The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However...The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.展开更多
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos...In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks.展开更多
The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being t...The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being transformed. A new approach focusing on "human security" principles based on freedom, dignity, justice, equality, solidarity, tolerance, and respect articulated in the millennium declaration is needed. Achieving this requires a more integrated, inclusive, and comprehensive development framework that is able to analyze and understand the context with its progress and setbacks. The paper realizes that measuring MDGs achievement does not only need a comprehensive integrated approach, but also a defmition of risks and challenges that the region faces. Issues like poverty, inequality, unemployment of graduates, personal and collective insecurity due to conflict, migration, and brain drain, food insecurity, and gender inequality are all issues that need to be redefined when analyzing the region to suit the context. The paper concludes that in order to understand the context, re-definition of concepts like poverty reduction, participation, and empowerment is needed to make concepts more relevant to the context. Lastly, the paper reflects the new call from youth for a new development model that is not based on market economy, ends political economy of the rentier states, and emphasizes a productive oriented economy that is able to generate employment and decent work. It also emphasizes democratic governance as an only path for a sustainable participatory development that can realize ambitions and aspirations of the majority of population.展开更多
This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to...This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority.展开更多
Linguistics classifies question methods into certain types. There are kinds of question methods, such as alternative question method, yes-no question method, specific question method, direct question method, indirect ...Linguistics classifies question methods into certain types. There are kinds of question methods, such as alternative question method, yes-no question method, specific question method, direct question method, indirect question method, echo question method, tag question method, miracle question method and so on. And this paper will set the characteristic discourses of protagonists in the drama of Antigone by the ancient Greek tragedian Sophocles as a research example, so as to analyze the protagonist's pragmatics motivation in the conversation strategies when communicating with three people in different social identity, that is to say, this paper will analyze the way that the selected question and answer methods used by the protagonist to achieve the effect of being recognized as king identity but not as a tyrant in fact. According to the dramatic text, this paper tends to make a further research on the characters' self-identity construction ground on the discourse characteristic of the characters. And from the perspective of modem linguistic, it is the analysis of the motivation in question methods, and the advantage and disadvantage on the discourse right implied in answer methods, that contribute to the further research on how the social identity construction and the classic character image are successfully made.展开更多
The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography ...The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed.展开更多
Noise from the machine on coal working face seriously influenced the miners' physical and mental health, and also, due to the noise, there may be a major hidden danger in safety from accidents as all safety warnin...Noise from the machine on coal working face seriously influenced the miners' physical and mental health, and also, due to the noise, there may be a major hidden danger in safety from accidents as all safety warning signals may be masked by the noise. This paper summarized the features of mine environmental noise on working face, such as the variety of noise sources, the continuity of high intensity and slow attenuation in narrow space, etc.The main projects about noise forecasting and controlling on working face was emphatically expounded;the development status about mines machinery noise mechanism and environmental noise acoustic characteristics of space-time of these main research topics were also introduced.展开更多
The operation of a complicated radiators structure creating a required field in a given area is disturbed often due to different external actions. As an example, the impact of metallic objects approaching off to an an...The operation of a complicated radiators structure creating a required field in a given area is disturbed often due to different external actions. As an example, the impact of metallic objects approaching off to an antenna system with minimal irradiation on user's body is analyzed. In this case, the zone itself, where the area of a weak field (a dark spot) is created, is generally not approachable for sensors installation. In order to counteract the disturbance of the system operation due to presence of different metallic objects in close proximity to the radiators, two methods based on two information sources are studied. These information sources are antennas driving currents and fields at a predetermined point outside the given area. As an example, the antenna system used in the compensation method for reducing human's body irradiation, to which a metal object approaches, is analyzed. The conditions of severe external actions are considered: a great metal body and a small distance from this body to the dark spot. It is shown that under these conditions of severe external actions the second method based on the field values measuring demonstrates a higher efficiency. A block scheme for structure of an automatic adjustment is suggested. The considered problem is a common one, and developers of radio circuits are faced with them constantly.展开更多
During the 100%front impact,all the parts of front car will participate in the course;the crash stiffness of bodywork will also reach the peak.During the crash,rational structure of bodywork can resist the distortion,...During the 100%front impact,all the parts of front car will participate in the course;the crash stiffness of bodywork will also reach the peak.During the crash,rational structure of bodywork can resist the distortion,absorb more energy and get better mode of distortion and low deceleration rate,so as to meet the performance of crash safety.The paper mainly makes optimization analysis based on the problems of front side rails,subframe,firewall,and optimization cases are confirmed which can decrease the intrusion and deceleration rate of the whole car.The structure of bodywork after optimization can meet the performance of crash safety.展开更多
Farmers are both the producers and consumers of food, and as such have a dual role in food safety: they both generate risks and are exposed to them. Based upon a survey of the food production and consumption habits o...Farmers are both the producers and consumers of food, and as such have a dual role in food safety: they both generate risks and are exposed to them. Based upon a survey of the food production and consumption habits of 140 farm households and long-term research in two villages in Yunnan province, this study found that rural families are highly dependent on the market for food production and consumption. In their role as consumers, farmers are aware of food safety risks and concerned about them, but their ability to protect themselves is limited. They do so primarily by avoiding certain products and growing as much of their own food as possible. At the same time, in their role as producers, farmers engage in practices, primarily the overuse and inappropriate use of fertilizer and pesticides, that are damaging to food safety and the environment. There is therefore a disconnect in their roles as consumers and producers that needs to be addressed if policy goals for improving food safety and reducing the use of agricultural chemicals are to be achieved. Farmers need more information about food safety risks related to the products they consume themselves, and technical guidance on the safe use of farm chemicals when growing food for market. However, such measures will not be effective unless the external pressures on farmers are also addressed, through consideration of market incentives to use farm chemicals and the impact of consumer demand.展开更多
Oplopanax elatus(Nakai) Nakai, a member of the ancient angiosperm plant family Araliaceae, is used for the treatment of different disorders in the medicine systems of China, Russia, and Korea, and was designated in Ru...Oplopanax elatus(Nakai) Nakai, a member of the ancient angiosperm plant family Araliaceae, is used for the treatment of different disorders in the medicine systems of China, Russia, and Korea, and was designated in Russia as a classical adaptogen. Despite extensive studies of classical adaptogens, there are comparatively few reports concerning the chemical composition and pharmacological effects of O. elatus in English. The plant is a potential source of saponins, flavonoids, anthraquinones, terpenes, and other active compounds. Experimental studies and clinical applications have indicated that O. elatus possesses a number of pharmacological activities, including adaptogenic, anti-convulsant, anti-diabetic, anti-fungal, anti-inflammatory, anti-oxidant, blood pressure modulating, and reproductive function effects. In this review, the chemistry, safety, and therapeutic potential of O. elatus are summarized and highlighted to encourage the further development of this plant.展开更多
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world....With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.展开更多
基金Rising-Star Program of Shanghai 2023 Science and Technology Innovation Action Plan(Yangfan Special Project),China(No.23YF1401000)Fundamental Research Funds for the Central Universities,China(No.2232022D-25)。
文摘The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.
基金This work was supported by the Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT1078 the Key Program of NSFC-Guangdong Union Foundation under Grant No.U1135002+3 种基金 the Major National S&T Program under Grant No.2011ZX03005-002 the National Natural Science Foundation of China under Grants No. 61072066, No.61173135, No.61100230, No.61100233, No.61202389, No.61202390 the Natural Science Basic Research Plan in Shaanxi Province of China under Grants No.2012JQ8043, No. 2012JM8030, No. 2012JM8025, No2011JQ8003 the Fundamental Research Funds for the Central Universities under Cxants No. JY10000903001, No. K50511030004. The authors would like to thank the anonymous reviewers and the editor for their constructive comments that have helped us to improve this paper.
文摘In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks.
文摘The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being transformed. A new approach focusing on "human security" principles based on freedom, dignity, justice, equality, solidarity, tolerance, and respect articulated in the millennium declaration is needed. Achieving this requires a more integrated, inclusive, and comprehensive development framework that is able to analyze and understand the context with its progress and setbacks. The paper realizes that measuring MDGs achievement does not only need a comprehensive integrated approach, but also a defmition of risks and challenges that the region faces. Issues like poverty, inequality, unemployment of graduates, personal and collective insecurity due to conflict, migration, and brain drain, food insecurity, and gender inequality are all issues that need to be redefined when analyzing the region to suit the context. The paper concludes that in order to understand the context, re-definition of concepts like poverty reduction, participation, and empowerment is needed to make concepts more relevant to the context. Lastly, the paper reflects the new call from youth for a new development model that is not based on market economy, ends political economy of the rentier states, and emphasizes a productive oriented economy that is able to generate employment and decent work. It also emphasizes democratic governance as an only path for a sustainable participatory development that can realize ambitions and aspirations of the majority of population.
文摘This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority.
文摘Linguistics classifies question methods into certain types. There are kinds of question methods, such as alternative question method, yes-no question method, specific question method, direct question method, indirect question method, echo question method, tag question method, miracle question method and so on. And this paper will set the characteristic discourses of protagonists in the drama of Antigone by the ancient Greek tragedian Sophocles as a research example, so as to analyze the protagonist's pragmatics motivation in the conversation strategies when communicating with three people in different social identity, that is to say, this paper will analyze the way that the selected question and answer methods used by the protagonist to achieve the effect of being recognized as king identity but not as a tyrant in fact. According to the dramatic text, this paper tends to make a further research on the characters' self-identity construction ground on the discourse characteristic of the characters. And from the perspective of modem linguistic, it is the analysis of the motivation in question methods, and the advantage and disadvantage on the discourse right implied in answer methods, that contribute to the further research on how the social identity construction and the classic character image are successfully made.
文摘The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed.
基金Supported by the National Natural Science Foundation of China(50975087)the Scientific Research Starting Foundation for Returned Overseas Chinese Scholars,Ministry of Education,China(37)Key Research Project of Hunan Province Office of Education(09A026)
文摘Noise from the machine on coal working face seriously influenced the miners' physical and mental health, and also, due to the noise, there may be a major hidden danger in safety from accidents as all safety warning signals may be masked by the noise. This paper summarized the features of mine environmental noise on working face, such as the variety of noise sources, the continuity of high intensity and slow attenuation in narrow space, etc.The main projects about noise forecasting and controlling on working face was emphatically expounded;the development status about mines machinery noise mechanism and environmental noise acoustic characteristics of space-time of these main research topics were also introduced.
文摘The operation of a complicated radiators structure creating a required field in a given area is disturbed often due to different external actions. As an example, the impact of metallic objects approaching off to an antenna system with minimal irradiation on user's body is analyzed. In this case, the zone itself, where the area of a weak field (a dark spot) is created, is generally not approachable for sensors installation. In order to counteract the disturbance of the system operation due to presence of different metallic objects in close proximity to the radiators, two methods based on two information sources are studied. These information sources are antennas driving currents and fields at a predetermined point outside the given area. As an example, the antenna system used in the compensation method for reducing human's body irradiation, to which a metal object approaches, is analyzed. The conditions of severe external actions are considered: a great metal body and a small distance from this body to the dark spot. It is shown that under these conditions of severe external actions the second method based on the field values measuring demonstrates a higher efficiency. A block scheme for structure of an automatic adjustment is suggested. The considered problem is a common one, and developers of radio circuits are faced with them constantly.
基金"Twelfth Five-year Plan"for Sci & Tech Research of China(No.2011BAG03B02No.2011BAG03B06)
文摘During the 100%front impact,all the parts of front car will participate in the course;the crash stiffness of bodywork will also reach the peak.During the crash,rational structure of bodywork can resist the distortion,absorb more energy and get better mode of distortion and low deceleration rate,so as to meet the performance of crash safety.The paper mainly makes optimization analysis based on the problems of front side rails,subframe,firewall,and optimization cases are confirmed which can decrease the intrusion and deceleration rate of the whole car.The structure of bodywork after optimization can meet the performance of crash safety.
基金FORHEAD with funding from the Rockefeller Brothers Fund(RBF)
文摘Farmers are both the producers and consumers of food, and as such have a dual role in food safety: they both generate risks and are exposed to them. Based upon a survey of the food production and consumption habits of 140 farm households and long-term research in two villages in Yunnan province, this study found that rural families are highly dependent on the market for food production and consumption. In their role as consumers, farmers are aware of food safety risks and concerned about them, but their ability to protect themselves is limited. They do so primarily by avoiding certain products and growing as much of their own food as possible. At the same time, in their role as producers, farmers engage in practices, primarily the overuse and inappropriate use of fertilizer and pesticides, that are damaging to food safety and the environment. There is therefore a disconnect in their roles as consumers and producers that needs to be addressed if policy goals for improving food safety and reducing the use of agricultural chemicals are to be achieved. Farmers need more information about food safety risks related to the products they consume themselves, and technical guidance on the safe use of farm chemicals when growing food for market. However, such measures will not be effective unless the external pressures on farmers are also addressed, through consideration of market incentives to use farm chemicals and the impact of consumer demand.
文摘Oplopanax elatus(Nakai) Nakai, a member of the ancient angiosperm plant family Araliaceae, is used for the treatment of different disorders in the medicine systems of China, Russia, and Korea, and was designated in Russia as a classical adaptogen. Despite extensive studies of classical adaptogens, there are comparatively few reports concerning the chemical composition and pharmacological effects of O. elatus in English. The plant is a potential source of saponins, flavonoids, anthraquinones, terpenes, and other active compounds. Experimental studies and clinical applications have indicated that O. elatus possesses a number of pharmacological activities, including adaptogenic, anti-convulsant, anti-diabetic, anti-fungal, anti-inflammatory, anti-oxidant, blood pressure modulating, and reproductive function effects. In this review, the chemistry, safety, and therapeutic potential of O. elatus are summarized and highlighted to encourage the further development of this plant.
基金Project supported by the Taiwan Information Security Center(TWISC)the Ministry of Science and Technology,Taiwan(Nos.MOST 103-2221-E-259-016-MY2 and MOST 103-2221-E-011-090-MY2)
文摘With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.