期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS 被引量:11
1
作者 Cheng Xiangguo Liu Jingmei +1 位作者 Guo Lifeng Wang Xinmei 《Journal of Electronics(China)》 2006年第4期569-573,共5页
An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and b... An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups. 展开更多
关键词 Identity-based multisignature Identity-based aggregate signature Weil pairing Gap Diffie-Hellman group m-torsion group
下载PDF
SUBSPACE METHOD FOR BLIND IDENTIFICATION OF CDMA TIME-VARYING CHANNELS 被引量:2
2
作者 Liu Yulin Peng Qicong (School of Communication and Information Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2002年第1期61-67,共7页
A new blind method is proposed for identification of CDMA Time-Varying (TV)channels in this paper. By representing the TV channel's impulse responses in the delay-Doppler spread domain, the discrete-time canonical... A new blind method is proposed for identification of CDMA Time-Varying (TV)channels in this paper. By representing the TV channel's impulse responses in the delay-Doppler spread domain, the discrete-time canonical model of CDMA-TV systems is developed and a subspace method to identify blindly the Time-Invariant (TI) coordinates is proposed. Unlike existing basis expansion methods, this new algorithm does not require .estimation of the base frequencies, neither need the assumption of linearly varying delays across symbols. The algorithm offers definite explanation of the expansion coordinates. Simulation demonstrates the effectiveness of the algorithm. 展开更多
关键词 CDMA Time-varying channels Blind identification Delay-Doppler spread domain Subspace method
下载PDF
Identification of ABA-responsive genes in rice shoots via cDNA macroar- ray 被引量:7
3
作者 FANGLIN SHOULINGXU 《Cell Research》 SCIE CAS CSCD 2003年第1期59-68,共10页
Phytohormone abscisic acid (ABA) was critical for many plant growth and developmental processesincluding seed maturation, germination and response to environmental factors. With the purpose to detectthe possible ABA r... Phytohormone abscisic acid (ABA) was critical for many plant growth and developmental processesincluding seed maturation, germination and response to environmental factors. With the purpose to detectthe possible ABA related signal transduction pathways, we tried to isolate ABA-regulated genes throughcDNA macroarray technology using ABA-treated rice seedling as materials (under treatment for 2, 4, 8 and12 h). Of 6144 cDNA clones tested, 37 differential clones showing induction or suppression for at least onetime, were isolated. Of them 30 and 7 were up- or down-regulated respectively. Sequence analyses revealedthat the putative encoded proteins were involved in different possible processes, including transcription,metabolism and resistance, photosynthesis, signal transduction, and seed maturation. 6 cDNA clones werefound to encode proteins with unknown functions. Regulation by ABA of 7 selected clones relating to signaltransduction or metabolism was confirmed by reverse transcription PCR. In addition, some clones werefurther shown to be regulated by other plant growth regulators including auxin and brassinosteroid, which,however, indicated the complicated interactions of plant hormones. Possible signal transduction pathwaysinvolved in ABA were discussed. 展开更多
关键词 Oryza saliva abscisic acid (ABA) cDNA macroarray responsive genes signal transduc- tion
下载PDF
Two Modifications on IKE Protocol with Pre-shared Key Authentication 被引量:3
4
作者 刘东喜 张连华 白英彩 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第2期142-145,共4页
This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder genera... This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly. 展开更多
关键词 IKE protocol message authentication authenticated key agreement
下载PDF
The Psychological Causes and Identification of the Destructive Cult Belief
5
作者 XIE Gui-yang YAN Mei-fu XU Bi-bo 《Journal of Literature and Art Studies》 2018年第9期1413-1421,共9页
It is a worldwide problem to let the destructive cult believers detached from the destructive cult. The most difficult point is that it is difficult to change the destructive cult belief. The reason why the destructi... It is a worldwide problem to let the destructive cult believers detached from the destructive cult. The most difficult point is that it is difficult to change the destructive cult belief. The reason why the destructive cult faith is difficult to change is because that the destructive cults embezzled the basic concepts and doctrines of many legitimate religions in the construction of the destructive cult faith, which make the destructive cults and religious beliefs have many similarities in psychology, including the tenacity and stability of faith. The believers tend to believe it as a orthodox legitimate religion. The article points out the similarity that makes destructive cult beliefs hard to change and lists the ways to identify heretical beliefs. 展开更多
关键词 religious belief destructive cult belief religious emotion religious experience ultimate concern
下载PDF
A compression tolerant scheme for image authentication
6
作者 刘宝锋 张文军 余松煜 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第4期399-404,共6页
Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by co... Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation, which are feasible for practical applications. 展开更多
关键词 Image features AUTHENTICATION digital signature
下载PDF
Transcriptome profiles of embryos before and after cleavage in Eriocheir sinensis:identification of developmental genes at the earliest stages
7
作者 惠敏 崔朝霞 +1 位作者 刘媛 宋呈文 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 2017年第4期770-781,共12页
In crab, embryogenesis is a complicated developmental program marked by a series of critical events. RNA-Sequencing technology offers developmental biologists a way to identify many more developmental genes than ever ... In crab, embryogenesis is a complicated developmental program marked by a series of critical events. RNA-Sequencing technology offers developmental biologists a way to identify many more developmental genes than ever before. Here, we present a comprehensive analysis of the transcriptomes of Eriocheir sinensis oosperms (Os) and embryos at the 2-4, cell stage (Cs), which are separated by a cleavage event. Atotal of 18 923 unigenes were identified, and 403 genes matched with gene ontology (GO) terms related to developmental processes. In total, 432 differentially expressed genes (DEGs) were detected between the two stages. Nine DEGs were specifically expressed at only one stage. These DEGs may be relevant to stage-specific molecular events during development. A number of DEGs related to 'hedgehog signaling pathway', 'Wnt signaling pathway' 'germplasm', 'nervous system', 'sensory perception' and 'segment polarity' were identified as being up-regulated at the Cs stage. The results suggest that these embryonic developmental events begin before the early cleavage event in crabs, and that many of the genes expressed in the two transeriptomes might be maternal genes. Our study provides ample information for further research on the molecular mechanisms underlying crab development. 展开更多
关键词 mitten crabs embryo development fertilized egg CLEAVAGE TRANSCRIPTOMICS
下载PDF
Efficacy of dynamic contrast enhanced-MRI in distinguishing benign and malignant breast lesions
8
作者 Tieqiao Du Baozhi Ding Chunyu Sang Chao Zhang 《The Chinese-German Journal of Clinical Oncology》 CAS 2009年第10期561-566,共6页
Objective: The aim of the study was to discuss the diagnostic value of dynamic contrast enhanced-magnetic resonance imaging (DCE-MRI) in distinguishing malignant tumors of breast from benign lesions. Methods: A DCE-MR... Objective: The aim of the study was to discuss the diagnostic value of dynamic contrast enhanced-magnetic resonance imaging (DCE-MRI) in distinguishing malignant tumors of breast from benign lesions. Methods: A DCE-MRI study was performed on 18 benign lesions, 16 malignant tumors and 2 borderline lesions of breast (mean age 51.7 years). The seven items including shape, marginal feature, spreading signs, time-signal intensity curve, maximum slope of increase (MSI), signal enhancement ratio (SER) and signal enhanced extent (SEE) were compared between patients with benign lesions and those with malignant tumors. Results: Shape, marginal feature, spreading signs, time-signal intensity curve, SEE and SER between the benign and malignant groups of breast represented significantly difference except MSI. The 36 cases with breast lesion displayed sensitivity, specificity, accuracy for diagnosing malignant tumor of breast using the scoring method was 93.8%, 83.3% and 88.2%, respectively. Conclusion: DCE-MRI combined with morphology and dynamic enhanced feature of breast lesion has well efficacy to differentiate malignant tumor from benign lesions. 展开更多
关键词 breast tumor magnetic resonance imaging (MRI)
下载PDF
Region Pair Grey Difference Classifier for Face Detection 被引量:1
9
作者 欧凡 刘冲 欧宗瑛 《Transactions of Tianjin University》 EI CAS 2010年第2期118-122,共5页
A new kind of region pair grey difference classifier was proposed. The regions in pairs associated to form a feature were not necessarily directly-connected, but were selected dedicatedly to the grey transition betwee... A new kind of region pair grey difference classifier was proposed. The regions in pairs associated to form a feature were not necessarily directly-connected, but were selected dedicatedly to the grey transition between regions coinciding with the face pattern structure. Fifteen brighter and darker region pairs were chosen to form the region pair grey difference features with high discriminant capabilities. Instead of using both false acceptance rate and false rejection rate, the mutual information was used as a unified metric for evaluating the classifying performance. The parameters of specified positions, areas and grey difference bias for each single region pair feature were selected by an optimization processing aiming at maximizing the mutual information between the region pair feature and classifying distribution, respectively. An additional region-based feature depicting the correlation between global region grey intensity patterns was also proposed. Compared with the result of Viola-like approach using over 2 000 features, the proposed approach can achieve similar error rates with only 16 features and 1/6 implementation time on controlled illumination images. 展开更多
关键词 face detection region pair grey feature region grey pattern correlation machine learning
下载PDF
A new damping ratio identification method based on pattern search
10
作者 刘彦 谭久彬 +1 位作者 谭志波 王雷 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第1期141-144,共4页
In order to improve the effectiveness of traditional time domain identification methods in identifying damping ratios, a new damping ratio identification method based on pattern search is proposed by fluctuating the r... In order to improve the effectiveness of traditional time domain identification methods in identifying damping ratios, a new damping ratio identification method based on pattern search is proposed by fluctuating the reliable natural frequency obtained through traditional time domain identification methods by about 10% to build the boundary conditions, using all the initial identification results to establish the free decay response of the system, and using the pattern search method to correct the initial identification results with the residual sum of squares between the free decay response and the actually measured free-decay signal as the objective function. The proposed method deals with the actually measured free-decay signal with curve fitting and avoids enlarging the identified error caused by intermediate conversion, so it can effectively improve the identified accuracy of damping ratios. Simulations for a room-sized vibration isolation foundation show that the relative errors of analyzed three damping ratios are down to 1.05%, 1.51% and 3.7% by the proposed method from 8.42%, 5.85% and 8.5% by STD method when the noise level is 10%. 展开更多
关键词 modal parameter identification damping ratio pattern search
下载PDF
光学可变图像与防伪产品介绍
11
《中国防伪》 2005年第1期38-39,共2页
关键词 光学可变图像 德国库尔兹公司 防伪产品 全息图 鉴信 电化铝 不干胶 覆合膜
原文传递
Information Security Protocol Based System Identification with Binary-Valued Observations 被引量:2
12
作者 XU Changbao ZHAO Yanlong ZHANG Ji-Feng 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第4期946-963,共18页
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info... Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases. 展开更多
关键词 CRYPTOGRAPHY identification algorithm information security passive attacks security protocol time complexity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部