期刊文献+
共找到8,959篇文章
< 1 2 250 >
每页显示 20 50 100
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
1
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Cautionary Remarks When Testing Agreement between Two Raters for Continuous Scale Measurements: A Tutorial in Clinical Epidemiology with Implementation Using R
2
作者 Mohamed M. Shoukri 《Open Journal of Epidemiology》 2024年第1期56-74,共19页
Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting sub... Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest. 展开更多
关键词 Limits of agreement Pitman and Morgan Tests Test of Parallelism The Arcsine Variance Stabilizing Transformation Sample Size Estimation
下载PDF
Solutions of the Growing Use of Anti-dumping Measures by Countries in Recent Decades
3
作者 橐云婷 《海外英语》 2015年第24期294-295,共2页
In recent decades, international trade has evolved into a complex system of trade barriers to ensure the protection of domestic industry and its workers interests. However as tariffs have fallen and international trad... In recent decades, international trade has evolved into a complex system of trade barriers to ensure the protection of domestic industry and its workers interests. However as tariffs have fallen and international trade tends to be free trade, countries have found another way of protecting domestic industries from foreign competition—non-tariff protection. Among them anti-dumping is the most controversial subject that is involved in the foreign trade. This theme will analyze the reason and effect of growing use anti-dumping measures by countries in recent decades and try to give some possible solutions. 展开更多
关键词 anti-dumping international TRADE TARIFF protection
下载PDF
China's Anti-dumping Legislation and Practice
4
《China's Foreign Trade》 1999年第9期31-32,共2页
关键词 In China’s anti-dumping Legislation and Practice
下载PDF
Why Has China Become a Target of Anti-dumping Activities?
5
作者 李月芬 《China Economist》 2007年第1期48-59,共12页
Although the benefits of China’s trade expansion have been distributed much more broadly than those of some early industrialized nations,China has become the primary target of anti-dumping activities.Being a new and ... Although the benefits of China’s trade expansion have been distributed much more broadly than those of some early industrialized nations,China has become the primary target of anti-dumping activities.Being a new and relatively efficient new rival in the global market may be an important reason for this.On the other hand,China’s development stage and her trade structure also place her in a disadvantageous position when it comes to anti-dumping activities. 展开更多
关键词 Why Has China Become a Target of anti-dumping Activities than
下载PDF
China's Color-Television Enterprises Respond Jointly to the EU's Anti-Dumping Proceedings
6
《China's Foreign Trade》 2000年第7期18-19,共2页
关键词 EU China’s Color-Television Enterprises Respond Jointly to the EU’s anti-dumping Proceedings
下载PDF
China Becomes the Biggest Victim of Anti-dumping on Earth
7
《China's Foreign Trade》 2001年第1期28-29,共2页
关键词 China Becomes the Biggest Victim of anti-dumping on Earth
下载PDF
Anti-dumping in Textiles and Clothing
8
《China Textile》 2009年第9期52-58,共7页
In the run up to the expiry of quota restrictions that had long regulated much of global trade in textiles and clothing, many a pundit predicted widespread recourse to anti-dumping actions.
关键词 anti-dumping in Textiles and Clothing WTO POY
下载PDF
NCTO Endorses Mexican Anti-dumping Case With China
9
《China Textile》 2010年第7期15-16,共2页
The president of the National Council of Textile Organizations(NCTO )has written a letter to the Mexican Economic Secretary Hugo Diaz strongly endorsing his country’s decision to seek a World Trade Organization(WTO)
关键词 NAFTA CASE NCTO Endorses Mexican anti-dumping Case With China
下载PDF
Improved quantum key agreement protocol with authentication
10
作者 郭继红 柏明强 +2 位作者 雷小燕 谢佳欣 莫智文 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期308-313,共6页
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica... In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks. 展开更多
关键词 quantum key agreement AUTHENTICATION six-particle entangled states
下载PDF
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
11
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
下载PDF
Anti-dumping Investigation Puts Pressure on China
12
作者 LIU Shuang 《China Textile》 2006年第3期62-63,共2页
Under the pressure of the anti- dumping investigations on silk fabrics launched by the Indian government, the China Chamber of Commerce for Import & Export of Textiles (CCCT) announced that it has decided not to h... Under the pressure of the anti- dumping investigations on silk fabrics launched by the Indian government, the China Chamber of Commerce for Import & Export of Textiles (CCCT) announced that it has decided not to hold the Silk Trade Fair (Autumn) this year, in order to avoid the negative effects the case might bring. 展开更多
关键词 anti-dumping Investigation Puts Pressure on China HIGH
下载PDF
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
13
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
下载PDF
Anti-Dumping on and from China
14
作者 Patrick H.Zhao 《China Textile》 2007年第7期21-23,共3页
The past years saw an increased cases of anti-dumping on China mostly from the developed countries,some from developing countries.But Pakistan,a friendly neighbor to China,recently adds up to that list of ranks for an... The past years saw an increased cases of anti-dumping on China mostly from the developed countries,some from developing countries.But Pakistan,a friendly neighbor to China,recently adds up to that list of ranks for an anti-dumping investigation on China.It is the national interests that count most,after all. It gives out a signal that anti-dumping would be a frequent tool to defend or to attack. Evidences show China is a target for this trade remedy,but is also targeting others. 展开更多
关键词 anti-dumping on and from China
下载PDF
Ministry of Commerce's Final Arbitration on Anti-dumping Investigation on Nonyl Pheno
15
作者 Zheng Yan 《China Textile》 2007年第4期7-7,共1页
The Ministry of Commerce of People’s Republic of China issued the Announcement No.11,2007 of
关键词 In Ministry of Commerce’s Final Arbitration on anti-dumping Investigation on Nonyl Pheno
下载PDF
China,India in sharp contrast in anti-dumping action
16
作者 齐俊妍 《China Economist》 2010年第5期16-22,共7页
Based on 1995-2008 data, the author researched China and India’s anti-dumping situations, examining the level ofinternational status and countries and industries involved, and analyzed the symmetry between China and ... Based on 1995-2008 data, the author researched China and India’s anti-dumping situations, examining the level ofinternational status and countries and industries involved, and analyzed the symmetry between China and India’sinitiation and the encounter of anti-dumping cases using the index of accusation symmetry (IA) and the index ofsanction symmetry (IS); based on this, the author surveyed India’s successful anti-dumping experiences and analyzedwhy China is frequently accused of anti-dumping, yet loses most anti-dumping petitions initiated against othercountries.The author then put forward policy suggestions regarding how to reduce the intensity of anti-dumpingaccusations filed against China and intensify the strength of its own anti-dumping actions filed against other dumpingnations. 展开更多
关键词 China INDIA anti-dumping SYMMETRY INDEX
全文增补中
部际信用治理合作备忘录:性质、效力与优化 被引量:1
17
作者 李海平 孙媛 《北京航空航天大学学报(社会科学版)》 2024年第3期30-38,共9页
合作备忘录是部际信用合作治理的重要方式。不同于行政规范性文件,合作备忘录既是公法协定中的部际协定,也是一种契约治理形态。合作备忘录遵循契约相对性一般原理,具有相对效力,但这种效力相对性也是相对的。由于科层制特有的权力结构... 合作备忘录是部际信用合作治理的重要方式。不同于行政规范性文件,合作备忘录既是公法协定中的部际协定,也是一种契约治理形态。合作备忘录遵循契约相对性一般原理,具有相对效力,但这种效力相对性也是相对的。由于科层制特有的权力结构与行政服从义务、不完善的信用立法、对个人利益的保护等,合作备忘录的效力溢出至地方公权力主体和相对人。合作备忘录具有补充信用立法、强化行政协助、促进参与式治理等优势,也存在冲击法律体系、违反法律保留原则、规避监督、缺乏合作保障等不足,因而需从合法性、规范性、民主性等方面加以优化。 展开更多
关键词 合作备忘录 部际 契约 相对效力 信用
下载PDF
环境法典编纂纳入“双碳”目标的可行路径研究 被引量:1
18
作者 潘晓滨 刘尚文 《湖北师范大学学报(哲学社会科学版)》 2024年第1期77-88,共12页
习近平总书记在党的二十大报告中明确指出要积极稳妥推进碳达峰碳中和,自我国提出“双碳”目标以来不仅在全球气候变化治理发挥了积极作用,还进一步推进了国内能源、经济等领域的低碳发展转型。通过对“双碳”目标进行辨析,相关政策与... 习近平总书记在党的二十大报告中明确指出要积极稳妥推进碳达峰碳中和,自我国提出“双碳”目标以来不仅在全球气候变化治理发挥了积极作用,还进一步推进了国内能源、经济等领域的低碳发展转型。通过对“双碳”目标进行辨析,相关政策与法律现状进行梳理,发现我国当前保障“双碳”目标存在专门法缺失、相关法的保障制度仍需完善、配套政策保障手段不足的问题。结合对法国、瑞典与德国三国的立法经验进行分析,基于我国国情,未来可以尝试于环境法典以可持续发展衔接“双碳”目标价值内涵,建立环境法典、单行法与政策的协同机制,推进“双碳”因素纳入环境影响评价与环境行政许可,合理衔接刑事责任的方式保障“双碳”目标的顺利实现。 展开更多
关键词 “双碳”目标 《巴黎协定》 环境法典 单行法
下载PDF
药品数据专有权国际立法溯源与中国制度安排
19
作者 刘鑫 《科技进步与对策》 北大核心 2024年第6期139-148,共10页
药品上市审批对于药品安全有效性数据的专门审查要求,造就了涉及药品数据的独特知识产权保护机制。基于药品数据获取的高昂投入及其对于药品仿制与后续创新的重要价值,美欧发达国家在世界范围内率先建立了药品数据保护机制,其逐渐成为... 药品上市审批对于药品安全有效性数据的专门审查要求,造就了涉及药品数据的独特知识产权保护机制。基于药品数据获取的高昂投入及其对于药品仿制与后续创新的重要价值,美欧发达国家在世界范围内率先建立了药品数据保护机制,其逐渐成为一项国际性的法律规则。无论是美欧发达国家的立法,还是相关国际法律规则,对于药品数据的知识产权保护都呈现从商业秘密模式向专有权机制转变的立法格局。产业利益驱动无疑是其中的一个重要诱因,但归根结底是源自药品数据专有权有效兼顾原研发药企经济利益与社会公众健康权益的制度优势。鉴于此,在药品数据专有权保护的国际趋势下,我国应从本土药品产业激励创新与规范仿制的基本诉求出发,以必要的内部限制与外部监管明确药品数据专有权的法律边界,并通过药品数据动态化公示平台的设置与药品数据付费使用模式的创设,建构起与药品专利制度有机衔接的数据专有权保护机制。 展开更多
关键词 药品数据专有权 药品专利保护 商业秘密 TRIPS协定 TPP协定 CPTPP协定
下载PDF
智能家居网络下基于多因子的认证密钥协商方案
20
作者 张敏 冯永强 +1 位作者 许春香 张建华 《信息网络安全》 CSCD 北大核心 2024年第1期133-142,共10页
智能家居网络通过物联网技术将智能设备相连,用户可以远程查看和控制家居设备,但信息在不安全的公共网络上传输将面临各种网络威胁,因此研究和设计安全高效且符合智能家居网络的认证密钥协商协议非常必要。2020年,WAZID等人针对智能家... 智能家居网络通过物联网技术将智能设备相连,用户可以远程查看和控制家居设备,但信息在不安全的公共网络上传输将面临各种网络威胁,因此研究和设计安全高效且符合智能家居网络的认证密钥协商协议非常必要。2020年,WAZID等人针对智能家居网络提出轻量级认证密钥协商方案(Wazid-Das方案),经过安全性分析和证明后发现,该方案过于依赖智能家居网关节点(Gateway Node,GWN),系统健壮性不高;该方案将用户和设备密钥存储在GWN中,但GWN面临特权攻击和各种外部网络攻击,并不绝对安全,且没有考虑用户的访问控制。文章在Wazid-Das方案的基础上针对智能家居网络提出一种基于切比雪夫映射(Chebyshev Chaotic Map)和安全略图(Secure Sketch)的多因子认证密钥协商方案。安全性证明和仿真实验结果表明,该方案虽然计算开销有所增加,但安全性显著提高,且通信开销大幅降低。 展开更多
关键词 智能家居 安全略图 多因子认证 切比雪夫映射 密钥协商
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部