An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),h...An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.展开更多
A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committe...A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committee and Chongyang Institute of Financial Studies,Renmin University of China was held in Beijing on April 24,2020.展开更多
Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the impl...Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development.展开更多
The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three...The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.展开更多
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti...B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-展开更多
基金This work was funded by the National Basic Research Program (973 Program) of China under Grant 2007CB310704.
文摘An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.
文摘A Silk Road Think Tank Association Thematic Cloud Forum hosted by Silk Road Think Tank Association and co-organized by China Center for Contemporary World Studies(CCCWS)of International Department,CPC Central Committee and Chongyang Institute of Financial Studies,Renmin University of China was held in Beijing on April 24,2020.
文摘Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development.
基金supported by the National HighTechnology Research and Development Programof China ("863" Program) under Grant No.2008AA01A204
文摘The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.
文摘B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-