期刊文献+
共找到9,056篇文章
< 1 2 250 >
每页显示 20 50 100
Interrater Reliability Estimation via Maximum Likelihood for Gwet’s Chance Agreement Model
1
作者 Alek M. Westover Tara M. Westover M. Brandon Westover 《Open Journal of Statistics》 2024年第5期481-491,共11页
Interrater reliability (IRR) statistics, like Cohen’s kappa, measure agreement between raters beyond what is expected by chance when classifying items into categories. While Cohen’s kappa has been widely used, it ha... Interrater reliability (IRR) statistics, like Cohen’s kappa, measure agreement between raters beyond what is expected by chance when classifying items into categories. While Cohen’s kappa has been widely used, it has several limitations, prompting development of Gwet’s agreement statistic, an alternative “kappa”statistic which models chance agreement via an “occasional guessing” model. However, we show that Gwet’s formula for estimating the proportion of agreement due to chance is itself biased for intermediate levels of agreement, despite overcoming limitations of Cohen’s kappa at high and low agreement levels. We derive a maximum likelihood estimator for the occasional guessing model that yields an unbiased estimator of the IRR, which we call the maximum likelihood kappa (κML). The key result is that the chance agreement probability under the occasional guessing model is simply equal to the observed rate of disagreement between raters. The κMLstatistic provides a theoretically principled approach to quantifying IRR that addresses limitations of previous κcoefficients. Given the widespread use of IRR measures, having an unbiased estimator is important for reliable inference across domains where rater judgments are analyzed. 展开更多
关键词 Interrater Reliability agreement RELIABILITY KAPPA
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
2
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Cautionary Remarks When Testing Agreement between Two Raters for Continuous Scale Measurements: A Tutorial in Clinical Epidemiology with Implementation Using R
3
作者 Mohamed M. Shoukri 《Open Journal of Epidemiology》 2024年第1期56-74,共19页
Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting sub... Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest. 展开更多
关键词 Limits of agreement Pitman and Morgan Tests Test of Parallelism The Arcsine Variance Stabilizing Transformation Sample Size Estimation
下载PDF
Relationship between Parent-Child Attachment and Problem Behaviors among Chinese Firstborn Children in Family Transitions: A Meta-Analysis
4
作者 Cong Liu Mohd Nazri Abdul Rahman Nur Eva 《International Journal of Mental Health Promotion》 2023年第11期1161-1172,共12页
The implementation of China’s three-child fertility policy has led to a notable increase in multiple-child families.Notably,firstborn children experience a significant transition from being an only child to a non-only ... The implementation of China’s three-child fertility policy has led to a notable increase in multiple-child families.Notably,firstborn children experience a significant transition from being an only child to a non-only child.This transition is associated with problematic behaviors,affecting their social adjustment,sibling relationships,and family harmony.Although several studies have examined the relationship between parent-child attachment and problem behaviors exhibited byfirstborn children during family transitions,thefindings have been inconsistent.Hence,a meta-analytic study was undertaken to elucidate the inconsistencies in this relationship and explore the moderating factors that may contribute to these discrepancies.Using a systematic literature retrieval and screening method,12 effect sizes were derived from the 10 eligible articles,encompassing a sample size of 5319.The meta-analysis demonstrated a low negative association between parent-child secure attachment and problem behaviors exhibited byfirstborn children during family transitions.Furthermore,the present study investigates potential moderator factors,such as children’s age and geographic region,to gain a more nuanced understanding of the relationship.Consequently,the establishment of parent-child attachment relationships has the potential to mitigate problem behaviors observed infirst-born children during family transitions.The implications of thesefindings indicate that parents can nurture secure attachment bonds with their children by demonstrating sensitive responsiveness,employing positive parenting practices,and fostering emotional availability.These efforts contribute to the cultivation of secure internal working models and positive behavioral manifestations withinfirst-born children,which in turn affect their relationships with siblings. 展开更多
关键词 parent-child attachment problem behaviors firstborn children META-ANALYSIS moderation effect
下载PDF
Improved quantum key agreement protocol with authentication
5
作者 郭继红 柏明强 +2 位作者 雷小燕 谢佳欣 莫智文 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期308-313,共6页
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica... In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks. 展开更多
关键词 quantum key agreement AUTHENTICATION six-particle entangled states
下载PDF
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
6
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
下载PDF
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
7
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
下载PDF
Children’s Health, Parent-Child Activities, Using Digital Devices, and Social Competence: Serial Mediation
8
作者 Ching-Fen Lee Shain-May Tang 《Health》 2023年第8期883-894,共12页
Background: Studies have pointed out the influence of different children’s activities and prolonged use of digital products on their social development. However, whether the parent-child activities and using digital ... Background: Studies have pointed out the influence of different children’s activities and prolonged use of digital products on their social development. However, whether the parent-child activities and using digital devices were serial mediators of the relationship between children’s health and social development needs further verification. Purpose: This study explored how parent-child activities and children’s use of digital devices influence the relationship between children’s health and their social competence. Method: This study used data from Kids in Taiwan: National Longitudinal Study of Child Development and Care. A total sample of 2164 participants was used in this study. Serial mediation analyses were performed using model six of Hayes’ PROCESS (2012). Results: This study found that parent-child activities and the use of digital devices can serially mediate the relationship between children’s health and social competence. Children’s health could directly improve their social competence, but it could also serially mediate social competence by increasing parent-child activities and reducing the use of digital devices. Conclusion: Childcare policy planners and parenting educators should not only call on parents to reduce the use of electronic products for their children, but also encourage parents to spend more time interacting with their children, so that children can learn social skills by interacting with others in their daily lives. 展开更多
关键词 Children’s Health Social Competence parent-child Activities Using Digital Devices PRESCHOOLER
下载PDF
药品数据专有权国际立法溯源与中国制度安排 被引量:1
9
作者 刘鑫 《科技进步与对策》 CSSCI 北大核心 2024年第6期139-148,共10页
药品上市审批对于药品安全有效性数据的专门审查要求,造就了涉及药品数据的独特知识产权保护机制。基于药品数据获取的高昂投入及其对于药品仿制与后续创新的重要价值,美欧发达国家在世界范围内率先建立了药品数据保护机制,其逐渐成为... 药品上市审批对于药品安全有效性数据的专门审查要求,造就了涉及药品数据的独特知识产权保护机制。基于药品数据获取的高昂投入及其对于药品仿制与后续创新的重要价值,美欧发达国家在世界范围内率先建立了药品数据保护机制,其逐渐成为一项国际性的法律规则。无论是美欧发达国家的立法,还是相关国际法律规则,对于药品数据的知识产权保护都呈现从商业秘密模式向专有权机制转变的立法格局。产业利益驱动无疑是其中的一个重要诱因,但归根结底是源自药品数据专有权有效兼顾原研发药企经济利益与社会公众健康权益的制度优势。鉴于此,在药品数据专有权保护的国际趋势下,我国应从本土药品产业激励创新与规范仿制的基本诉求出发,以必要的内部限制与外部监管明确药品数据专有权的法律边界,并通过药品数据动态化公示平台的设置与药品数据付费使用模式的创设,建构起与药品专利制度有机衔接的数据专有权保护机制。 展开更多
关键词 药品数据专有权 药品专利保护 商业秘密 TRIPS协定 TPP协定 CPTPP协定
下载PDF
5G车联网中安全高效的组播服务认证与密钥协商方案 被引量:1
10
作者 张应辉 李国腾 +2 位作者 韩刚 曹进 郑东 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第7期3026-3035,共10页
5G车联网(5G-V2X)中,内容提供者通过以点对多的传输方式向属于特定区域的一组车辆提供服务消息。针对于车辆获取组播服务遭受的安全威胁与隐私泄露问题,该文提出一种认证和密钥协商方案用于内容提供者与车辆之间的组播服务消息传输。首... 5G车联网(5G-V2X)中,内容提供者通过以点对多的传输方式向属于特定区域的一组车辆提供服务消息。针对于车辆获取组播服务遭受的安全威胁与隐私泄露问题,该文提出一种认证和密钥协商方案用于内容提供者与车辆之间的组播服务消息传输。首先,采用无证书聚合签名技术批量验证群组内所有车辆,提高了认证请求的效率。其次,基于多项式密钥管理技术实现安全的密钥协商,使得非法用户或核心网络无法获取共享会话密钥。最后,实现了群组内车辆的动态密钥更新机制,当车辆加入或离开群组时,内容提供者只需要发送1条密钥更新消息即可更新会话密钥。基于形式化验证工具和进一步安全性分析表明,所提方案可以保证匿名性、不可链接性、前向和后向安全性以及抗共谋攻击等安全需求。与现有方案相比,计算效率提高了约34.2%。 展开更多
关键词 5G车联网 认证 密钥协商 动态群组 组播
下载PDF
部际信用治理合作备忘录:性质、效力与优化 被引量:1
11
作者 李海平 孙媛 《北京航空航天大学学报(社会科学版)》 CSSCI 2024年第3期30-38,共9页
合作备忘录是部际信用合作治理的重要方式。不同于行政规范性文件,合作备忘录既是公法协定中的部际协定,也是一种契约治理形态。合作备忘录遵循契约相对性一般原理,具有相对效力,但这种效力相对性也是相对的。由于科层制特有的权力结构... 合作备忘录是部际信用合作治理的重要方式。不同于行政规范性文件,合作备忘录既是公法协定中的部际协定,也是一种契约治理形态。合作备忘录遵循契约相对性一般原理,具有相对效力,但这种效力相对性也是相对的。由于科层制特有的权力结构与行政服从义务、不完善的信用立法、对个人利益的保护等,合作备忘录的效力溢出至地方公权力主体和相对人。合作备忘录具有补充信用立法、强化行政协助、促进参与式治理等优势,也存在冲击法律体系、违反法律保留原则、规避监督、缺乏合作保障等不足,因而需从合法性、规范性、民主性等方面加以优化。 展开更多
关键词 合作备忘录 部际 契约 相对效力 信用
下载PDF
国家力量的双重进入与村规民约的重塑——基于215份优秀村规民约的文本分析 被引量:1
12
作者 陈锋 徐悦鑫 《学习与实践》 CSSCI 北大核心 2024年第3期24-35,共12页
国家权力主要通过国家的“村规民约化”和村规民约的“国家化”两种方式进入到乡土社会中。国家力量与地方非正式规范的遭遇中,嵌入地方知识的同时将其纳入到国家的规则体系之下规范化地运行。当代村规民约在承担更多的国家政策的转译... 国家权力主要通过国家的“村规民约化”和村规民约的“国家化”两种方式进入到乡土社会中。国家力量与地方非正式规范的遭遇中,嵌入地方知识的同时将其纳入到国家的规则体系之下规范化地运行。当代村规民约在承担更多的国家政策的转译与国家规范化要求的同时也面临着治理资源不足的困境,因此当代村规民约需要以治理有效为目标引入多元复合的治理手段,以交错配置的方式来完成其治理内容。村规民约的性质也从传统时期的非正式制度转向“自治、法治、德治”相融合的制度载体。 展开更多
关键词 村规民约 国家化 三治融合
下载PDF
网络通信中嵌入式TCP/IP协议单片机技术的应用 被引量:2
13
作者 刘崇巍 《中国高新科技》 2024年第5期47-49,共3页
嵌入式系统已经是当前网络通信的主要技术。单片机在嵌入式系统开发与实现中的多个环节发生作用。为此,文章重点探讨在网络通信系统嵌入式协议中单片机的具体应用。首先对嵌入式协议技术的总体架构与技术细节进行了汇总;其次对单片机技... 嵌入式系统已经是当前网络通信的主要技术。单片机在嵌入式系统开发与实现中的多个环节发生作用。为此,文章重点探讨在网络通信系统嵌入式协议中单片机的具体应用。首先对嵌入式协议技术的总体架构与技术细节进行了汇总;其次对单片机技术及其作用进行了探讨;最后从多个方面分别分析了单片机在具体电路中的应用。以期为后续的产品开发与技术应用奠定基础。 展开更多
关键词 网络通信 嵌入式 协议 单片机技术
下载PDF
区域贸易协定中竞争政策规则对出口国内增加值的影响研究 被引量:1
14
作者 孙玉红 李金哲 张奇 《首都经济贸易大学学报》 CSSCI 北大核心 2024年第1期51-65,共15页
以64个国家1995—2017年141个区域贸易协定为样本,在测度竞争政策规则深度的基础上,实证考察其对出口国内增加值的影响。研究结果表明:竞争政策规则的强化有助于提升缔约方出口国内增加值。该结果经过稳健性检验后依然成立。机制分析结... 以64个国家1995—2017年141个区域贸易协定为样本,在测度竞争政策规则深度的基础上,实证考察其对出口国内增加值的影响。研究结果表明:竞争政策规则的强化有助于提升缔约方出口国内增加值。该结果经过稳健性检验后依然成立。机制分析结果表明,缔约方制度质量加强了竞争政策规则对出口国内增加值的促进作用,但区域贸易协定灵活度会阻碍该促进作用。区分条款发现,横向原则与国有企业条款可以促进出口国内增加值;区分国别发现,竞争政策规则对不同经济发展水平国家出口国内增加值存在异质性影响。进一步分析发现,竞争政策规则的强化对第三方国家存在溢出效应。因此,中国应有意识地强化竞争政策的基础性地位,合理设计竞争政策条款并逐步提升执行度,打造更为开放透明、公平竞争的市场环境。 展开更多
关键词 区域贸易协定 竞争政策规则 增加值贸易 出口国内增加值 真实利得
下载PDF
环境法典编纂纳入“双碳”目标的可行路径研究 被引量:2
15
作者 潘晓滨 刘尚文 《湖北师范大学学报(哲学社会科学版)》 2024年第1期77-88,共12页
习近平总书记在党的二十大报告中明确指出要积极稳妥推进碳达峰碳中和,自我国提出“双碳”目标以来不仅在全球气候变化治理发挥了积极作用,还进一步推进了国内能源、经济等领域的低碳发展转型。通过对“双碳”目标进行辨析,相关政策与... 习近平总书记在党的二十大报告中明确指出要积极稳妥推进碳达峰碳中和,自我国提出“双碳”目标以来不仅在全球气候变化治理发挥了积极作用,还进一步推进了国内能源、经济等领域的低碳发展转型。通过对“双碳”目标进行辨析,相关政策与法律现状进行梳理,发现我国当前保障“双碳”目标存在专门法缺失、相关法的保障制度仍需完善、配套政策保障手段不足的问题。结合对法国、瑞典与德国三国的立法经验进行分析,基于我国国情,未来可以尝试于环境法典以可持续发展衔接“双碳”目标价值内涵,建立环境法典、单行法与政策的协同机制,推进“双碳”因素纳入环境影响评价与环境行政许可,合理衔接刑事责任的方式保障“双碳”目标的顺利实现。 展开更多
关键词 “双碳”目标 《巴黎协定》 环境法典 单行法
下载PDF
“村规-村建-村管”联动的乡村建设路径探索——以浙江省余村乡村共同缔造实验为例 被引量:2
16
作者 刘迪 《城市规划》 CSSCI CSCD 北大核心 2024年第9期57-66,共10页
历史上长期的城乡二元制度,使得城与乡在土地使用和行政运行机制等方面存在巨大差异,使得我国在城镇建设中取得的巨大成功与经验难以复制到乡村建设领域。掺杂有城市规划思维烙印的村庄规划长期存在不实用、不适用,以及与村庄建设、村... 历史上长期的城乡二元制度,使得城与乡在土地使用和行政运行机制等方面存在巨大差异,使得我国在城镇建设中取得的巨大成功与经验难以复制到乡村建设领域。掺杂有城市规划思维烙印的村庄规划长期存在不实用、不适用,以及与村庄建设、村庄运营维护管理脱节的问题。通过对比乡村建设与城市建设的模式差异,以共同缔造理念为依托,在学界已有实践认知的基础上,提出围绕事权主体的“实用性”村庄规划、基于村民主体需求的“内生型”乡村建设行动和面向多元主体参与的“自治型”村规民约。按照“村规、村建、村管”的共同缔造路径,提出乡村建设的全过程治理策略,并以浙江省余村村庄规划为实验案例,对全过程治理策略进行了实证分析。 展开更多
关键词 共同缔造 乡村振兴 村庄规划 乡村建设 余村 村规民约
下载PDF
政府合同概念的体系化重构 被引量:2
17
作者 韩宁 《上海交通大学学报(哲学社会科学版)》 CSSCI 北大核心 2024年第2期63-83,共21页
现有政府合同管理规范对政府合同的内涵和外延进行了界定,但学理意义上的概念构造尚未完成,“政府合同=行政协议+缔结主体一方为行政机关的民事合同”之结论存在缺陷。通过把合同还原为通用于各部门法的中性工具,将政府合同的研究视角... 现有政府合同管理规范对政府合同的内涵和外延进行了界定,但学理意义上的概念构造尚未完成,“政府合同=行政协议+缔结主体一方为行政机关的民事合同”之结论存在缺陷。通过把合同还原为通用于各部门法的中性工具,将政府合同的研究视角从救济前移至行政过程,政府合同的识别标准被调整为“行政机关与任何主体订立的合同均为政府合同”。以行政任务为出发点,可将政府合同区分为公务型政府合同和管理型政府合同,公务型政府合同可被进一步区分为内部公务型政府合同与外部公务型政府合同。以救济途径为落脚点,可以将政府合同区分为行政协定与非行政协定,非行政协定可被进一步区分为行政协议、民事合同、磋商性文件和劳动人事协议,其中,民事合同和行政协议属于狭义政府合同。将两条基于不同场景的体系化路径进行对接与融合,有助于形成对政府合同概念相对立体的认知,动态还原政府合同概念的全貌。 展开更多
关键词 政府合同 行政协议 合同 行政协定 公务型政府合同 管理型政府合同
下载PDF
RTA知识产权保护强度对出口贸易稳定性的影响研究 被引量:2
18
作者 高越 诸帆 《产业经济研究》 CSSCI 北大核心 2024年第1期115-128,共14页
在国际贸易不确定性加剧的背景下,RTA知识产权保护强度对其成员国间出口贸易有着重要的影响。基于DESTA数据库2003—2020年间有效运行的RTA,选取有RTA关系的165个国家组成的2927组国家对作为研究对象,测度了RTA的知识产权保护强度,并构... 在国际贸易不确定性加剧的背景下,RTA知识产权保护强度对其成员国间出口贸易有着重要的影响。基于DESTA数据库2003—2020年间有效运行的RTA,选取有RTA关系的165个国家组成的2927组国家对作为研究对象,测度了RTA的知识产权保护强度,并构建回归模型探究RTA知识产权保护强度对出口贸易稳定性的影响。研究发现:RTA知识产权保护强度越大,越有利于提高RTA成员国间出口贸易的稳定性。此外,国家间信息流动性越强,以及进口国经济自由度越高,RTA知识产权保护对出口贸易稳定性的促进作用就越强。该效应对于不同类型国家和不同出口行业而言不一样:RTA知识产权保护对南北国家间的双边出口贸易稳定有促进作用,而对南南国家和北北国家间的促进作用不显著;对动植物及食品制造类,皮革、纺织及杂制类,电子、化工及机械制造类行业出口贸易稳定有促进作用。这些研究结论对国家间开展贸易合作,签订合理知识产权保护强度的RTA,维护长久稳定的出口贸易关系具有重要意义。 展开更多
关键词 出口贸易稳定性 知识产权保护 RTA 条款执行力度 条款覆盖范围广度
下载PDF
行政协议单方变更解除权的规范行使研究 被引量:1
19
作者 李会勋 赵美玉 《北京科技大学学报(社会科学版)》 2024年第1期114-123,共10页
《最高人民法院关于审理行政协议案件若干问题的规定》明确了行政机关享有基于优益权的行政协议单方变更解除权。行政机关依据公共利益优先、平衡公私利益及契约精神等理念行使单方变更解除权。文章通过分析司法实践中的案例,发现了行... 《最高人民法院关于审理行政协议案件若干问题的规定》明确了行政机关享有基于优益权的行政协议单方变更解除权。行政机关依据公共利益优先、平衡公私利益及契约精神等理念行使单方变更解除权。文章通过分析司法实践中的案例,发现了行政机关单方变更解除行政协议的依据不清晰、程序适用不规范、赔偿补偿标准不明确、与民事合同的变更解除区分不明确等问题,指出须明晰权力行使依据,规范行使程序,明确补偿方式及标准,区分单方变更解除权与民事变更解除。 展开更多
关键词 行政协议 行政优益权 单方变更解除权 公共利益
下载PDF
适用于智能家居的格上基于身份多方认证密钥协商协议 被引量:1
20
作者 倪亮 刘笑颜 +3 位作者 谷兵珂 张亚伟 周恒昇 王念平 《计算机应用研究》 CSCD 北大核心 2024年第4期1191-1197,共7页
随着物联网应用的日益普及,物联网设备终端数量激增、种类多样、层次复杂,常处于不可控的环境之中,因此,确保数据传输过程的安全性和隐私性至关重要。对基于物联网架构的智能家居服务进行探讨得出,启用智能家居应用需涉及多个方面,如用... 随着物联网应用的日益普及,物联网设备终端数量激增、种类多样、层次复杂,常处于不可控的环境之中,因此,确保数据传输过程的安全性和隐私性至关重要。对基于物联网架构的智能家居服务进行探讨得出,启用智能家居应用需涉及多个方面,如用户、云、物联网智能集线器(the IoT smart hub,ISH)和智能设备,它们需要多方验证以进行安全通信。由此提出了一种针对智能家居应用的格上基于身份多方认证密钥协商协议,并证明在eCK模型下是安全的。其安全性可以归约到环上带误差学习(ring learning with errors,RLWE)问题的困难性,能够抗量子计算攻击。所提协议由一个格上基于身份的加密方案转换而成,无须公钥证书,避免了部署一个庞大的公钥基础设施(public key infrastructure,PKI)。通过信息交互实现显式认证,且可具有一定的匿名性质,与其他相关的后量子格上多方认证密钥协商协议方案相比,该协议在安全性和执行效率方面更具优势。 展开更多
关键词 智能家居 基于身份密码 环上带误差学习 多方认证密钥协商协议 后量子密码 匿名性
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部