The distinctive form of language emerged from the Internet is gaining more and more attention these days. In fact, different theories and methodologies can support to explain the phenomenon of the Internet language. F...The distinctive form of language emerged from the Internet is gaining more and more attention these days. In fact, different theories and methodologies can support to explain the phenomenon of the Internet language. Furthermore, language and identity in sociolinguistic domain can help study the relationship between the Internet language and its users. Taking a popular online discussion board Tianya.cn as an example, the affirmation of a virtual community's identity can be established through using its distinctive language.展开更多
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality....As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality.The existing public key infrastructure(PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT.Its key distribution and management costs are high,which hinders the development of power IoT security construction.Combined Public Key(CPK)technology uses a small number of seeds to generate unlimited public keys.It is very suitable for identity authentication in the power Internet of Things.In this paper,we propose a novel identity authentication scheme for power IoT.The scheme combines the physical unclonable function(PUF)with improved CPK technology to achieve mutual identity authentication between power IoT terminals and servers.The proposed scheme does not require third-party authentication and improves the security of identity authentication for power IoT.Moreover,the scheme reduces the resource consumption of power IoT devices.The improved CPK algorithm solves the key collision problem,and the third party only needs to save the private key and the public key matrix.Experimental results show that the amount of storage resources occupied in our scheme is small.The proposed scheme is more suitable for the power IoT.展开更多
The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem p...The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem planes are divided,and a corresponding risk analysis view is established to analyze risks for various planes.This paper uses Isaiah Berlin’s definition of liberty to more generally express the concept of security as positive rights and negative rights.In the risk analysis view,the target system is modeled from four dimensions:stakeholders,framework,architecture,and capability delivery.At last,three defensive lines are proposed to establish the identity credit system.展开更多
As the third play in August Wilson’s ten-play series,Fences marks a milestone for Wilson in the commercial arena and unquestionably affirms his mastery of the art of play-writing.Under the theoretical framework of Ju...As the third play in August Wilson’s ten-play series,Fences marks a milestone for Wilson in the commercial arena and unquestionably affirms his mastery of the art of play-writing.Under the theoretical framework of Julia Kristeva’s broad-sensed intertextuality,this paper explores the intertextual features of Fences to reveal that to survive in a hostile white-dominated environment where the idea of melting pot was advocated and racial discrimination remained widespread in 1950s,African Americans must discover the value of their true self.展开更多
Several excellent works have been done on the industrial Internet;however,some problems are still ahead,such as reliable security,heterogeneous compatibility,and system efficiency.Information-Centric Networking(ICN),a...Several excellent works have been done on the industrial Internet;however,some problems are still ahead,such as reliable security,heterogeneous compatibility,and system efficiency.Information-Centric Networking(ICN),an emerging paradigm for the future Internet,is expected to address the challenges of the industrial Internet to some extent.An integrated architecture for industrial network and identity resolution in the industrial Internet is proposed in this paper.A framework is also designed for the ICN-based industrial Network And Named Data Networking(NDN)based factory extranet with Software-Defined Networking(SDN).Moreover,an identity resolution architecture in the industrial Internet is proposed based on ICN paradigms with separate resolution nodes or with merging resolution and routing.展开更多
文摘The distinctive form of language emerged from the Internet is gaining more and more attention these days. In fact, different theories and methodologies can support to explain the phenomenon of the Internet language. Furthermore, language and identity in sociolinguistic domain can help study the relationship between the Internet language and its users. Taking a popular online discussion board Tianya.cn as an example, the affirmation of a virtual community's identity can be established through using its distinctive language.
基金the Science and Technology Project of State Grid Jiangsu Electric Power Co.,Ltd.under Grant No.J2020068.
文摘As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality.The existing public key infrastructure(PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT.Its key distribution and management costs are high,which hinders the development of power IoT security construction.Combined Public Key(CPK)technology uses a small number of seeds to generate unlimited public keys.It is very suitable for identity authentication in the power Internet of Things.In this paper,we propose a novel identity authentication scheme for power IoT.The scheme combines the physical unclonable function(PUF)with improved CPK technology to achieve mutual identity authentication between power IoT terminals and servers.The proposed scheme does not require third-party authentication and improves the security of identity authentication for power IoT.Moreover,the scheme reduces the resource consumption of power IoT devices.The improved CPK algorithm solves the key collision problem,and the third party only needs to save the private key and the public key matrix.Experimental results show that the amount of storage resources occupied in our scheme is small.The proposed scheme is more suitable for the power IoT.
文摘The risks of the current identity system represented by Domain Name System(DNS)and Object Identifier(OID)are studied.According to the characteristics of the industrial Internet Identity(Ⅲ)system,four open ecosystem planes are divided,and a corresponding risk analysis view is established to analyze risks for various planes.This paper uses Isaiah Berlin’s definition of liberty to more generally express the concept of security as positive rights and negative rights.In the risk analysis view,the target system is modeled from four dimensions:stakeholders,framework,architecture,and capability delivery.At last,three defensive lines are proposed to establish the identity credit system.
文摘As the third play in August Wilson’s ten-play series,Fences marks a milestone for Wilson in the commercial arena and unquestionably affirms his mastery of the art of play-writing.Under the theoretical framework of Julia Kristeva’s broad-sensed intertextuality,this paper explores the intertextual features of Fences to reveal that to survive in a hostile white-dominated environment where the idea of melting pot was advocated and racial discrimination remained widespread in 1950s,African Americans must discover the value of their true self.
基金supported in part by National Key Research&Development Project(Grant No.2019YFB1804400)the MIIT of China 2019(Innovative Identification and Resolution System for Industrial Internet of Things).
文摘Several excellent works have been done on the industrial Internet;however,some problems are still ahead,such as reliable security,heterogeneous compatibility,and system efficiency.Information-Centric Networking(ICN),an emerging paradigm for the future Internet,is expected to address the challenges of the industrial Internet to some extent.An integrated architecture for industrial network and identity resolution in the industrial Internet is proposed in this paper.A framework is also designed for the ICN-based industrial Network And Named Data Networking(NDN)based factory extranet with Software-Defined Networking(SDN).Moreover,an identity resolution architecture in the industrial Internet is proposed based on ICN paradigms with separate resolution nodes or with merging resolution and routing.