the primary eco-safety influ... The characteristic and status quo of plant biodiversity in Longtan Nature Reserve was evaluated from the three aspects of species diversity, genetic diversity and ecosystem dioversity. And the primary eco-safety influencing factors for plant biodiversity in Longtan nature reserve were put forward. The results show that the plant species in Longtan Nature Reserve was abundant, including 2 821 species of vascular bundle plants belonging to 1029 genera, 205 families. The main problems influencing eco-safety included the destruction of endangered wild plants and exotic species invasion. 展开更多
关键词 Plant biodiversity Eco-safety Longtan Nature Reserve
下载PDF
Analysis and Comparison of Safety and Fatigue Comfort of Postal Bicycles Based on Finite Element Method and sEMG 被引量:5
3
作者 项忠霞 李亚南 +1 位作者 田冠 常振元 《Transactions of Tianjin University》 EI CAS 2013年第4期272-278,共7页
The safety and the fatigue comfort were compared between a domestic and a Japanese postal bicycle. Firstly, the fatigue comfort of these two kinds of bicycles was evaluated by surface electromyographic signal (sEMG) e... The safety and the fatigue comfort were compared between a domestic and a Japanese postal bicycle. Firstly, the fatigue comfort of these two kinds of bicycles was evaluated by surface electromyographic signal (sEMG) experiment, in which human lower limb muscle groups were research objects, and the average EMG (AEMG) index and median frequency (MF) were chosen as the evaluation indexes. Secondly, the safety of these two kinds of bicycle frames was analyzed and compared by using the finite element analysis. The results show that the riding fatigue comfort of the Japanese postal bicycle is better, and the Japanese postal bicycle frame is more safe and reasonable although both the postal bicycles meet the requirement for strength. Finally, based on the above analysis, the frame structure and related parameters of the domestic postal bicycle were improved with reference to the Japanese postal bicycle and biomechanics theory. 展开更多
关键词 postal bicycle surface electromyogram signal evaluation index fatigue comfort finite element analysis
下载PDF
LAPAROSCOPIC SURGERY IN PATIENTS WITH HYPOVOLEMIC SHOCK DUE TO ECTOPIC PREGNANCY 被引量:7
4
作者 Zhi-gangLi Jin-huaLeng +3 位作者 Jing-heLang Zhu-fengLiu Da-weiSun ZhuLan 《Chinese Medical Sciences Journal》 CAS CSCD 2005年第1期40-43, ,共4页
Objective To evaluate the feasibility and safety of operative laparoscopy for ectopic pregnancy with hypovolemic shock. Methods Two hundred and fifteen women with ectopic pregnancy underwent operative laparoscopy. The... Objective To evaluate the feasibility and safety of operative laparoscopy for ectopic pregnancy with hypovolemic shock. Methods Two hundred and fifteen women with ectopic pregnancy underwent operative laparoscopy. These patients were divided into two groups. The study group included 21 patients with shock and intraperitoneal hemorrhage more than 1000 mL, and control group included 194 patients, hemodynamically stable, with blood loss less than 1000 mL. Clinical data of perio-perative periods in two groups were retrospectively analyzed. Results All patients were tubal pregnancies. The occurrence rate of tubal rupture was higher in study group than in control group (80.95% vs. 15.98%, P < 0.001). Intraabdominal blood loss was significantly higher in study group than in control group (1900 mL vs. 300 mL, P < 0.001), and autologous blood transfusions were given to 95.24% and 9.3% of patients in study and control group, respectively (P < 0.001). Laparoscopic salpingectomy was performed on 85.7 % and 50.5% of patients in study and control group (P < 0.001). The operative time was somewhat longer in study group than that in control group (60 minutes vs. 45 minutes), but with no significant difference. All patients had no perioperative complications. Conclusion Operative laparoscopy in patients with hopovolemic shock can be safely and effectively performed by experi-enced laparoscopists with the aid of optimal anesthesia, advanced cardiovascular monitoring, and autologous blood transfusion. 展开更多
关键词 laparoscopic surgery ectopic pregnancy hypovolemic shock gynecologic surgical procedures
下载PDF
Feasibility and safety of autologous bone marrow mononuclear cell transplantation in patients with advanced chronic liver disease 被引量:22
5
作者 Andre Castro lyra Milena Botelho Pereira Soares +9 位作者 luiz Flavio Maia da Silva Marcos Fraga Fortes André Goyanna Pinheiro Silva Augusto César de Andrade Mota Sheilla A Oliveira Eduardo lorens Braga Wilson Andrade de Carvalho Bernd Genser Ricardo Ribeiro dos Santos luiz Guilherme Costa lyra 《World Journal of Gastroenterology》 SCIE CAS CSCD 2007年第7期1067-1073,共7页
AIM: To evaluate the safety and feasibility of bone marrow cell (BMC) transplantation in patients with chronic liver disease on the waiting list for liver transplantation. METHODS: Ten patients (eight males) wit... AIM: To evaluate the safety and feasibility of bone marrow cell (BMC) transplantation in patients with chronic liver disease on the waiting list for liver transplantation. METHODS: Ten patients (eight males) with chronic liver disease were enrolled to receive infusion of autologous bone marrow-derived cells. Seven patients were classified as Child-Pugh B and three as Child-Pugh C. Baseline assessment included complete clinical and laboratory evaluation and abdominal MRI. Approximately 50 mL of bone marrow aspirate was prepared by centrifugation in a ficoll-hypaque gradient. At least of 100 millions of mononuclear-enriched BMCs were infused into the hepatic artery using the routine technique for arterial chemoembolization for liver tumors. Patients were followed up for adverse events up to 4 mo. RESULTS: The median age of the patients was 52 years (range 24-70 years). All patients were discharged 48 h after BMC infusion. Two patients complained ofmild pain at the bone marrow needle puncture site. No other complications or specific side effects related to the procedure were observed. Bilirubin levels were lower at 1 (2.19 ± 0.9) and 4 mo (2.10 ± 1.0) after cell transplantation that baseline levels (238 ± 1.2). Albumin levels 4 mo after BMC infusion (3.73 ± 0.5) were higher than baseline levels (3.47 ± 0.5). International normalized ratio (INR) decreased from 1.48 (SD = 0.23) to 1.43 (SD = 0.23) one month after cell transplantation. CONCLUSION: BMC infusion into hepatic artery of patients with advanced chronic liver disease is safe and feasible. In addition, a decrease in mean serum bilirubin and INR levels and an increase in albumin levels are observed. Our data warrant further studies in order to evaluate the effect of BMC transplantation in patients with advanced chronic liver disease. 展开更多
关键词 Bone marrow Cell transplantation Liverfailure Stem cell CIRRHOSIS
下载PDF
Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement 被引量:4
6
作者 顾斌 黄余政 +1 位作者 方夏 陈玉林 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第10期659-663,共5页
We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be... We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal.The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently.Compared with other QSDC network protocols,our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information.Also,we discuss the security of our QSDC network protocol and its feasibility with current techniques. 展开更多
关键词 quantum secure direct communication NETWORK BIDIRECTIONAL hyperentanglement high capacity
下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
7
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
下载PDF
Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2
8
作者 Wu Qiuxin Zhang Miao 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app... Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. 展开更多
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure
下载PDF
The influence of autologous cytokine-induced killer cell treatment on the objective efficacy and safety of gefitinib in advanced non-small cell lung cancer
9
作者 Shuxian Qu Zhaozhe Liu +6 位作者 Zhendong Zheng Zhenyu Ding Tao Han Fang Guo Jianing Qiu Xiaodong Xie Dongchu Ma 《The Chinese-German Journal of Clinical Oncology》 CAS 2015年第2期69-72,共4页
Objective The aim of the study was to observe the influence of autologous cytokine-induced killer cell (CIK) treatment on the objective efficacy and safety of gefitinib in advanced non-small ceil lung cancer (NSCLC... Objective The aim of the study was to observe the influence of autologous cytokine-induced killer cell (CIK) treatment on the objective efficacy and safety of gefitinib in advanced non-small ceil lung cancer (NSCLC). Methods Sixty-six patients with NSCLC received gefitinib as second-line treatment. They were randomly divided into 2 groups, and informed consent forms were signed before grouping. Gefitinib was administrated to the control group, and autologous CIK treatment was added to the observation group. The objective treatment and adverse reactions were evaluated in both groups. Results The objective response rate (ORR) and the disease control rate (DCR) of the observation group were slightly higher than those of the control group, although no statistical differences were found between the 2 groups (P 〉 0.05). The incidences of diarrhea, fatigue, anorexia, oral ulcers, and myelosuppression in the observation group were much lower than those in the control group (P 〈 0.05). However, there were no statistical differences between the incidences of skin rash, and liver and kidney toxicities (P 〉 0.05). Conclusion Autologous CIK in combination with gefitinib is effective as second-line treatment fore ad- vanced NSCLC, and can significantly reduce adverse reactions and improve the objective efficacy. 展开更多
关键词 non-small cell lung cancer (NSCLC) GEFITINIB cytokine-induced killer (CIK) cell
下载PDF
Nanomedicine enables autophagy-enhanced cancer-cell ferroptosis 被引量:8
10
作者 Jiacai Yang Li Ding +4 位作者 Luodan Yu Yuemei Wang Min Ge Quzi Jiang Yu Chen 《Science Bulletin》 SCIE EI CSCD 2021年第5期464-477,M0004,共15页
Ferroptosis and autophagy, playing significant roles in tumor treatment, are two typical forms of the programmed cell death. However, the rational combination of ferroptosis and autophagy for synergistic tumor therapy... Ferroptosis and autophagy, playing significant roles in tumor treatment, are two typical forms of the programmed cell death. However, the rational combination of ferroptosis and autophagy for synergistic tumor therapy is still highly challenging. Herein, we report on an intriguing nanomedicine strategy for achieving autophagy-enhanced ferroptosis on efficiently combating cancer, which was based on the construction of trehalose-loaded mSiO_(2)@MnO_(x)-mPEG(Tre MMM) nanoparticles with satisfactory biocompatibility. The nanoparticles are endowed with high glutathione(GSH) consumption efficiency, thereby inducing cancer-cell ferroptosis via inactivating glutathione peroxidases 4(GPX4). Subsequently, the Tre MMM degradation due to the GSH depletion and p H sensitivity contributed to the trehalose release for inducing autophagy, promoting/enhancing ferroptosis by NCOA4-mediated degradation of ferritin.A substantial in vitro and in vivo antitumor effect was achieved by such an intriguing autophagyenhanced ferroptosis. Therefore, the rational combination of GSH-consumption-induced ferroptosis and trehalose-induced autophagy by nanomedicine design provides an alternative but effective strategy for tumor treatment. 展开更多
关键词 Manganese oxide Mesoporous silica TREHALOSE Ferroptosis AUTOPHAGY Tumor therapy
原文传递
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
11
作者 路献辉 来学嘉 何大可 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期90-93,共4页
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a... To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security are studied. This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps. These gaps are categorized, analyzed and measured. Finally the methods to bridge these gaps are described. This explains the existing design approaches and gives an intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions. 展开更多
关键词 public key encryption adaptive chosen ciphertext security intractable vroblem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部