期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
浅析民事诉讼中的当庭认证
1
作者 耿德忠 《昌吉学院学报》 2002年第2期25-27,共3页
当庭认证是当前民事审判方式改革庭审中的关健环节,但是有些法官受传统审判模式的影响,不知何时认证,如何认证,甚至不敢当庭认证,严重地阻碍了审判方式改革的进一步深入。笔者现从审判实践出发,论述了当庭认证的必要性,对于当庭认证的... 当庭认证是当前民事审判方式改革庭审中的关健环节,但是有些法官受传统审判模式的影响,不知何时认证,如何认证,甚至不敢当庭认证,严重地阻碍了审判方式改革的进一步深入。笔者现从审判实践出发,论述了当庭认证的必要性,对于当庭认证的时机把握、认证的规则以及认证的方法等方面作了些探讨,对于当前的庭审改革具有一定的规范作用。 展开更多
关键词 民事诉讼 当庭认证 庭审改革 认证规则 审制方式 证认方法 最佳证据规则
下载PDF
Formal analysis of robust email protocol based on authentication tests 被引量:1
2
作者 蒋睿 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期147-151,共5页
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m... Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy. 展开更多
关键词 email protocol authentication tests formal method perfect forward secrecy strand space model
下载PDF
Ecotourism certification and its progress in China 被引量:1
3
作者 Zhong Linshen Xie Ting Ding Peiyi 《Ecological Economy》 2007年第3期322-328,共7页
Since the middle 1990s, ecotourism certification has been given more and more attention to around the world.As a developing country with abundant ecotourism products, it is necessary for China to adopt certification t... Since the middle 1990s, ecotourism certification has been given more and more attention to around the world.As a developing country with abundant ecotourism products, it is necessary for China to adopt certification to ensuresustainable development of ecotourism. But there are few products certificated until now in China. After reviewing thetrend of ecotourism certification in the world and summarizing its theory and method, this paper analyzes the progressand prospect of ecotourism certification in China, and concludes that certification in China is necessary and promising. 展开更多
关键词 Ecotourism certification THEORY METHOD PROGRESS PROSPECT China
下载PDF
Food Physics and Food Safety- Some Aspects in Food Processing and Food Quality Control 被引量:1
4
作者 Andras S. Szabo Peter Laszlo 《Journal of Life Sciences》 2010年第7期58-60,共3页
The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has... The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has developed significantly in the last 2 decades, so today the production and processing of safe and quality food is of primary importance. Modem food production is based on principles of GAP and GMP (including GHP) and different methods and tools for quality control and assurance (IFS, HACCP, ISO-9000, ISO-9000/2010, ISO-22000, TQM). There are different techniques and methods to produce safe food and to control the quality of the foodstuffs. The modem, up-to-date technologies and measurement techniques involve the application of many physical methods - high pressure, pulsing electrical field, microwave, non-destructive techniques (e.g., INAA, NMR, NIR-NIT, PAS), radiation treatments as well. Using radiation technologies (of course not only nuclear ones) it is possible to fulfil some very important expectations of modem food processing, e.g., decrease of microbial contamination, improvement of sensory properties, increase of storability of food products. 展开更多
关键词 Food physics food processing food quality quality assurance radiation methods safety.
下载PDF
Authenticated Key Agreement Protocol
5
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
下载PDF
A multiple watermarks algorithm for image content authentication
6
作者 蔡立军 李睿 易叶青 《Journal of Central South University》 SCIE EI CAS 2012年第10期2866-2874,共9页
A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that... A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm. 展开更多
关键词 multiple watermarks cooperation authentication wavelet transform image wavelet domain intentional contenttampering incidental modification
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部