期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
The Development of Intelligent Operation Method of Urban Public Infrastructure Driven by Accurate Spatio-temporal Information 被引量:4
1
作者 Jingyuan JIA Bo WANG 《Journal of Geodesy and Geoinformation Science》 2021年第2期27-35,共9页
Urban public infrastructure is an important basis for urban development.It is of great significance to deepen the research on intelligent management and control of urban public infrastructure.Spatio-temporal informati... Urban public infrastructure is an important basis for urban development.It is of great significance to deepen the research on intelligent management and control of urban public infrastructure.Spatio-temporal information contains the law of state evolution of urban public infrastructure,which is the information base of intelligent control of infrastructure.Due to the needs of operation management and emergency response,efficient sharing and visualization of spatio-temporal information are important research contents of comprehensive management and control of urban public infrastructure.On the basis of summarizing the theoretical research and application in recent years,the basic methods and current situation of the acquisition and analysis of spatio-temporal information,the forecast and early warning,and the intelligent control of urban public infrastructure are reviewed in this paper. 展开更多
关键词 urban public infrastructure satellite navigation system spatio-temporal information forecast and early warning intelligent control
下载PDF
An Empirical Study on the Influence of Agricultural Public Infrastructure on Total Factor Productivity of China’s Grain Production
2
作者 Yang Yu Pan Yueping 《Contemporary Social Sciences》 2022年第3期20-36,共17页
A critical method of ensuring grain production is to increase the total factor productivity(TFP),and the key measure to increase the TFP of grain production lies in the construction of agricultural public infrastructu... A critical method of ensuring grain production is to increase the total factor productivity(TFP),and the key measure to increase the TFP of grain production lies in the construction of agricultural public infrastructure.For this topic,existing literature lacks systematic and empirical analysis.Therefore,research on the influence of agricultural public infrastructure on the TFP of China’s grain production has relatively strong policy implications and theoretical value.For this study,we collected panel data for grain inputs and outputs as well as for agricultural public infrastructure in China’s provinces(autonomous regions/municipalities)from 1990 to 2017,and adopted the stochastic frontier function(SFF)approach to measure the TFP of provincial-level grain production.Through this empirical study,we analyzed the influence of agricultural public infrastructures,such as irrigation,roads,and electric power facilities on the TFP of China’s agriculture.We found that such facilities have a positive influence on the TFP of grain production.Specifically,when the input for irrigation facilities is increased by 1 percent,the TFP of grain production will rise by 5.74 percent.Based on this finding,policy recommendations are proposed for enhancing grain TFP through agricultural public infrastructure construction. 展开更多
关键词 agricultural public infrastructure grain production total factor productivity empirical analysis
下载PDF
Delivery Invoice Information Classification System for Joint Courier Logistics Infrastructure
3
作者 Youngmin Kim Sunwoo Hwang +1 位作者 Jaemin Park Joouk Kim 《Computers, Materials & Continua》 SCIE EI 2023年第5期3027-3044,共18页
With the growth of the online market,demand for logistics and courier cargo is increasing rapidly.Accordingly,in the case of urban areas,road congestion and environmental problems due to cargo vehicles are mainly occu... With the growth of the online market,demand for logistics and courier cargo is increasing rapidly.Accordingly,in the case of urban areas,road congestion and environmental problems due to cargo vehicles are mainly occurring.The joint courier logistics system,a plan to solve this problem,aims to establish an efficient logistics transportation system by utilizing one joint logistics delivery terminal by several logistics and delivery companies.However,several courier companies use different types of courier invoices.Such a system has a problem of information data transmission interruption.Therefore,the data processing process was systematically analyzed,a practically feasible methodology was devised,and delivery invoice information processing standards were established for this.In addition,the importance of this paper can be emphasized in terms of data processing in the logistics sector,which is expected to grow rapidly in the future.The results of this study can be used as basic data for the implementation of the logistics joint delivery terminal system in the future.And it can be used as a basis for securing the operational reliability of the joint courier logistics system. 展开更多
关键词 Joint courier logistics base infrastructure logistics cooperation urban public infrastructure YOLOv4 object detection algorithm
下载PDF
An Internet Key Exchange Protocol Based on Public Key Infrastructure 被引量:2
4
作者 朱建明 马建峰 《Journal of Shanghai University(English Edition)》 CAS 2004年第1期51-56,共6页
Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for provi... Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. 展开更多
关键词 AUTHENTICATION ENCRYPTION Interent key exchange(IKE) public key infrastructure(PKI).
下载PDF
Public Key Infrastructure: An Enhanced Validation Framework
5
作者 Paul Danquah Henoch Kwabena-Adade 《Journal of Information Security》 2020年第4期241-260,共20页
Public Key Infrastructure (PKI) is a comprehensive information security framework for providing secure information and communication over the internet. Its need and use has grown over the years and continually grows. ... Public Key Infrastructure (PKI) is a comprehensive information security framework for providing secure information and communication over the internet. Its need and use has grown over the years and continually grows. This research work examines the current PKI framework’s validation process as operated by vendors and subscribers to identify the drawbacks and propose enhanced approaches to its validation mechanism. Using an approach of reviewing secondary data, critical weaknesses of integrity, proof of trust and single point-of-failure were identified with the current PKI framework. This study therefore advances proposed solutions to address the identified weaknesses by specifically introducing multiple Certificate Authorities, storage, visibility and searchability of subscriber information in public repository. A comprehensive detail of its implementation is proposed to address the identified weaknesses of uncertain integrity, trust for certificate authorities and prevent a single point of failure. Furthermore, the proposed enhancements are validated with the protection motivation theory and a framework for empirically testing the enhancements is suggested. Further research would be required to factor in multi-factor authentication without compromising performance. 展开更多
关键词 SECURITY public Key infrastructure PKI Validation Cyber Security
下载PDF
A Public-Private Partnership Procurement Approach to Sustainable Transport—Zimbabwe Case
6
作者 Vinnet Ndlovu Peter Newman 《Journal of Transportation Technologies》 2022年第4期600-618,共19页
Zimbabwe has serious financial constraints so the only viable option to procure infrastructure is through engaging the private sector in public-private partnerships to enhance the chances of successfully undertaking p... Zimbabwe has serious financial constraints so the only viable option to procure infrastructure is through engaging the private sector in public-private partnerships to enhance the chances of successfully undertaking public projects like sustainable transport. This study creates the basis for a potential public-private partnership with a trackless tram/solar energy project in Bulawayo which has multiple advantages for sustainable development goals. It identifies six other projects in Zimbabwe that can provide some guidance for developing an appropriate PPP that could assist procure such infrastructure. The projects are drawn from the three critical sectors of the economy: power generation, highways/transport, and water/sanitation. Empirical investigations of these projects reveal the effectiveness of the PPP concept to deliver infrastructure for emerging economies. This suggests an ideal PPP arrangement that increases the likelihood of getting projects like the proposed sustainable transport project in Bulawayo implemented quickly and efficiently, especially if formulated to incorporate the project’s local socio-economic dynamics. 展开更多
关键词 public-Private Partnership public infrastructure Trackless Trams Sustainable Development Goals
下载PDF
A Photo Certificate-A Framework for Generating Visualized Public Key Certificates
7
作者 Wei-Bin Lee Chien-Chen Huang Chia-Chen Lin 《Journal of Electronic Science and Technology》 CAS 2011年第4期339-344,共6页
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meani... In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate. 展开更多
关键词 AUTHENTICATION CERTIFICATE public key infrastructure two-layer verifications WATERMARKING X.509.
下载PDF
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks
8
作者 Qingqing Ning Chunhua Jin +2 位作者 Zhiwei Chen Yongliang Xu Huaqi Lu 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2061-2078,共18页
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological signals.WBANs provide a mechanism for collecting,storing,and transmitting physiological data to healthcare pro... Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological signals.WBANs provide a mechanism for collecting,storing,and transmitting physiological data to healthcare providers.However,the open wireless channel and limited resources of sensors bring security challenges.To ensure physiological data security,this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption(CP-HRSC)scheme,in which sensors are in a certificateless cryptosystem(CLC)environment,and the server is in a public key infrastructure(PKI)environment.CLC could solve the limitations of key escrow in identity-based cryptography(IBC)and certificate management for public keys in PKI.While PKI is suited for the server because it is widely used on the Internet.Furthermore,this paper designs a ring signcryption method that allows the controller to anonymously encrypt physiological data on behalf of a set of sensors,but the server does not exactly know who the sensor is.The construction of this paper can achieve anonymity,confidentiality,authentication,non-repudiation,and integrity in a logically single step.Under the computational Diffie-Hellman(CDH)problem,the formal security proof is provided in the random oracle model(ROM).This paper demonstrates that this scheme has indistinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chosen message attacks(EUF-CMA).In terms of computational cost and energy usage,a comprehensive performance analysis demonstrates that the proposed scheme is the most effective.Compared to the three existing schemes,the computational cost of this paper’s scheme is reduced by about 49.5%,4.1%,and 8.4%,and the energy usage of our scheme is reduced by about 49.4%,3.7%,and 14.2%,respectively. 展开更多
关键词 Wireless body area networks certificateless cryptosystem public key infrastructure SECURITY ring singncryption
下载PDF
Universal Intelligent Small Cell (UnISCell) for next generation cellular networks 被引量:1
9
作者 Mohammad Patwary Shree Krishna Sharma +5 位作者 Symeon Chatzinotas Yunfei Chen Mohamed Abdel-Maguid Raed Abd-Alhameed James Noras Bjorn Ottersten 《Digital Communications and Networks》 SCIE 2016年第4期167-174,共8页
Exploring innovative cellular architectures to achieve enhanced system capacity and good coverage has become a critical issue towards realizing the next generation of wireless communications. In this context, this pap... Exploring innovative cellular architectures to achieve enhanced system capacity and good coverage has become a critical issue towards realizing the next generation of wireless communications. In this context, this paper proposes a novel concept of Universal Intelligent Small Cell (UnISCell) for enabling the densification of the next generation of cellular networks. The proposed novel concept envisions an integrated platform of providing a strong linkage between different stakeholders such as street lighting networks, landline telephone networks and future wireless networks, and is universal in nature being independent of the operating frequency bands and traffic types. The main motivating factors for the proposed small cell concept are the need of public infrastructure re-engineering, and the recent advances in several enabling technologies. First, we highlight the main concepts of the proposed UnISCell platform. Subsequently, we present two deployment scenarios for the proposed UnISCell concept considering infrastructure sharing and service sharing as important aspects. We then describe the key future technologies for enabling the proposed UnISCell concept and present a use case example with the help of numerical results. Finally, we conclude this article by providing some interesting future recommendations. 展开更多
关键词 Next Generation Wireless Small Cell public infrastructure Re-engineering 5G Deployment
下载PDF
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain 被引量:2
10
作者 Jing Liu Yixin Liu +3 位作者 Yingxu Lai Rongchen Li Siyu Wu Sami Mian 《Journal of Artificial Intelligence and Technology》 2021年第2期92-100,共9页
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use publ... With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use public key infrastructure to ensure security in accessing their data and applications.However,with the continuous development of identity-based encryption(IBE)technology,small-and medium-sized enterprises are increasingly using IBE to deploy internal authentication systems.To solve the problems that arise when crossing heterogeneous authentication domains and to guarantee the security of the certification process,we propose using blockchain technology to establish a reliable cross-domain authentication scheme.Using the distributed and tamper-resistant characteristics of the blockchain,we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication process and present a cross-domain authentication protocol based on blockchain.This model does not change the internal trust structure of each authentication domain and is highly scalable.Furthermore,on the premise of ensuring security,the process of verifying the signature of the root certificate in the traditional cross-domain authentication protocol is improved to verify the hash value of the root certificate,thereby improving the authentication efficiency.The developed prototype exhibits generality and simplicity compared to previous methods. 展开更多
关键词 public key infrastructure identity-based encryption cross-domain authentication blockchain
下载PDF
A DRM System Based on Mobile Agent for Digital Rights Redistribution
11
作者 LI Ping LU Zhengding ZOU Fuhao LING Hefei 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期475-480,共6页
We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent ... We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given. 展开更多
关键词 digital rights management public key infrastructure certificate authority mobile agent rights redistribution
下载PDF
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks
12
作者 Miraj Asghar Lei Pan Robin Doss 《Digital Communications and Networks》 SCIE 2020年第4期422-432,共11页
Vehicular Ad-hoc NETworks(VANETs)enable cooperative behaviors in vehicular environments and are seen as an integral component of Intelligent Transportation Systems(ITSs).The security of VANETs is crucial for their suc... Vehicular Ad-hoc NETworks(VANETs)enable cooperative behaviors in vehicular environments and are seen as an integral component of Intelligent Transportation Systems(ITSs).The security of VANETs is crucial for their successful deployment and widespread adoption.A critical aspect of preserving the security and privacy of VANETs is the efficient revocation of the ability of misbehaving or malicious vehicles to participate in the network.This is usually achieved by revoking the validity of the digital certificates of the offending nodes and by maintaining and distributing an accurate Certificate Revocation List(CRL).The immediate revocation of misbehaving vehicles is of prime importance for the safety of other vehicles and users.In this paper,we present a decentralized revocation approach based on Shamir’s secret sharing to revoke misbehaving vehicles with very low delays.Besides enhancing VANETs’security,our proposed protocol limits the size of the revocation list to the number of the revoked vehicles.Consequently,the authentication process is more efficient,and the communication overhead is reduced.We experimentally evaluate our protocol to demonstrate that it provides a reliable solution to the scalability,efficiency and security of VANETs. 展开更多
关键词 VANETS Security AUTHENTICATION public key infrastructure Decentralized revocation
下载PDF
Night and day at the beach: Relating social life to location and infrastructure in a Brazilian city
13
作者 Lucy Donegan Gabriel de Oliveira Madruga Natália Vale Carneiro 《Frontiers of Architectural Research》 CSCD 2022年第6期1177-1192,共16页
Brazilian city beaches are public spaces favoring citizens well-being.Urban studies relate built form and infrastructure with urban vitality and coastal studies underline uses as important for beach management,yet few... Brazilian city beaches are public spaces favoring citizens well-being.Urban studies relate built form and infrastructure with urban vitality and coastal studies underline uses as important for beach management,yet few researches relate form and infrastructure with beach uses.Understanding daily life as essential for public spaces and that spatial form relates with uses,this paper assesses time-based relationships between built and natural physical attributes and social life on the beaches of João Pessoa,a coastal city in North-east Brazil.Physical attributes are investigated at city scale-beach type,street network centrality and topography-and seafront scale-land uses,public/private interfaces,public infrastructure,beach sections and water quality.Beach social life was surveyed online,enquiring peoples’beach choice,visiting time and place,activities and evaluation.Infrastructure and street network follow topography and help configure shore and promenade for different landscapes.More central beaches have diverse land uses,well-equipped promenades and lighting and were popular night and day,while less central beaches had less infrastructure and were visited only by day.Findings highlight how physical attributes facilitate uses and,together with peoples’evaluation,can inform urban beach design and planning. 展开更多
关键词 public space Social life Built environment Beaches public infrastructure
原文传递
tsrCert:Traceable Self-Randomization Certificate and Its Application to Blockchain Supervision
14
作者 Yan Zhu Haibin Zheng +6 位作者 Bo Qin Wanting Fu Zhenwei Guo Yujue Wang Qianhong Wu Bingyu Li Xuan Ding 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第6期1128-1147,共20页
Traditional public key infrastructure(PKI)only provides authentication for network communication,and the standard X.509 certificate used in this architecture reveals the user’s identity.This lack of privacy protectio... Traditional public key infrastructure(PKI)only provides authentication for network communication,and the standard X.509 certificate used in this architecture reveals the user’s identity.This lack of privacy protection no longer satisfies the increasing demands for personal privacy.Though an optimized anonymous PKI certificate realizes anonymity,it has the potential to be abused due to the lack of identity tracking.Therefore,maintaining a balance between user anonymity and traceability has become an increasing requirement for current PKI.This paper introduces a novel traceable self-randomization certificate authentication scheme based on PKI architecture that achieves both anonymity and traceability.We propose a traceable self-randomization certificate authentication scheme based on the short randomizable signature.Specifically,certificate users can randomize the initial certificate and public key into multiple anonymous certificates and public keys by themselves under the premise of traceability,which possesses lower computational complexity and fewer interactive operations.Users can exhibit different attributes of themselves in different scenarios,randomizing the attributes that do not necessarily need to be displayed.Through security and performance analysis,we demonstrate the suitability of the improved PKI architecture for practical applications.Additionally,we provide an application of the proposed scheme to the permissioned blockchain for supervision. 展开更多
关键词 public key infrastructure traceable self-randomization certificate randomizable signature anonymity and traceability blockchain supervision
原文传递
EVchain: An Anonymous Blockchain-Based System for Charging–Connected Electric Vehicles 被引量:3
15
作者 Shiyuan Xu Xue Chen Yunhua He 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第6期845-856,共12页
Purchases of electric vehicles have been increasing in recent years. These vehicles differ from traditional fossil-fuel-based vehicles especially in the time consumed to keep them running. Electric-Vehicle-charging Se... Purchases of electric vehicles have been increasing in recent years. These vehicles differ from traditional fossil-fuel-based vehicles especially in the time consumed to keep them running. Electric-Vehicle-charging Service Providers(EVSPs) must arrange reasonable charging times for users in advance. Most EVSP services are based on third-party platforms, but reliance on third-party platforms creates a lack of security, leaving users vulnerable to attacks and user-privacy leakages. In this paper, we propose an anonymous blockchain-based system for charging-connected electric vehicles that eliminates third-party platforms through blockchain technology and the establishment of a multi-party security system between electric vehicles and EVSPs. In our proposed system, digital certificates are obtained by completing distributed Public Key Infrastructure(distributed-PKI) identity registration,with the user registration kept separate from the verification process, which eliminates dependence on the EVSP for information security. In the verification process, we adopt smart contracts to solve problems associated with centralized verification and opaque services. Furthermore, we utilize zero-knowledge proof and ring-signature superposition to realize completely anonymous verification, which ensures undeniability and unforgeability with no detriment to anonymity. The evaluation results show that the user anonymity, information authenticity, and system security of our system fulfill the necessary requirements. 展开更多
关键词 blockchain Electric Vehicles(EV) zero knowledge proof distributed public Key infrastructure(distributed-PKI) ring signature smart contract
原文传递
Enriching Farmers through Sharing: Improving People’s Livelihood and Well-Being in the Modernization of Agriculture and Rural Areas in China
16
作者 ZHONG Zhen FENG Qifan WANG Xiangrui 《China Economic Transition》 2022年第1期62-82,共21页
Shared development is an important means by which to improve people’s livelihood and well-being in the new era. During the 13th Five-Year Plan period (2016–2020), China has made great achievements in the three major... Shared development is an important means by which to improve people’s livelihood and well-being in the new era. During the 13th Five-Year Plan period (2016–2020), China has made great achievements in the three major aspects of targeted poverty alleviation through industrial development, development of special rural areas, and equalization of urban and rural infrastructure and basic public services. In addition, the important experience of multi-agent participation, multi-mode guidance, and multi-line promotion has been accumulated in the individual, regional and urbanrural dimensions. However, there remain some deficiencies, such as low policy efficiency, poor matching ability, and prominent structural problems. At the beginning of the 14th Five-Year Plan (2021–2025), the task of enriching farmers through sharing has been faced with many challenges, such as major changes in the focus of poverty governance, greater numbers of restraints on the development of special rural areas, and heavy responsibilities of equalizing urban and rural infrastructure and basic public services. Therefore, it is necessary to acquire a profound understanding of the new development concept, and to continuously enrich farmers through sharing in terms of accelerating the improvement of the institutionalized poverty reduction system in the new era, actively building a green development system of agriculture and animal husbandry in special rural areas, and striving to create a fair and complementary urban and rural infrastructure and basic public service system. 展开更多
关键词 enriching farmers through sharing targeted poverty alleviation through industrial development development of special rural areas equalization of urban and rural infrastructure and basic public services people’s livelihood and well-being
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部