期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
心安与身安——《论语》“宰我问三年之丧”章疏解 被引量:2
1
作者 赖区平 《孔子研究》 CSSCI 北大核心 2019年第1期20-29,共10页
《论语》"宰我问三年之丧"章中安字出现五次,可分为两组:"女安"之安、"居处不安"之安。解释史上有两说:一、两组安字都指"心安";二、女安之安指"心安",居处不安之安指"身安&qu... 《论语》"宰我问三年之丧"章中安字出现五次,可分为两组:"女安"之安、"居处不安"之安。解释史上有两说:一、两组安字都指"心安";二、女安之安指"心安",居处不安之安指"身安"。但它们都存在一些问题,值得考虑的是第三种解释:两组安字都指"身安",且这是涵盖心安的整个人之安、身心一体之安。而"不安"有两层含义:不会"安"(未安)、会"不安"(不忍安、耻于安)。从身心一体之"身安"角度,可使对此章所说的"仁—礼"关系有一新的认知。 展开更多
关键词 身安
原文传递
Some Remarks on Cocks'Identity-Based Encryption Scheme
2
作者 ZHAO Xiaopeng 《Journal of Donghua University(English Edition)》 CAS 2024年第4期447-450,共4页
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However... The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme. 展开更多
关键词 identity-based encryption(IBE) quadratic residue SECURITY Cocks’IBE scheme
下载PDF
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
3
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
下载PDF
Post-2015 Development Priorities for the Arab World
4
作者 Ibrahim Elnur Eileen Kuttab 《Management Studies》 2016年第2期49-59,共11页
The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being t... The paper addresses the failure of renewing the same millennium development goals (MDGs) format in measuring achievement in a region like the Middle East and North Africa (MENA) region which is drastically being transformed. A new approach focusing on "human security" principles based on freedom, dignity, justice, equality, solidarity, tolerance, and respect articulated in the millennium declaration is needed. Achieving this requires a more integrated, inclusive, and comprehensive development framework that is able to analyze and understand the context with its progress and setbacks. The paper realizes that measuring MDGs achievement does not only need a comprehensive integrated approach, but also a defmition of risks and challenges that the region faces. Issues like poverty, inequality, unemployment of graduates, personal and collective insecurity due to conflict, migration, and brain drain, food insecurity, and gender inequality are all issues that need to be redefined when analyzing the region to suit the context. The paper concludes that in order to understand the context, re-definition of concepts like poverty reduction, participation, and empowerment is needed to make concepts more relevant to the context. Lastly, the paper reflects the new call from youth for a new development model that is not based on market economy, ends political economy of the rentier states, and emphasizes a productive oriented economy that is able to generate employment and decent work. It also emphasizes democratic governance as an only path for a sustainable participatory development that can realize ambitions and aspirations of the majority of population. 展开更多
关键词 human security POVERTY gender inequality EMPOWERMENT millennium development goals (MDGs)
下载PDF
One-Way Quantum Authenticated Secure Communication Using Rotation Operation 被引量:1
5
作者 Chia-Wei Tsai Toung-Shang Wei Tzonelih Hwang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1023-1026,共4页
This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to... This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority. 展开更多
关键词 quantum authentication quantum direct communication
下载PDF
On the Identity Construction in Question Methods and Answer Methods of Speakers: For the Discourses in Antigone
6
作者 杨婷 《International English Education Research》 2015年第4期103-106,共4页
Linguistics classifies question methods into certain types. There are kinds of question methods, such as alternative question method, yes-no question method, specific question method, direct question method, indirect ... Linguistics classifies question methods into certain types. There are kinds of question methods, such as alternative question method, yes-no question method, specific question method, direct question method, indirect question method, echo question method, tag question method, miracle question method and so on. And this paper will set the characteristic discourses of protagonists in the drama of Antigone by the ancient Greek tragedian Sophocles as a research example, so as to analyze the protagonist's pragmatics motivation in the conversation strategies when communicating with three people in different social identity, that is to say, this paper will analyze the way that the selected question and answer methods used by the protagonist to achieve the effect of being recognized as king identity but not as a tyrant in fact. According to the dramatic text, this paper tends to make a further research on the characters' self-identity construction ground on the discourse characteristic of the characters. And from the perspective of modem linguistic, it is the analysis of the motivation in question methods, and the advantage and disadvantage on the discourse right implied in answer methods, that contribute to the further research on how the social identity construction and the classic character image are successfully made. 展开更多
关键词 ANTIGONE Discourse Analysis Identity Construction
下载PDF
ID-based Key-insulated Authenticated Key Agreement Protocol 被引量:1
7
作者 周渊 程晓明 柴震川 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期247-249,共3页
The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography ... The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed. 展开更多
关键词 ID-BASED KEY-INSULATED key agreement
下载PDF
The main projects and development status of noise forecasting and controlling on working face in coal mine 被引量:2
8
作者 PENG You-duo GUO Ying-fu +3 位作者 WU Li-tao LI Xin XIE Wei-hua Dhillon B S 《Journal of Coal Science & Engineering(China)》 2010年第2期198-205,共8页
Noise from the machine on coal working face seriously influenced the miners' physical and mental health, and also, due to the noise, there may be a major hidden danger in safety from accidents as all safety warnin... Noise from the machine on coal working face seriously influenced the miners' physical and mental health, and also, due to the noise, there may be a major hidden danger in safety from accidents as all safety warning signals may be masked by the noise. This paper summarized the features of mine environmental noise on working face, such as the variety of noise sources, the continuity of high intensity and slow attenuation in narrow space, etc.The main projects about noise forecasting and controlling on working face was emphatically expounded;the development status about mines machinery noise mechanism and environmental noise acoustic characteristics of space-time of these main research topics were also introduced. 展开更多
关键词 coal mine working face environmental noise main projects development status
下载PDF
Counterworking the Operation Disturbance of a Radiators Structure due to External Actions
9
作者 Boris Levin Motti Haridim 《Computer Technology and Application》 2013年第11期584-591,共8页
The operation of a complicated radiators structure creating a required field in a given area is disturbed often due to different external actions. As an example, the impact of metallic objects approaching off to an an... The operation of a complicated radiators structure creating a required field in a given area is disturbed often due to different external actions. As an example, the impact of metallic objects approaching off to an antenna system with minimal irradiation on user's body is analyzed. In this case, the zone itself, where the area of a weak field (a dark spot) is created, is generally not approachable for sensors installation. In order to counteract the disturbance of the system operation due to presence of different metallic objects in close proximity to the radiators, two methods based on two information sources are studied. These information sources are antennas driving currents and fields at a predetermined point outside the given area. As an example, the antenna system used in the compensation method for reducing human's body irradiation, to which a metal object approaches, is analyzed. The conditions of severe external actions are considered: a great metal body and a small distance from this body to the dark spot. It is shown that under these conditions of severe external actions the second method based on the field values measuring demonstrates a higher efficiency. A block scheme for structure of an automatic adjustment is suggested. The considered problem is a common one, and developers of radio circuits are faced with them constantly. 展开更多
关键词 ANTENNAS automatic adjustment compensation method IRRADIATION metallic environment mobile antennas MONOPOLES
下载PDF
Performance improvement of car body structure in 100% frontal impact
10
作者 Men Yongxin Peng Hong +2 位作者 Du Lina Chen Wei Wang Zelong 《Engineering Sciences》 EI 2012年第6期47-50,共4页
During the 100%front impact,all the parts of front car will participate in the course;the crash stiffness of bodywork will also reach the peak.During the crash,rational structure of bodywork can resist the distortion,... During the 100%front impact,all the parts of front car will participate in the course;the crash stiffness of bodywork will also reach the peak.During the crash,rational structure of bodywork can resist the distortion,absorb more energy and get better mode of distortion and low deceleration rate,so as to meet the performance of crash safety.The paper mainly makes optimization analysis based on the problems of front side rails,subframe,firewall,and optimization cases are confirmed which can decrease the intrusion and deceleration rate of the whole car.The structure of bodywork after optimization can meet the performance of crash safety. 展开更多
关键词 100 % frontal impact simulation automotive structure optimization case TEST
下载PDF
Farmers' Dual Roles in Food Safety: Perceptions and Countermeasures 被引量:1
11
作者 王献霞 张云熙 《Journal of Resources and Ecology》 CSCD 2018年第1期78-84,共7页
Farmers are both the producers and consumers of food, and as such have a dual role in food safety: they both generate risks and are exposed to them. Based upon a survey of the food production and consumption habits o... Farmers are both the producers and consumers of food, and as such have a dual role in food safety: they both generate risks and are exposed to them. Based upon a survey of the food production and consumption habits of 140 farm households and long-term research in two villages in Yunnan province, this study found that rural families are highly dependent on the market for food production and consumption. In their role as consumers, farmers are aware of food safety risks and concerned about them, but their ability to protect themselves is limited. They do so primarily by avoiding certain products and growing as much of their own food as possible. At the same time, in their role as producers, farmers engage in practices, primarily the overuse and inappropriate use of fertilizer and pesticides, that are damaging to food safety and the environment. There is therefore a disconnect in their roles as consumers and producers that needs to be addressed if policy goals for improving food safety and reducing the use of agricultural chemicals are to be achieved. Farmers need more information about food safety risks related to the products they consume themselves, and technical guidance on the safe use of farm chemicals when growing food for market. However, such measures will not be effective unless the external pressures on farmers are also addressed, through consideration of market incentives to use farm chemicals and the impact of consumer demand. 展开更多
关键词 dual role food safety perceptions and countermeasure
原文传递
Oplopanax elatus(Nakai) Nakai: chemistry, traditional use and pharmacology 被引量:14
12
作者 Alexander N.Shikov Olga N.Pozharitskaya +2 位作者 Valery G.Makarov YANG Wen-Zhi GUO De-An 《Chinese Journal of Natural Medicines》 SCIE CAS CSCD 2014年第10期721-729,共9页
Oplopanax elatus(Nakai) Nakai, a member of the ancient angiosperm plant family Araliaceae, is used for the treatment of different disorders in the medicine systems of China, Russia, and Korea, and was designated in Ru... Oplopanax elatus(Nakai) Nakai, a member of the ancient angiosperm plant family Araliaceae, is used for the treatment of different disorders in the medicine systems of China, Russia, and Korea, and was designated in Russia as a classical adaptogen. Despite extensive studies of classical adaptogens, there are comparatively few reports concerning the chemical composition and pharmacological effects of O. elatus in English. The plant is a potential source of saponins, flavonoids, anthraquinones, terpenes, and other active compounds. Experimental studies and clinical applications have indicated that O. elatus possesses a number of pharmacological activities, including adaptogenic, anti-convulsant, anti-diabetic, anti-fungal, anti-inflammatory, anti-oxidant, blood pressure modulating, and reproductive function effects. In this review, the chemistry, safety, and therapeutic potential of O. elatus are summarized and highlighted to encourage the further development of this plant. 展开更多
关键词 Oplopanax elatus CHEMISTRY Safety Adaptogen ASTHENIA DIABETES Physical and mental fatigue
原文传递
A lightweight authentication scheme with user untraceability 被引量:2
13
作者 Kuo-Hui YEH 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第4期259-271,共13页
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.... With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses. 展开更多
关键词 AUTHENTICATION PRIVACY Security Smart card UNTRACEABILITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部