期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
扒窃行为研究 被引量:1
1
作者 黄福涛 余作泽 《河南警察学院学报》 2014年第4期103-107,共5页
扒窃行为的违法性内容是无法控制财产的紧迫危险感。以紧迫危险感为基础,公共场所仅指人流量多的开放场所;"随身性"的范围具体是指伸手可及的范围;认定扒窃不依据"技术性"。数额不是扒窃的特征,应确认扒窃是独立的... 扒窃行为的违法性内容是无法控制财产的紧迫危险感。以紧迫危险感为基础,公共场所仅指人流量多的开放场所;"随身性"的范围具体是指伸手可及的范围;认定扒窃不依据"技术性"。数额不是扒窃的特征,应确认扒窃是独立的盗窃行为方式;扒窃的既遂标准是财物"失控说"。 展开更多
关键词 扒窃 无法控制财产的紧迫危险感 公共场所 随身性 失控说
下载PDF
IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE 被引量:4
2
作者 Wan Zhongmei Lai Xuejia +2 位作者 Weng Jian Liu Shengli Hong Xuan 《Journal of Electronics(China)》 2009年第6期853-858,共6页
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche... In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates. 展开更多
关键词 KEY-INSULATED Proxy signature Identity-based signature Key-exposure Bilinear pairings
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部