期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Scenario-based approach for project portfolio selection in army engineering and manufacturing development 被引量:2
1
作者 Pengle Zhang Kewei Yang +1 位作者 Yajie Dou Jiang Jiang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期166-176,共11页
The decisions concerning portfolio selection for army engineering and manufacturing development projects determine the benefit of those projects to the country concerned.Projects are typically selected based on ex ant... The decisions concerning portfolio selection for army engineering and manufacturing development projects determine the benefit of those projects to the country concerned.Projects are typically selected based on ex ante estimates of future return values,which are usually difficult to specify or only generated after project launch.A scenario-based approach is presented here to address the problem of selecting a project portfolio under incomplete scenario information and interdependency constraints.In the first stage,the relevant dominance concepts of scenario analysis are studied to handle the incomplete information.Then,a scenario-based programming approach is proposed to handle the interdependencies to obtain the projects,whose return values are multi-criteria with interval data.Finally,an illustrative example of army engineering and manufacturing development shows the feasibility and advantages of the scenario-based multi-objective programming approach. 展开更多
关键词 scenario-based interdependency group decision making project portfolio selection portfolio decision analysis
下载PDF
A new approach for UC security concurrent deniable authentication 被引量:6
2
作者 FENG Tao LI FengHua +1 位作者 MA JianFeng SangJae MOON 《Science in China(Series F)》 2008年第4期352-367,共16页
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch... Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynchronous multi-party network with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally composable (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is preserved under concurrent composition of an unbounded number of protocol executions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and security reductions. 展开更多
关键词 information security concurrent deniable authentication universally composable verifiably smooth projective hashing the decisional composite residuosity assumption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部