期刊文献+
共找到1,755篇文章
< 1 2 88 >
每页显示 20 50 100
Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings 被引量:12
1
作者 SHAOZu-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期267-270,共4页
An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl... An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure. 展开更多
关键词 authenticated key agreement protocol self-certified public keys bilinearpairings
下载PDF
Three-dimensional modelling of shear keys in concrete gravity dams using an advanced grillage method 被引量:1
2
作者 Mahdi Ben Ftima Steephane Lafrance Pierre Leeger 《Water Science and Engineering》 EI CAS CSCD 2020年第3期223-232,共10页
Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to ... Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to be avoided.This paper presents a novel,robust,and computationally efficient three-dimensional(3D)modelling and simulation strategy of gravity dams,using a series of adjacent cantilever beam elements to represent individual monoliths.These monoliths are interconnected in the longitudinal direction by 3D no-tension link elements representing the lumped shear key stiffness contributions at a particular elevation.The objective is to assess the shear key internal force demands,including the axial force,shear,and moment demands.Shear key demand-capacity ratios can then be assessed with related multi-axial failure envelopes.The 3D link element stiffness coefficients were derived from a series of 3D finite element(FE)solid models with a detailed representation of geometrical features of multiple shear keys.The results from the proposed method based on advanced grillage analysis show strong agreement with reference solutions from 3D FE solid models,demonstrating high accuracy and performance of the proposed method.The application of the proposed advanced grillage method to a dam model with two monoliths clearly shows the advantage of the proposed method,in comparison to the classical approach used in practise. 展开更多
关键词 Gravity dam Shear keys Seismic analysis Grillage analysis Finite element model Multi-scale approach
下载PDF
Effect of mechanical degradation of laminated elastomeric bearings and shear keys upon seismic behaviors of small-to-medium-span highway bridges in transverse direction 被引量:2
3
作者 Wu Gang Wang Kehai +1 位作者 Zhang Panpan Lu Guanya 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2018年第1期205-220,共16页
Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seism... Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seismic responses more accurately, proper analytical models of bearings and shear keys should be developed. Based on a series of cyclic loading experiments and analyses, rational analytical models of laminated elastomeric bearings and shear keys, which can consider mechanical degradation, were developed. The effect of the mechanical degradation was investigated by examining the seismic response of a small-to-medium-span bridge in the transverse direction under a wide range of peak ground accelerations(PGA). The damage mechanism for small-to-medium-span highway bridges was determined, which can explain the seismic damage investigation during earthquakes in recent years. The experimental results show that the mechanical properties of laminated elastomeric bearings will degrade due to friction sliding, but the degree of decrease is dependent upon the influencing parameters. It can be concluded that the mechanical degradation of laminated elastomeric bearings and shear keys play an important role in the seismic response of bridges. The degradation of mechanical properties of laminated elastomeric bearings and shear keys should be included to evaluate more precise bridge seismic performance. 展开更多
关键词 bridge engineering mechanical degradation seismic response friction sliding shear keys
下载PDF
Dyke Swarms: Keys to Paleogeographic Reconstructions, Preface for IDC7 2016
4
作者 PENG Peng Richard ERNST 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2016年第S1期3-5,共3页
Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It... Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It has continued approximately every five years with 展开更多
关键词 IDC Dyke Swarms keys to Paleogeographic Reconstructions Preface for IDC7 2016
下载PDF
Variation in Stomatal Characteristics of <i>Bursera simaruba</i>(L.) Sarg., a Dominant Tree Species of Tropical Hardwood Hammock Forest across a Habitat Gradient in the Florida Keys
5
作者 Suresh C. Subedi Michael S. Ross +2 位作者 Rosario Vidales Jay P. Sah Leonel Sternberg 《American Journal of Plant Sciences》 2018年第10期2120-2139,共20页
Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a... Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a periodically stressful environment. To examine these responses, we sought to answer two primary research questions: a) how is variation in B. simaruba’s stomatal traits partitioned across hierarchical levels, i.e., site, tree, and leaf;and b) is variation in stomatal traits an integrated response to physiological stress expressed across the habitat gradient of Florida Keys forests? At eight sites distributed throughout the Keys, five leaves were collected from three mature trees for stomatal analysis. Leaf carbon stable isotope ratio (δ13C) was determined to infer the changes in water use efficiency caused by physiological stress experienced by each tree. The results showed that substantial proportions of the total variance in three traits (stomatal density, stomatal size, and δ13C) were observed at all levels, suggesting that processes operating at each scale are important in determining trait values. A significant negative correlation between stomatal density and size across scales was observed. Path model analysis showed that environmental variables, distance to ground water and ground water salinity, affect leaf δ13C indirectly, via its effects on stomatal traits, not directly to leaf δ13C. Therefore, the combination of small and densely distributed stomata seems to represent a strategy that allows B. simaruba to conserve water under conditions of physiological drought induced by either higher ground water salinity or flooding stress at very low elevation. 展开更多
关键词 STOMATAL Density STOMATAL Size δ13C Bursera simaruba Dry TROPICAL FOREST Florida keys
下载PDF
School-based physical activity interventions for children and youth:Keys for success
6
作者 Arto Grastén 《Journal of Sport and Health Science》 SCIE 2017年第3期290-291,共2页
Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence tha... Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence that past physical activity(PA)interventions have had only a small effect on children’s and youth’s overall activity levels,~2it is important to clarify whether school-based PA interventions warrant resource allocation.Schools represent an accessible and cost-effective 展开更多
关键词 School-based physical activity interventions for children and youth:keys for success PE
下载PDF
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
7
作者 Abdulrahman H. Altalhi 《Communications and Network》 2012年第1期83-87,共5页
A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is... A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is no central entity with the authority to administer the services and configurations of the network. How to secure a MANET is an active field of study for researchers. However, most of the research on the topic of securing the MANETs has focused on adapting security mechanisms that were meant for traditional wired networks. This adaptation has resulted in security solutions that do not work efficiently or that make assumptions that are not in line with the properties and characterizations of MANETs. In this paper, we propose the use of security mechanisms for MANETs that are designed based on the characteristics, functionalities, and goals of such networks. We aim to initiate a paradigm shift in securing MANETs, in which the focus should be on building security solutions specifically developed for MANETs, and not on adapting solutions that were meant for conventional wired networks. We revisit the basics and propose a simple encryption keys creation scheme that is based on the Diffie-Hellman key agreement protocol. The work presented in this paper should mark the initiation of a research agenda designed to build security primitives that are specifically for MANETs, along the lines of the new paradigm. 展开更多
关键词 keys Management MANET Security SYMMETRIC ENCRYPTION keys
下载PDF
A Brief Parametric Analysis of Catastrophic or Disastrous Hurricanes That Have Hit the Florida Keys between 1900 and 2000
8
作者 J. M. D’Andrea 《American Journal of Computational Mathematics》 2018年第1期1-6,共6页
The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960,... The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960, 1965, and 1992. In this paper, we will present a brief parametric analysis of the hurricanes that have hit the Florida Keys in the last 100 years. This analysis will include the descriptive statistics, best fit probability distribution of the latitude of the catastrophic hurricanes and a confidence interval that detects the average latitude of hurricanes (category 3 or higher) which have hit the Florida Keys in the last 100 years. 展开更多
关键词 Florida keys Hurricanes Parametric Analysis Statistics Probability Distributions LATITUDE CONFIDENCE INTERVALS
下载PDF
自订个人化窗口快捷键Active Keys
9
作者 林荣生 《ComputerDIY.电脑DIY》 2001年第12期87-87,共1页
关键词 ACTIVE keys 个人化窗口快捷键 工具软件
下载PDF
KeyStone多核DSP中断系统原理及实现 被引量:1
10
作者 陈玉生 《电子世界》 2015年第13期23-25,35,共4页
本文概述Key Stone多核DSP中断系统的架构,分析DSP中断系统原理以及中断系统的实现,最后以TCI6614GPIO为例说明中断系统的实现。
关键词 KEY Stone多核DSP 中断系统
下载PDF
An Experimental Study on the Behavior of Shear Keys According to the Curing Time of UHPC 被引量:7
11
作者 Hee Seok Kim Won Jong Chin +2 位作者 Jeong Rae Cho Young Jin Kim Hyejin Yoon 《Engineering(科研)》 2015年第4期212-218,共7页
Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection syste... Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection system of structures using Ultra High Performance Concrete (UHPC). However, this method requires the presence of segmental joints to transfer the loads between neighboring segments, which stresses the importance of securing structural safety and serviceability. Therefore, need is for research on the behavior of the segmental joint for the structures erected by the precast segmental construction method. To that goal, this paper presents an experimental study on the behavior of shear keys with respect to the curing time of UHPC in the segmental joint. Analysis is done on the load-displacement relation according to the curing time of the shear keys and on the failure modes of the shear keys according to the cracking pattern at failure. 展开更多
关键词 Ultra High Performance Concrete PRECAST SEGMENTAL Joint CURING Time SHEAR KEY
下载PDF
Batch Private Keys Generation for RSA in Security Communication Systems 被引量:1
12
作者 陈运 陈新 《Journal of Electronic Science and Technology of China》 2005年第1期22-26,共5页
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complex... RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users. 展开更多
关键词 information security system public key cryptosystem RSA key generation
下载PDF
Depressed female cynomolgus monkeys(Macaca fascicularis) display a higher second-to-fourth(2D:4D)digit ratio
13
作者 Wei Li Ling-Yun Luo +6 位作者 Xun Yang Yong He Bin Lian Chao-Hua Qu Qing-Yuan Wu Jian-Guo Zhang Peng Xie 《Zoological Research》 SCIE CAS CSCD 2019年第3期219-225,共7页
This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed mo... This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed monkeys based on depressive-like behavioral criteria and 16 normal control mon keys.All animals were video recorded for two weeks,with the duration and frequency of the core depressive behaviors and 58 other behaviors in 12 behavioral categories then evaluated via behavioral analysis.Fin ger len gths from the right and left forelimb hands of both groups were measured by X-ray imagi ng.Fin ger length and digit ratio comparisons between the two groups were con ducted using Stude nt's Mest.In terms of the durati on of each behavior,signifies nt differences emerged in“Huddling”and five other behavioral categories,including Ingestive,Amicable,Parental,Locomotive,and Resting.In addition to the above five behavioral categories,we found that depressed mon keys spent less time in parental and rubbing back and forth behaviors than the control group.Furthermore,the 4th fin gers were significantly Ion ger in the left and right hands in the control group relative to the depressed mon keys.The sec ond?to?fourth(2D:4D)digit ratio in the left and right forelimb hands was significantly lower in the control group tha n that in the depressed group.Our fin dings revealed significant differences in finger lengths and digit ratios between depressed mon keys and healthy controls,which concords with our view that relatively high fetal testosterone exposure may be a protective factor against developing depressive symptoms(or that low fetal testosterone exposure is a risk factor). 展开更多
关键词 FIN ger length DIGIT ratio Major DEPRESSIVE disorder CYNOMOLGUS MON key
下载PDF
Never Lost Keys:A Novel Key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
14
作者 Yichuan Wang Dan Wu +1 位作者 Xiaoxue Liu Xinhong Hei 《China Communications》 SCIE CSCD 2022年第7期172-184,共13页
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerpr... Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerprint recognition and facial recognition are poor in randomness and can be forged easily.According to the characteristics of Electroencephalographic(EEG)signals such as the randomness,nonlinear and non-stationary etc.,it can significantly avoid these flaws.This paper proposes a novel method to generate keys based on EEG signals with end-edgecloud collaboration computing.Using sensors to measure motor imagery EEG data,the key is generated via pre-processing,feature extraction and classification.Experiments show the total time consumption of the key generation process is about 2.45s.Our scheme is practical and feasible,which provides a research route to generate biometric keys using EEG data. 展开更多
关键词 EEG biometric key generation end-edgecloud system information security
下载PDF
New Weak Keys in RSA
15
作者 WANG Baocang LIU Shuanggen HU Yupu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1529-1532,共4页
The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by... The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q). 展开更多
关键词 integer factorization RSA number public key cryptosystem special-purpose algorithm
下载PDF
A New Threshold Signature Scheme Using Self-Certified Public Keys
16
作者 SHAOJun LURong-xing CAOZhen-fu 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期263-266,共4页
To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation... To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive. 展开更多
关键词 self-certified threshold signature public key cryptosy stems
下载PDF
Extracting Cryptographic Keys from.NET Applications
17
作者 Shaun Mc Brearty william Farrelly Kevin Curran 《Semiconductor Science and Information Devices》 2021年第2期1-11,共11页
In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievingh... In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievinghigh-value data in plaintext form and/or the associated decryption key.Inthis paper,the author presents a number of simple methods for identifyingand extracting crypfographic keys from memory dumps of softwareapplications that utilize the Microsoft.NET Framework,as well as source-code level countermeasures to protect against same.Given the EXE file ofan application and a basic knowledge of the cryptographic libraries utilizedin the NET Framework,the author shows how to create a memory dumpof a running application and how to extract cryptographic keys from sameusing WinDBG-without any prior knowledgel of the cryptographic keyutilized.Whilst the proof-of-concept application utilized as part of thispaper uses an implementation of the DES cipher,it should be noted that thesteps shown can be utilized against all three generations of symmetric andasymmetric ciphers supported within the NET Framework. 展开更多
关键词 CRYPTOGRAPHY CRYPTANALYSIS Memory dump analysis Memory hygiene Key finding attack Secure coding .NET framework
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
18
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
Effects of shear keys on nonlinear seismic responses of an arch-gravity dam 被引量:2
19
作者 JIANG ShouYan 1,DU ChengBin 1 &YUAN JuWei 2 1 Department of Engineering Mechanics,Hohai University,Nanjing 210098,China 2 Jiangsu Hongji Science and Technology Company.,Ltd.,Nanjing 210008,China 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第S1期18-27,共10页
In the paper,the added tangential nonlinear springs are introduced to represent the effects of one-way and two-way shear keys. The added tangential stiffness coefficient is relative to the joint opening and the relati... In the paper,the added tangential nonlinear springs are introduced to represent the effects of one-way and two-way shear keys. The added tangential stiffness coefficient is relative to the joint opening and the relative tangential movement and determined numerically by using a refined model of shear keys.The user subroutine of nonlinear spring elements has been implemented into ABAQUS program.The seismic responses of an arch-gravity dam are mainly examined.It is shown by the results that a significant increase of about 17%-30%in joint opening can be observed for the dam with one-way shear keys;the two-way shear keys are beneficial to restrain the sliding displacement along both the radial and vertical directions,whereas the one-way shear keys mainly restrain the displacement along the radial direction;for the dam with shear keys,the maximum arch stress is increased,the cantilever stress is reduced,and the location of the maximum cantilever stress is also moved from the dam heel to the midheight of the cantilever. 展开更多
关键词 seismic responses arch-gravity DAM CONTRACTION joints shear keys nonlinear spring elements
原文传递
A new quantum key distribution resource allocation and routing optimization scheme
20
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
上一页 1 2 88 下一页 到第
使用帮助 返回顶部