期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
《宋会要》礼类与《中兴礼书》及其《续编》——《宋会要》礼类诸门门名及次序复原的新线索 被引量:3
1
作者 林鹄 《文献》 CSSCI 北大核心 2019年第1期164-175,共12页
复原《宋会要》的重点也是难点,是各类下诸门的门名及排序。以往研究对《永乐大典》事目及《宋会要》辑文所留存的指示门名的种种标志进行了较充分的利用,但对其他相关文献的利用,尚嫌不足。本文针对《宋会要》礼类,尝试在这方面做初步... 复原《宋会要》的重点也是难点,是各类下诸门的门名及排序。以往研究对《永乐大典》事目及《宋会要》辑文所留存的指示门名的种种标志进行了较充分的利用,但对其他相关文献的利用,尚嫌不足。本文针对《宋会要》礼类,尝试在这方面做初步探索。文章发现,在现存文献中,与《宋会要》礼类诸门门名及次序最接近的,应当是《中兴礼书》及其《续编》所载各门门名及次序,其重要性超过《永乐大典》事目。 展开更多
关键词 《宋会要》 礼类 《中兴礼书》 《中兴礼书续编》 门名次序
下载PDF
建筑中的门
2
作者 朱耀华 王石章 《中外建筑》 2006年第4期72-73,共2页
门成为变换封闭空间景象的一个转接点,每一个门代表了每一个以院落为中心的建筑的组的开始,或者说是前面一个组的终结。
关键词 牌坊 关口 桥梁 门名
下载PDF
Taking Agricultural Landscapes into the Development System of Scenic Spot —with the Detail Plan of Yanmen Mountain Scenic Spot in Zhaixing Mountain as a Study Case 被引量:1
3
作者 翟付顺 陈翠俊 郭美锋 《Journal of Landscape Research》 2010年第2期16-18,21,共4页
As a kind of landscape resources, agricultural landscapes play a crucial role in rural tourism. It is a new attempt by taking agricultural landscapes into the development system of scenic spot for their mutual support... As a kind of landscape resources, agricultural landscapes play a crucial role in rural tourism. It is a new attempt by taking agricultural landscapes into the development system of scenic spot for their mutual support and promotion. With the detail plan of Yanmen Mountain Scenic Spot in Zhaixing Mountain Scenic Area as a study case, the authors studied how to take agricultural landscapes into the development system of scenic spot. 展开更多
关键词 Agricultural landscapes Scenic spot Yanmen Mountain
下载PDF
Improved PBFT protocol based on phase voting and threshold signature 被引量:1
4
作者 Chen Liquan Hu Jie Gu Pengpeng 《Journal of Southeast University(English Edition)》 EI CAS 2022年第3期213-218,共6页
The communication complexity of the practical byzantine fault tolerance(PBFT)protocol is reduced with the threshold signature technique applied to the consensus process by phase voting PBFT(PV-PBFT).As most communicat... The communication complexity of the practical byzantine fault tolerance(PBFT)protocol is reduced with the threshold signature technique applied to the consensus process by phase voting PBFT(PV-PBFT).As most communication occurs between the primary node and replica nodes in PV-PVFT,consistency verification is accomplished through threshold signatures,multi-PV,and multiple consensus.The view replacement protocol introduces node weights to influence the election of a primary node,reducing the probability of the same node being elected primary multiple times.The experimental results of consensus algorithms show that compared to PBFT,the communication overhead of PV-PBFT decreases by approximately 90% with nearly one-time improvement in the throughput relative and approximately 2/3 consensus latency,lower than that of the scalable hierarchical byzantine fault tolerance.The communication complexity of the PBFT is O(N^(2)),whereas that of PV-PBFT is only O(N),which implies the significant improvement of the operational efficiency of the blockchain system. 展开更多
关键词 blockchain practical byzantine fault tolerance(PBFT) threshold signature phase voting
下载PDF
An Efficient Proactive RSA Scheme for Ad Hoc Networks
5
作者 张瑞山 陈克非 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期46-51,共6页
A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The sc... A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The scheme consists of three protocols: the initial secret share distribution protocol, the signature generation protocol and the secret share refreshing protocol. Our scheme has three advantages. First, the signature generation protocol is efficient. Second, the signature generation protocol is resilient. Third, the share refreshing protocol is efficient. 展开更多
关键词 CRYPTOGRAPHY Threshold signature Proactivesecret sharing RSA Provable security.
下载PDF
Identity-based threshold key-insulated signature 被引量:3
6
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
Notes on the genus Gaeolaelaps(Acari: Laelapidae) with a newly recorded species from China
7
作者 Yi YAN Qian ZHANG +1 位作者 Xianguo GUO Lixia XIEI 《Entomotaxonomia》 CSCD 2018年第4期257-266,共10页
The genus Gaeolaelaps Evans & Till from China,including 20 species,is reviewed and an identification key to the Chinese species is provided.G.gillespiei Beaulieu,2009 is reported from China for the first time,with... The genus Gaeolaelaps Evans & Till from China,including 20 species,is reviewed and an identification key to the Chinese species is provided.G.gillespiei Beaulieu,2009 is reported from China for the first time,with redescription and illustrations.Three new mammal hosts are reported (Anourosorex squamipes,Eothenomys miletus and Rattus steni). 展开更多
关键词 MESOSTIGMATA Hypoaspidinae CHECKLIST key new host
下载PDF
Threshold Ring Signature Scheme Based on TPM
8
作者 Gong Bei Jiang Wei +2 位作者 Lin Li Li Yu Zhang Xing 《China Communications》 SCIE CSCD 2012年第1期80-85,共6页
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature schen. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate. 展开更多
关键词 ring signature TPM THRESHOLD Chinese remainder theorem RANK
下载PDF
Remuneration Reforms in Public Sector: A Case of Russian Healthcare
9
作者 Marina Kolosnitsyna 《Chinese Business Review》 2012年第1期109-118,共10页
In 2008 remuneration reform for public sector was introduced in Russia. Its main idea was to implement P4P principle well-known in business, including more flexible approach to wage setting. This paper presents an att... In 2008 remuneration reform for public sector was introduced in Russia. Its main idea was to implement P4P principle well-known in business, including more flexible approach to wage setting. This paper presents an attempt to estimate an influence of the new remuneration system (NRS) on earnings level, inequalities and job motivation. The estimates are based on microdata of monitoring survey of healthcare economic problems conducted in Russia in 2009 and 2010. The extended specification of Mincer earning equation and probit-models were used. One could observe increasing wage rates and earning inequalities within healthcare institutions adopted NRS though worker's experience and regional economic differences remain significant wage determining factors. As it occurs, NRS is widely adopted by large regional and central hospitals while smaller health care institutions show less enthusiasm in implementing reform. Obviously, the larger institutions have more money and better educated administrative staff to introduce the new system. Those chief physicians who adopted NRS point out a positive correlation between earnings and individual input. At the same time, those committed to old principles of wage setting more often note declining job turnover. This latter result could possibly indicate negative personnel sorting, less productive workers tending to stay with employer who doesn't assess their performance. As concerns anticipated NRS results such as increasing motivation and quality of health services, the evidence is still ambiguous. 展开更多
关键词 remuneration system pay for performance health care institutions job motivation
下载PDF
THRESHOLD PROXY RE-SIGNATURE 被引量:7
10
作者 Piyi YANG Zhenfu CAO Xiaolei DONG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第4期816-824,共9页
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to... The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach. 展开更多
关键词 Proxy re-signature ROBUST THRESHOLD unforgeable.
原文传递
The security analysis of a threshold proxy quantum signature scheme 被引量:5
11
作者 SHI JianHong ZHANG ShengLi CHANG ZhengGang 《Science China Chemistry》 SCIE EI CAS 2013年第3期519-523,共5页
In the YW threshold proxy quantum signature scheme proposed by Yang and Wen,it is found that the basic signature key is the same as the basic verification key,which means that the bitwise exclusive OR(XOR) of the t pr... In the YW threshold proxy quantum signature scheme proposed by Yang and Wen,it is found that the basic signature key is the same as the basic verification key,which means that the bitwise exclusive OR(XOR) of the t proxy signature keys is exactly the XOR of the t proxy verification keys.Therefore,the proxy signers can deny their signature and the specific verifiers can forge a legal signature.Furthermore,an attacker can obtain a legal threshold proxy signature for an arbitrary new message.These findings show that there are hidden security loopholes that should be carefully constructed in designing more efficent YW-scheme. 展开更多
关键词 quantum cryptography quantum signature threshold proxy signature secret sharing
原文传递
A Universal Composability Framework for Analysis of Proxy Threshold Signature
12
作者 洪璇 李详学 +1 位作者 龚征 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期107-111,共5页
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol compositio... The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol composition operation.In the paper,we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area.The proposed scheme is suitable for the mobile agents,which should migrate across different environment through network.Furthermore,we give the concrete analysis of the reduction to prove the security of the proposed scheme. 展开更多
关键词 proxy threshold signature universal composability RSA cryptosystem mobile agents
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部