期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
质子泵抑制剂长期使用安全性评价 被引量:4
1
作者 李婧 于培 郎奕 《药品评价》 CAS 2011年第20期24-28,共5页
质子泵抑制剂长期使用使肺炎、腹泻和骨折发生的风险增加.并且与氯毗格雷合用可以增加心血管事件的风险,应严格按照质子泵抑制剂的适应证用药.加强长期用药的随访和监护。本文旨在对质子泵抑制剂长期使用的安全性情况进行评价。
关键词 质子泵抑制剂 安全性:适应
下载PDF
高适配性的电力监控主机操作指令安全性自适应检测模型
2
作者 舒斐 刘冉 +1 位作者 王树军 黄晓飞 《微型电脑应用》 2024年第11期170-173,181,共5页
电力监控主机操作指令存在的异常点会影响电力监控主机操作指令的安全性,为了提升指令安全检测效果,提出高适配性的电力监控主机操作指令安全性自适应检测模型方法。该方法根据主机操作指令特性分析结果,利用建立的多模式无线数据采集... 电力监控主机操作指令存在的异常点会影响电力监控主机操作指令的安全性,为了提升指令安全检测效果,提出高适配性的电力监控主机操作指令安全性自适应检测模型方法。该方法根据主机操作指令特性分析结果,利用建立的多模式无线数据采集设备采集电力监控主机操作指令数据;采用主成分分析(PCA)方法提取采集的指令数据特征,并在此基础上对指令数据实施降维处理,达到降低电力监控主机操作指令安全检测复杂度的目的;结合基于密度的聚类(DBSCAN)算法对提取的特征聚类,从中挖掘出异常点,基于挖掘结果构建自适应检测模型,利用该模型对挖掘的异常点检测,实现高适配性的电力监控主机操作指令安全性自适应检测。实验结果表明,通过对该方法开展检出率比较测试、检测时延比较测试,验证了该方法的可靠性高。 展开更多
关键词 高适配性 电力监控主机操作指令 安全性适应检测模型 PCA方法
下载PDF
具有分布式打开权威的隐藏身份签名方案
3
作者 柳欣 《计算机应用》 CSCD 北大核心 2012年第3期699-704,728,共7页
基于双线性映射的隐藏身份签名方案不满足可开脱性和选择密文攻击(CCA)匿名性,而在RSA群上构造的隐藏身份签名方案具有较高的通信和运算耗费。为此,利用块消息签名技术实现了可开脱性,提出一个允许设置分布式打开权威的改进方案。改进... 基于双线性映射的隐藏身份签名方案不满足可开脱性和选择密文攻击(CCA)匿名性,而在RSA群上构造的隐藏身份签名方案具有较高的通信和运算耗费。为此,利用块消息签名技术实现了可开脱性,提出一个允许设置分布式打开权威的改进方案。改进方案通过将分布式密钥提取和可同时执行的知识证明技术应用于底层门限加密方案,有效地实现了对打开权威的权利分发。此外,为了克服传统串行注册方式无法抵抗拒绝服务攻击的不足,利用承诺的知识证明技术将注册过程增强为满足并发安全性的协议。在随机预言模型下,改进方案可证满足所要求的所有安全性质。对比实验结果表明:改进方案的签名长度更短,签名与验证算法开销更小,由可信服务器执行的门限解密过程是并发安全的且在自适应攻击者模型下满足可证安全性。 展开更多
关键词 数字签名 群签名 基于身份的签名 知识证明 门限加密 适应安全性
下载PDF
一种支持算术张成程序的密文策略属性加密方案 被引量:1
4
作者 魏铎 高海英 《电子学报》 EI CAS CSCD 北大核心 2020年第10期1993-2002,共10页
密文策略属性加密方案适用于云环境中密文数据的访问控制.已有的支持算术张成程序的属性加密方案多是密钥访问策略的方案,且公开参数规模较大.本文利用双对偶向量空间(Dual Pair Vector Space,DPVS)技术,提出了一个公开参数长度固定、... 密文策略属性加密方案适用于云环境中密文数据的访问控制.已有的支持算术张成程序的属性加密方案多是密钥访问策略的方案,且公开参数规模较大.本文利用双对偶向量空间(Dual Pair Vector Space,DPVS)技术,提出了一个公开参数长度固定、支持算术张成程序的密文策略属性加密方案.在新方案中,将密文相关的访问控制向量与随机矩阵结合,密钥相关的属性分量与熵扩张引理中的公开参量结合,设计方法对应了熵扩张引理中给出的密文和密钥分量的形式.最后,基于素数阶双线性熵扩张引理和k-Lin困难假设,证明了该方案具有适应安全性.新方案与已有支持算术张成程序的属性加密方案相比,实现了密文访问策略、公开参数长度固定且满足适应安全性. 展开更多
关键词 算术张成程序 密文策略属性加密 双线性熵扩张 k-Lin假设 适应安全性
下载PDF
一种公开参数长度固定的非零内积加密方案
5
作者 魏铎 高海英 赵建 《密码学报》 CSCD 2019年第5期594-604,共11页
内积加密体制作为一种特殊的函数加密,被广泛应用于云计算领域.针对现有内积加密方案的公开参数随系统属性个数线性增长的缺陷,本文利用素数阶群上的双线性映射提出了一个公开参数长度固定且具有适应安全性的内积加密方案.在设计方案时... 内积加密体制作为一种特殊的函数加密,被广泛应用于云计算领域.针对现有内积加密方案的公开参数随系统属性个数线性增长的缺陷,本文利用素数阶群上的双线性映射提出了一个公开参数长度固定且具有适应安全性的内积加密方案.在设计方案时,我们通过利用素数阶熵扩张引理给出的公开参数形式,实现了公开参数长度固定;方案的密钥生成算法,通过利用属性向量分量与随机向量结合的技巧,生成每个私钥分量,在素数阶熵扩张引理和MDDHk,k+1n困难假设成立条件下,利用Game序列的证明方法,证明了方案具有适应安全性.并且与现有内积加密方案相比,本文方案的公开参数长度仅有16个群元素,公开参数的选取不受属性个数影响,大大降低了公开参数选取量,使得方案的实用性和操作性更强. 展开更多
关键词 非零内积加密 素数阶熵扩张引理 MDDHk k+1n困难假设 适应安全性
下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
6
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
下载PDF
Potential Impacts of Climate Change on Food Security
7
作者 Nathan Akila Loks Abati Mohammed Umar +2 位作者 Domchang Mamzing Lydia Kachollom Akila Cicelia Nyazi Majak 《Journal of Agricultural Science and Technology(A)》 2015年第10期799-810,共12页
In view of the fact that climate-related disasters are already taking a heavy toll, causing massive damage to crops and infrastructure and forcing some people to flee their homes, however, the potential impacts of cli... In view of the fact that climate-related disasters are already taking a heavy toll, causing massive damage to crops and infrastructure and forcing some people to flee their homes, however, the potential impacts of climate change are likely to trigger adaptive responses that influence environmental and socio-economic drivers of food system performance in positive as well as negative ways. This paper was conducted through the collection of some research materials with the projected balance of these various climate impacts on food system performance and food security outcomes at the local and global levels. More so that, food security is likely to be affected by climate change in several ways: food security depends not only on the direct impact of climate change on food production but also on its indirect impact on human nutrition and health, economic growth, trade flows and food aid policy. The paper further examined the effectiveness of managing new risks and uncertainty, improving the quality of information and its use, monitoring weather and improving scientific understanding of climate change, promoting insurance schemes, maintaining biodiversity and access to fund as some of the crucial measures for adaptation. The large amount of resources that would be necessary to avoid the worst case scenario suggests the necessity of continued support from the international community to improve food security at the local and global levels as a whole. 展开更多
关键词 Climate change food security food system food availability food affordability.
下载PDF
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
8
作者 路献辉 来学嘉 何大可 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期90-93,共4页
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a... To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security are studied. This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps. These gaps are categorized, analyzed and measured. Finally the methods to bridge these gaps are described. This explains the existing design approaches and gives an intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions. 展开更多
关键词 public key encryption adaptive chosen ciphertext security intractable vroblem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部