期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Effect of mechanical degradation of laminated elastomeric bearings and shear keys upon seismic behaviors of small-to-medium-span highway bridges in transverse direction 被引量:2
1
作者 Wu Gang Wang Kehai +1 位作者 Zhang Panpan Lu Guanya 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2018年第1期205-220,共16页
Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seism... Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seismic responses more accurately, proper analytical models of bearings and shear keys should be developed. Based on a series of cyclic loading experiments and analyses, rational analytical models of laminated elastomeric bearings and shear keys, which can consider mechanical degradation, were developed. The effect of the mechanical degradation was investigated by examining the seismic response of a small-to-medium-span bridge in the transverse direction under a wide range of peak ground accelerations(PGA). The damage mechanism for small-to-medium-span highway bridges was determined, which can explain the seismic damage investigation during earthquakes in recent years. The experimental results show that the mechanical properties of laminated elastomeric bearings will degrade due to friction sliding, but the degree of decrease is dependent upon the influencing parameters. It can be concluded that the mechanical degradation of laminated elastomeric bearings and shear keys play an important role in the seismic response of bridges. The degradation of mechanical properties of laminated elastomeric bearings and shear keys should be included to evaluate more precise bridge seismic performance. 展开更多
关键词 bridge engineering mechanical degradation seismic response friction sliding shear keys
下载PDF
Preface for Special Issue on“Key Mechanical Problems of Marine Energy Development Equipment”
2
作者 WU Wen-hua 《China Ocean Engineering》 SCIE EI CSCD 2022年第4期509-510,共2页
There are abundant energy reserves such as oil,natural gas,hydrate,and wind energy in the ocean.Countries around the globe are competing to advance their marine energy development technologies.The exploitation of mari... There are abundant energy reserves such as oil,natural gas,hydrate,and wind energy in the ocean.Countries around the globe are competing to advance their marine energy development technologies.The exploitation of marine resources relies on cutting-edge industrial equipment.After decades of R&D endeavors,China has obtained most of the key technologies for the design,production,testing,and field application of marine energy development equipment(Xie and Zeng,2021). 展开更多
关键词 key Mechanical Problems of Marine Energy Development Equipment Preface for Special Issue on
下载PDF
An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update 被引量:1
3
作者 Changji Wang Yuan Yuan 《Computers, Materials & Continua》 SCIE EI 2020年第5期1031-1041,共11页
Ciphertext-policy attribute-based encryption(CP-ABE)is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud.However,when applying CP-ABE to data ... Ciphertext-policy attribute-based encryption(CP-ABE)is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud.However,when applying CP-ABE to data outsourcing scenarios,we have to address the challenging issue of policy updates because access control elements,such as users,attributes,and access rules may change frequently.In this paper,we propose a notion of access policy updatable ciphertext-policy attribute-based encryption(APU-CP-ABE)by combining the idea of ciphertext-policy attribute-based key encapsulation and symmetric proxy re-encryption.When an access policy update occurs,data owner is no longer required to download any data for re-encryption from the cloud,all he needs to do is generate a re-encryption key and produce a new encapsulated symmetric key,and then upload them to the cloud.The cloud server executes re-encryption without decryption.Because the re-encrypted ciphertext is encrypted under a completely new key,users cannot decrypt data even if they keep the old symmetric keys or parts of the previous ciphertext.We present an APU-CP-ABE construction based on Syalim et al.’s[Syalim,Nishide and Sakurai(2017)]improved symmetric proxy re-encryption scheme and Agrawal et al.’s[Agrawal and Chase(2017)]attribute-based message encryption scheme.It requires only 6 bilinear pairing operations for decryption,regardless of the number of attributes involved.This makes our construction particularly attractive when decryption is time-critical. 展开更多
关键词 Ciphertext-policy attribute-based encryption key encapsulation mechanism access structure all-or-nothing transform cloud computing
下载PDF
Modeling multiband emissions from two young SNRs with a time-dependent magnetic field 被引量:2
4
作者 Yun-Yong Tang Zu-Cheng Dai Li Zhang 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2013年第5期537-546,共10页
The nonthermal components in hard X-rays have been detected in two young supernova remnants (SNRs): SN 1006 and Kepler's SNR. Various theoretical models showed that the amplification of the magnetic field was cruc... The nonthermal components in hard X-rays have been detected in two young supernova remnants (SNRs): SN 1006 and Kepler's SNR. Various theoretical models showed that the amplification of the magnetic field was crucial to explain their multiband emission properties. We investigate the evolution of the magnetic field and model the multiband emissions from these two young SNRs with a time-dependent injection model. The results indicate that (1) the radio and X-ray emissions are re- produced by synchrotron radiation of the injected electrons, while the y-rays can be explained as inverse Compton scattering of the relativistic electrons and proton-proton interaction of the high-energy protons; and (2) the amplification of the magnetic field spontaneously happens with reasonable parameters. 展开更多
关键词 key words: radiation mechanisms non-thermal -- gamma-rays: theory -- (ISM:)supernova remnant
下载PDF
Highly Resilient Key Distribution Strategy for Multi-level Heterogeneous Sensor Networks by Using Deployment Knowledge 被引量:2
5
作者 王智弘 魏仕益 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期593-599,共7页
The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited re... The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited resources, for instance, low battery life and low computational power, the key distribution scheme must be designed in an efficient manner. Recently many studies added a few high-level nodes into the network, called the heterogeneous sensor network (HSN). Most of these studies considered an application for two-level HSN instead of multi-level one. In this paper, we propose some definitions for multi-level HSN, and design a novel key management strategy based on the polynomial hash tree (PHT) method by using deployment knowledge. Our proposed strategy has lower computation and communication overheads but higher connectivity and resilience. 展开更多
关键词 heterogeneous sensor network (HSN) key distribution mechanism deployment knowledge polynomial hash tree (PHT)
原文传递
Distributed Certificateless Key Encapsulation Mechanism Secure Against the Adaptive Adversary 被引量:1
6
作者 龙宇 李祥学 +1 位作者 陈克非 洪璇 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期102-106,共5页
This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti's adaptive secure key generation scheme based on discrete logarithm. The pro... This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti's adaptive secure key generation scheme based on discrete logarithm. The proposed scheme can withstand adaptive attackers that can choose players for corruption at any time during the run of the protocol, and this kind of attack is powerful and realistic. In contrast, all previously presented threshold certificateless public key cryptosystems are proven secure against the more idealized static adversaries only. They choose and fix the subset of target players before running the protocol. We also prove security of this scheme in the random oracle model. 展开更多
关键词 adaptive security certificateless key encapsulation mechanism chosen-ciphertext attack
原文传递
Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model 被引量:6
7
作者 黄琼 王石 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第4期807-826,共20页
Despite the large number of certificateless encryption schemes proposed recently, many of them have been found insecure under a practical attack, called malicious-but-passive KGC (Key Generation Center) attack. In t... Despite the large number of certificateless encryption schemes proposed recently, many of them have been found insecure under a practical attack, called malicious-but-passive KGC (Key Generation Center) attack. In this work we propose the first generic construction of certificateless encryption, which can be proven secure against malicious-but- passive KGC attacks in the standard model. In order to encrypt a message of any length, we consider the KEM/DEM (key encapsulation mechanism/data encapsulation mechanism) framework in the certificateless setting, and propose a generic construction of certificateless key encapsulation mechanism (CL-KEM) secure against malicious-but-passive KGC attacks in the standard model. It is based on an identity-based KEM, a public key encryption and a message authentication code. The high efficiency of our construction is due to the efficient implementations of these underlying building blocks, and is comparable to Bentahar et al.'s CL-KEMs, which have only been proven secure under the random oracle model with no consideration of the malicious-but-passive KGC attack. We also introduce the notion of certificateless tag-based KEM (CL-TKEM), which is an extension of Abe et al.'s work to the certificateless setting. We show that an efficient CL-TKEM can be constructed by modifying our CL-KEM scheme. We also show that with a CL-TKEM and a data encapsulation mechanism secure under our proposed security model, an efficient certificateless hybrid encryption can be constructed by applying Abe et al.'s transformation in the certificateless setting. 展开更多
关键词 certificateless encryption malicious-but-passive KGC attack standard model key encapsulation mechanism
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部