期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
格上两方一轮身份认证协议
1
作者 王雄 吕晓晗 王文博 《北京电子科技学院学报》 2024年第1期1-11,共11页
在量子技术对传统密码冲击下,格上的口令认证密钥交换PAKE协议研究成为关注的热点。但是,当前格上PAKE协议大多通过两轮或三轮完成,且存在传输负载过重现象。而目前格上一轮协议多适用于一对一通信且不具有身份认证功能。针对以上问题... 在量子技术对传统密码冲击下,格上的口令认证密钥交换PAKE协议研究成为关注的热点。但是,当前格上PAKE协议大多通过两轮或三轮完成,且存在传输负载过重现象。而目前格上一轮协议多适用于一对一通信且不具有身份认证功能。针对以上问题提出的基于密钥共识的格上一轮身份认证协议,通过结合格上公钥加密、ASPH函数和密钥共识,实现了高效、安全的一轮通信中的身份认证与密钥协商。这一解决方案有望改善传统PAKE协议的问题,对于应对量子技术对密码学的挑战提供了一种思路。 展开更多
关键词 密钥共识 格密码 ASPH(Approximate smooth Projective Hash) 身份认证
下载PDF
Three Gorges Project Goes Smoothly
2
《Electricity》 2000年第2期55-56,共2页
关键词 PROJECT Three Gorges Project Goes smoothly
下载PDF
CNNC proceeds smoothly with its nuclear projects
3
作者 Liu Chunsheng 《Electricity》 2010年第1期7-,共1页
In 2009, the nuclear power plants under China National Nuclear Corporation (CNNC) continuously kept reliable operation. CNNC's seven nuclear power units accumulatively generated 38.25
关键词 CNNC proceeds smoothly with its nuclear projects WORK
下载PDF
A Successful Scientific Cooperation——Smooth Completion of a Sino-Japanese Joint Research Project of Well-off Household Residences.
4
《China's Foreign Trade》 1994年第4期43-44,共2页
On February 24, 1993, when the appraisal meeting of the Sino-Japanese Joint Research Project of Well-off Household Residences was held in Beijing, Person-in-charge from the China Building Technology Development and Re... On February 24, 1993, when the appraisal meeting of the Sino-Japanese Joint Research Project of Well-off Household Residences was held in Beijing, Person-in-charge from the China Building Technology Development and Research Centre and the Japan International Cooperation Undertakings Group signed the project appraisal report. It marked the successful completion of this three-year joint research project. 展开更多
关键词 Project A Successful Scientific Cooperation well smooth Completion of a Sino-Japanese Joint Research Project of Well-off Household Residences
下载PDF
Two power projects under BOT funding scheme progressing smoothly
5
《Electricity》 1997年第1期48-48,共1页
关键词 BOT Two power projects under BOT funding scheme progressing smoothly
下载PDF
Three-River Project Proceeds Smoothly
6
作者 SOINAM DAGYI 《China's Tibet》 1996年第1期25-27,共3页
Three-RiverProjectProceedsSmoothly¥//SOINAMDAGYIThecentraldrainagesectionoftheYarlungZangboRiveranditstwotri... Three-RiverProjectProceedsSmoothly¥//SOINAMDAGYIThecentraldrainagesectionoftheYarlungZangboRiveranditstwotributaries,theNyang... 展开更多
关键词 PROJECT Three-River Project Proceeds smoothly
下载PDF
A global perspective on macroprudential policy interaction with systemic risk,real economic activity,and monetary intervention 被引量:1
7
作者 Mikhail I.Stolbov Maria A.Shchepeleva Alexander M.Karminsky 《Financial Innovation》 2021年第1期877-901,共25页
The study empirically assesses how macroprudential policy interacts with systemic risk,industrial production,and monetary intervention on a global level from January 2006 to December 2018.We adopt the aggregate proxie... The study empirically assesses how macroprudential policy interacts with systemic risk,industrial production,and monetary intervention on a global level from January 2006 to December 2018.We adopt the aggregate proxies of these variables,capturing their global effects,and use a novel econometric technique,namely,smooth local projections.The study finds that global macroprudential policy leads the monetary policy,exhibiting a countercyclical pattern concerning industrial production.The latter has an inverse bidirectional linkage with systemic risk.Thus,an ex-ante tight macroprudential policy can indirectly mitigate global systemic risk through its pro-growth effect on industrial production,although no convincing evidence exists for the direct impact of a macroprudential intervention on systemic risk.The study results endure several extensions and a robustness check,which builds on alternative measures of global systemic stress and real economic activity,thereby legitimizing the increased importance attached to the macroprudential policy since the 2007–2009 global financial crisis. 展开更多
关键词 Industrial production Macroprudential policy Monetary policy smooth local projections Systemic risk
下载PDF
Robust immersion and invariance adaptive coordinated control for a class of biaxial gantry systems
8
作者 Kangjun Wang Xiangbin Liu Hongye Su 《Journal of Control and Decision》 EI 2022年第3期289-300,共12页
This paper proposes a robust Immersion and Invariance(I&I)adaptive coordinated controller for a class of uncertain linear-motor-driven biaxial gantry system subject to external disturbances for high-accuracy conto... This paper proposes a robust Immersion and Invariance(I&I)adaptive coordinated controller for a class of uncertain linear-motor-driven biaxial gantry system subject to external disturbances for high-accuracy contour tracking.Firstly,the dynamic model of the gantry system is transformed into task coordinate frame,through which the contour tracking can be regarded as a regulation problem.Based on the transformed system dynamics,an I&I-based adaptation law with smooth projection is proposed to estimate the unknown parameters.Different from traditional adaptive control,the proposed robust I&I adaptive control introduces a new term called tuning function in adaptation law to shape the dynamic behaviour of the estimation vector.Then the stability of the closed-loop system is proved by Lyapunov theory.Finally,comparative experiments are executed on an industrial biaxial gantry system with two different cases to verify the effectiveness of the proposed control law. 展开更多
关键词 Robust adaptive control immersion and invariance smooth projection coordinated control biaxial gantry contour control
原文传递
A new approach for UC security concurrent deniable authentication 被引量:6
9
作者 FENG Tao LI FengHua +1 位作者 MA JianFeng SangJae MOON 《Science in China(Series F)》 2008年第4期352-367,共16页
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch... Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynchronous multi-party network with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally composable (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is preserved under concurrent composition of an unbounded number of protocol executions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and security reductions. 展开更多
关键词 information security concurrent deniable authentication universally composable verifiably smooth projective hashing the decisional composite residuosity assumption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部