期刊文献+
共找到9,039篇文章
< 1 2 250 >
每页显示 20 50 100
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
1
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Interrater Reliability Estimation via Maximum Likelihood for Gwet’s Chance Agreement Model
2
作者 Alek M. Westover Tara M. Westover M. Brandon Westover 《Open Journal of Statistics》 2024年第5期481-491,共11页
Interrater reliability (IRR) statistics, like Cohen’s kappa, measure agreement between raters beyond what is expected by chance when classifying items into categories. While Cohen’s kappa has been widely used, it ha... Interrater reliability (IRR) statistics, like Cohen’s kappa, measure agreement between raters beyond what is expected by chance when classifying items into categories. While Cohen’s kappa has been widely used, it has several limitations, prompting development of Gwet’s agreement statistic, an alternative “kappa”statistic which models chance agreement via an “occasional guessing” model. However, we show that Gwet’s formula for estimating the proportion of agreement due to chance is itself biased for intermediate levels of agreement, despite overcoming limitations of Cohen’s kappa at high and low agreement levels. We derive a maximum likelihood estimator for the occasional guessing model that yields an unbiased estimator of the IRR, which we call the maximum likelihood kappa (κML). The key result is that the chance agreement probability under the occasional guessing model is simply equal to the observed rate of disagreement between raters. The κMLstatistic provides a theoretically principled approach to quantifying IRR that addresses limitations of previous κcoefficients. Given the widespread use of IRR measures, having an unbiased estimator is important for reliable inference across domains where rater judgments are analyzed. 展开更多
关键词 Interrater Reliability agreement RELIABILITY KAPPA
下载PDF
Cautionary Remarks When Testing Agreement between Two Raters for Continuous Scale Measurements: A Tutorial in Clinical Epidemiology with Implementation Using R
3
作者 Mohamed M. Shoukri 《Open Journal of Epidemiology》 2024年第1期56-74,共19页
Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting sub... Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest. 展开更多
关键词 Limits of agreement Pitman and Morgan Tests Test of Parallelism The Arcsine Variance Stabilizing Transformation Sample Size Estimation
下载PDF
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
4
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
下载PDF
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
5
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
下载PDF
Improved quantum key agreement protocol with authentication
6
作者 郭继红 柏明强 +2 位作者 雷小燕 谢佳欣 莫智文 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期308-313,共6页
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica... In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks. 展开更多
关键词 quantum key agreement AUTHENTICATION six-particle entangled states
下载PDF
Assessing Disagreement and Tolerance of Misclassification of Satellite-derived Land Cover Products Used in WRF Model Applications 被引量:6
7
作者 高浩 贾根锁 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2013年第1期125-141,共17页
As more satellite-derived land cover products used in the study of global change, especially climate modeling, assessing their quality has become vitally important. In this study, we developed a distance metric based ... As more satellite-derived land cover products used in the study of global change, especially climate modeling, assessing their quality has become vitally important. In this study, we developed a distance metric based on the parameters used in weather research and forecasting (WRF) to characterize the degree of disagreement among land cover products and to identify the tolerance for misclassification within the International Geosphere Biosphere Programme (IGBP) classification scheme. We determined the spatial degree of disagreement and then created maps of misclassification of Moderate Resolution Imaging Spectoradiometer (MODIS) products, and we calculated overall and class-specific accuracy and fuzzy agreement in a WRF model. Our results show a high level of agreement and high tolerance of misclassification in the WRF model between large-scale homogeneous landscapes, while a low level of agreement and tolerance of misclassification appeared in heterogeneous landscapes. The degree of disagreement varied significantly among seven regions of China. The class-specific accuracy and fuzzy agreement in MODIS Collection 4 and 5 products varied significantly. High accuracy and fuzzy agreement occurred in the following classes: water, grassland, cropland, and barren or sparsely vegetated. Misclassification mainly occurred among specific classes with similar plant functional types and low discriminative spectro-temporal signals. Some classes need to be improved further; the quality of MODIS land cover products across China still does not meet the common requirements of climate modeling. Our findings may have important implications for improving land surface parameterization for simulating climate and for better understanding the influence of the land cover change on climate. 展开更多
关键词 land cover MODIS DISagreement TOLERANCE fuzzy agreement
下载PDF
Extended Asymmetric Group Key Agreement for Dynamic Groups and Its Applications 被引量:1
8
作者 伍前红 张欣雨 +2 位作者 唐明 尹鹏 邱镇龙 《China Communications》 SCIE CSCD 2011年第4期32-40,共9页
Group Key Agreement(GKA)is a cryptographic primitive allowing two or more entities to negotiate a shared session key over public networks.In existing GKA models,it is an open problem to construct a one-round multi-par... Group Key Agreement(GKA)is a cryptographic primitive allowing two or more entities to negotiate a shared session key over public networks.In existing GKA models,it is an open problem to construct a one-round multi-party GKA protocol.Wu et al.recently proposed the concept of asymmetric group key agreement(ASGKA)and realized a one-round ASGKA protocol,which affirmatively answers the above open problem in a relaxed way.However,the ASGKA protocol only applies to static groups.To fill this gap,this paper proposes an extended ASGKA protocol based on the Wu et al.protocol.The extension allows any member to join and leave at any point,provided that the resulting group size is not greater than n.To validate the proposal,extensive experiments are performed and the experimental results show that our protocol is more effective than a plain realization of the Wu et al.protocol for dynamic groups.The extended protocol is also more efficient than the up-to-date dynamic GKA protocol in terms of communication and computation. 展开更多
关键词 key management key agreement asymmetric group key agreement dynamic groups
下载PDF
Improved Authenticated Multi-Key Agreement Protocol
9
作者 ZHANG Hua YUAN Zheng WEN Qiaoyan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1915-1918,共4页
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a con... Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack. 展开更多
关键词 multi-key agreement authenticate Diffie Hellman key agreement concatenation attack
下载PDF
Possible Chinese Strategic Responses to the Trans-Pacific Partnership Agreement
10
作者 李春顶 John Whalley 《China Economist》 2016年第1期23-46,共24页
Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not j... Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not joined the TPP. This has provoked much debate in China as to the best strategic approach to the TPP This paper analyzes China's possible strategy for the TPP agreement. We make three key points. First, the security of market access should be China's main concern in any free-trade agreement negotiations, regrettably, it is not included in TPP. The second point is that the present TPP agreement is somewhat diminished from its ambitious original claims. We suggest four strategies for China. The first is to promote the development of China's remaining regional and bilateral free trade agreements (FTAs). The second is to negotiate a bilateral FTA with the United States. The third is to promote deep domestic reforms via enlarged TPP coverage. The last is negotiating entrance to the entering do not worsen. TPP as soon as possible so that terms of 展开更多
关键词 Trans-Pacific Partnership China free trade agreement
下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
11
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
下载PDF
BRICS Climate Cooperation in the Post-Paris Agreement Era
12
作者 FAN Xinzhu 《International Relations and Diplomacy》 2021年第7期259-277,共19页
As representatives of emerging economies,BRICS countries are increasingly prominent in global governance.The rapid economic development of BRICS countries is accompanied by a significant increase in greenhouse gas(GHG... As representatives of emerging economies,BRICS countries are increasingly prominent in global governance.The rapid economic development of BRICS countries is accompanied by a significant increase in greenhouse gas(GHG)emissions,and BRICS countries are paying increasing attention to climate change issues and actively participating in the construction of the international climate regime.The Paris Agreement was a historic breakthrough in international climate negotiations,and since then BRICS countries have strengthened multilateral and bilateral cooperation in energy efficiency,agricultural emission reduction and climate governance financing.Due to the constraints of technology,cooperation mechanism construction,financing,and other objective conditions,BRICS countries still face some challenges to further advance the global climate governance agenda with their group power in the short term.Whether BRICS countries can further advance the global climate governance agenda as a group in the post-Paris Agreement era depends on whether they can improve energy efficiency and optimize their energy mix,and whether they can deepen cooperation in agricultural emission reduction and climate finance.BRICS countries need to continue to promote clean energy development and low-carbon economic transformation,deepen the potential of climate cooperation in agricultural emission reduction,and give full play to the climate financing role of the New Development Bank,so as to further enhance the level of climate cooperation.At the same time,BRICS countries can widely involve developing countries in climate governance cooperation and strengthen dialogue and exchanges with other countries,so as to promote global climate governance in the post-Paris Agreement era. 展开更多
关键词 BRICS countries climate governance Paris agreement post-Paris agreement era
下载PDF
Research on the Risk Management Issues of VAM Agreements in Private Equity Financing
13
作者 Cong Du 《Proceedings of Business and Economic Studies》 2022年第1期27-36,共10页
At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provid... At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provide enterprises with professional management concepts and even help growing enterprises to go public in advance.However,high returns must be accompanied by high risks.For example,private equity financing has information asymmetry risks,principal-agent risks,etc.,and these risks make it impossible to maximize the advantages of private equity financing.Therefore,in order to reduce the risks brought by financing,investment and financing parties should choose to sign gambling contracts to reduce the risk.In recent years,the use of VAM agreements has become more in China.However,according to incomplete statistics,less than 30%of VAM agreements are successful,and this result is mainly due to the insufficient depth and breadth of research on VAM agreements.Therefore,this article will comprehensively analyze the problems that need to be paid attention to when signing a gambling agreement by introducing the case of Anda Technology,and the issue of targeted risk prevention will also be discussed in this paper. 展开更多
关键词 Private equity financing Gambling agreement VAM agreement Risk prevention and control
下载PDF
Efficient Certificateless Authenticated Key Agreement Protocol from Pairings 被引量:24
14
作者 WANG Shengbao CAO Zhenfu WANG Licheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1278-1282,共5页
In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/ser... In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols. 展开更多
关键词 Web security authenticated key agreement certificateless public key cryptography bilinear pairings
下载PDF
Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography 被引量:23
15
作者 SHI Yijuan LI Jianhua 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期71-74,共4页
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. M... Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed. However, the key agreement in CL-PKE is seldom discussed. In this paper, we present a new certificateless two party authentication key agreement protocol and prove its security attributes. Compared with the existing protocol, our protocol is more efficient. 展开更多
关键词 key agreement two party certificateless public key encryotion
下载PDF
Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings 被引量:12
16
作者 SHAOZu-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期267-270,共4页
An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl... An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure. 展开更多
关键词 authenticated key agreement protocol self-certified public keys bilinearpairings
下载PDF
Breaking and Repairing the Certificateless Key Agreement Protocol from ASIAN 2006 被引量:8
17
作者 XIA Liang WANG Shengbao +1 位作者 SHEN Jiajun XU Guoming 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期562-566,共5页
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their... The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties. 展开更多
关键词 cryptographic protocols key agreement certificate-less scheme CRYPTANALYSIS
下载PDF
The withdrawal of the U.S. from the Paris Agreement and its impact on global climate change governance 被引量:5
18
作者 ZHANG Yong-Xiang CHAO Qing-Chen +1 位作者 ZHENG Qiu-Hong HUANG Lei 《Advances in Climate Change Research》 SCIE CSCD 2017年第4期213-219,共7页
The global community has prepared for the withdrawal of the U.S. from the Paris Agreement since Donald Trump was elected as the president of the U.S. However, Trump's formal declaration of withdrawal still caused ... The global community has prepared for the withdrawal of the U.S. from the Paris Agreement since Donald Trump was elected as the president of the U.S. However, Trump's formal declaration of withdrawal still caused worldwide reaction. Trump will use the withdrawal to build his political reputation and to renegotiate the Paris Agreement despite its negative effects on the political credibility, international relationships, and potential long-term economic growth of the U.S. In general, the withdrawal of the U.S. from the Paris Agreement will not change the development of low-carbon technologies and the transformation trend of the global climate governance regime. However, the long-term goals and international cooperation on climate change will be affected by budget cuts in American climate change research and the cancelation of donations from the multilateral environmental fund of the U.S. If the Paris Agreement is renegotiated, the common but differentiated principle of responsibility of the United Nations Framework Convention on Climate Change will be challenged again. Nevertheless, climate change governance remains a main theme of future sustainable development. Instead of national governments, local governments and non-governmental organizations will develop strategies for technical innovation and emphasize pragmatic cooperation, thus expanding their roles in climate change governance. The capacity building on climate change research and public awareness should be enhanced as a long-term objective of global climate change governance. 展开更多
关键词 U.S. withdraw PARIS agreement Global climate change GOVERNANCE IMPACT
下载PDF
Repeatability and agreement of CCT measurement in myopia using entacam and ultrasound pachymetry 被引量:3
19
作者 Yong-Heng Luo, Xuan-Chu Duan 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2012年第3期329-333,共5页
AIM: To evaluate the repeatability of central corneal thickness (CCT) measurement by entacam, and agreement of CCT measured by Pentacam and ultrasound pachymetry (USP) in Chinese myopia. Thereby investigate the possib... AIM: To evaluate the repeatability of central corneal thickness (CCT) measurement by entacam, and agreement of CCT measured by Pentacam and ultrasound pachymetry (USP) in Chinese myopia. Thereby investigate the possibility of Pentacam as a substitute for USP in CCT measurement before refractive surgery. The effects of corneal curvature measured by Pentacam on CCT were also evaluated. METHODS: One hundred and forty-eight right eyes of 148 individual with myopia were included in this study. Three successive Pentacam CCT measurements followed by 10 successive ultrasound pachymetry were carried out in the 148 eyes. Mean of CCT taken by each device was calculated for comparison. According to the CCT measured by USP, all the 148 eyes were divided into 3 groups: <520 mu m, 520-560 mu m, >560 mu m. For all eyes and each group the CCT obtained by Pentacam and USP were compared. Anterior corneal curvature of the 148 eyes was also adopted for correlation analysis with CCT obtained by ultrasound pachymetry. In addition, CCT measurement using 60 random selected Scheimpflug images was performed by 3 skilled investigators at different time, and this was repeated for 3 times by a forth investigator to assess repeatability of Pentacam CCT measurement using Scheimpflug images. RESULTS: Intraclass correlation coefficient (ICC) analysis revealed high intraobserver repeatability (ICC=0.994, F=158.60, P<0.001) for CCT measurement by Pentacam. The interobserver (ICC=0.998, F =494.73, P <0.001) and intraobserver (ICC=0.997, F=383.98, P<0.001) repeatability for Pentacam CCT measurements using Scheimpflug images were also excellent. There was high positive correlation between the CCT values measured by Pentacam and ultrasound pachymetry (r=0.963, P<0.001). Bland-altman plots showed that the Pentacam underestimate the CCT by 8.02 mu m compared with ultrasouond pachymetry.The differences between Pentacam and USP increased as the CCT readings by USP increased (Pentacam vs USP: slope=-0.04, P< 0.05). The 95% upper and lower limits of agreement between CCT values obtained from the two devices were +9. 33 mu m and -25.37 mu m. No significant association could be found between CCT and anterior corneal curvature. CONCLUSION: Inter- and intraobserver variability for CCT measurements by Pentacam was considerably below clinically significant levels. CCT of myopia obtained by Scheimpflug camera, Pentacam, were highly correlated to that by ultrasound pachymetry. However, the values obtained are not directly interchangeable between Pentacam and ultrasound pachymetry as the 95% limits of agreement are relatively wide. Pentacam can be a useful instrument for measuring CCT in candidates to refractive surgery in clinic. 展开更多
关键词 PENTACAM central corneal thickness ultrasound pachymetry REPEATABILITY agreement
下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
20
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部