Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networ...Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networks (OSN)has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and externalapplications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as well as tothe OSN. Despite paying millions of dollars as fine every year, the OSN hasnot done any significant changes, as data is the fuel and what it loses as fine isfar less compared to the money OSN makes out of the shared data. In this work,we have discussed a wide range of possible privacy threats and solutions prevailing in OSN-Third Party Application (TPA) data sharing scenario. Our solutionmodels the behavior of the user, as well as TPA and pinpoints the avenues of oversharing to the users, thereby limiting the privacy loss of the user.展开更多
In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third...In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack.展开更多
Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require m...Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require ments are the standardization and normalization for enhancing the Chinese enterp rises’ level of logistic activities.This paper reveal the importance of manageme nt technique,information technique and business model in enterprise’s BPR throug h the positive analysis for business process of the third party logistics as a new system after reengineering businees process. Reorganization of marketing target. The characters of business procedure after N ew Sunshine recomposed include: "the last mile " service systems of logistics; s etting up HUB to control many end-points in big and middle cities, setting up s ingle-points in small cities, the small parts acting delivering system which st yle of "assembly and allot" are made of in. Reorganization of business model. The New Sunshine reorganized has three aspects of business model which set up: HUB, end-point and single-point. Reorganization of business process.The mainly business process of restructure Ne w Sunshine include : standard quote declaring prices to all attendants; on line, timely and exactly declaring prices; The net contract of B2C work on line; Tran smit to attendant; Logistice operating; feedback the working information; User t rack goods condition; Settling information; paying and so on, the different busi ness can separate into kinds of right corresponding to the business process, suc h as the picture of distributing parcel, ordering, moving, picking, transporting , delivering, information, inquiring and settling. Set up standard systems. Aims to execute standard management is to make distribu te and logistics for norm and standard, according to the resources share tog ether with the progresses especially and base on reducing the necessary expenses to reduce the living expenses, while low cost and effectively to ensure the goo d service for satisfy the present and potential needs of the customers.展开更多
Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to ...Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to diminish the threat to the inter-locutor's face in expressing disagreement have been carried out in English-as-the-first-language settings with lttle effort in ex-ploring disageement in Chinese culture.Therefore,this paper seeks to explore what disagreement strategies Chinese college stu-dents will use to mitigate the face-threatening act with absence or presence of a third party for an attempt to shed some light on the speech act theory in Chinese settings.展开更多
The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitut...The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitutionalization of private law” worldwide provides knowledge resources and reference materials for scholars in China;the second is the understanding and exploration of the judicial application of the Constitution since the 1980s. Among them, such concepts as “the Constitution has direct legal effect” and “the Constitution needs to be implemented by the people” could have directly affected the Qi Yuling case. Focusing on such topics as the case of Qi Yuling, judicial enforcement of the Constitution, and the compilation of the Civil Code, scholars discussed the ways and scope for inclu ding fundamental rights in private law based on their experience abroad. They also looked into specific issues, covering how fundamental rights affect civil acts and the private law effects fundamental rights like personality rights, equali ty rights, freedom of speech, and protection of personal information. In the context of promoting the full implementation of the Constitution in the new era, “fundamental rights and private law” is still a field with great potential in both practice and theory.展开更多
Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell tran...Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell transplantation(allo-SCT),but the antiviral activity of CMV-CTL types has not been compared.To determine whether third-party CMV-CTLs provide comparable long-term antiviral efficacy to transplant donor CMV-CTLs,we first compared the antiviral abilities of transplant donors and third-party CMV-CTLs for treatment of CMV infection in two mouse models,compared the in vivo recovery of CMV-specific immunity,and analyzed the underlying mechanisms driving sustained antiviral immunity.The results showed that both donor and third-party CMV-CTLs effectively combated systemic CMV infection by reducing CMV pathology and tumor burden 28 days postinfusion.The in vivo recovery of CMV-specific immunity after CMV-CTL infusion was comparable in both groups.A detailed analysis of the source of recovered CMV-CTLs showed the proliferation and expansion of graft-derived endogenous CMV-CTLs in both groups.Our clinical study,which enrolled 31 patients who received third-party CMV-CTLs and 62 matched pairs of individuals who received transplant donor CMV-CTLs for refractory CMV infection,further showed that adoptive therapy with donor or third-party CMV-CTLs had comparable clinical responses without significant therapy-related toxicity.We observed strong expansion of CD8+tetramer+T cells and proliferation of recipient endogenous CMV-CTLs after CMV-CTL infusion,which were associated with a reduced or cleared viral load.Our data confirmed that adoptive therapy with third-party or transplant donor CMV-CTLs triggered comparable antiviral responses to CMV infection that might be mediated by restoration of endogenous CMV-specific immunity.展开更多
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident...Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc.展开更多
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema...Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.展开更多
Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in Chin...Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in China's urban planning, as well as the role of a third party in urban planning. It argues that, within the current public participation framework, neither the "bottom-up" active participation nor the "top-down" passive participation can generate satisfactory effects or mediate multiple interests, whereas a professional third party could effectively promote public participation by bridging the public with the government. Besides, the third party plays an increasingly significant role in maintaining public interest, particularly in a context where the government often overemphasizes economic interests and there is a ubiquitous lack of awareness among the general public.展开更多
Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producin...Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producing areas presents strong significant possibility of significant harm to human health. Geo-information technologies present new opportunities for assessing stress environment and ways of determining exposure susceptibility in such areas. The study assesses the geographical distribution of oil-spills cluster and pattern using three geospatial techniques with ground data at 443 oil-spill incident sites from 1985-2008. The places with high (high-volume/ large impact/close proximity to communities) and low incident (low-volume/less impact/far-distance) are related to the quantity of oil-spills identified within those communities considered susceptible to spill impact and possible exposure. While the average nearest neighborhood analysis showed a probability that oil-spill distribution in the area is clustered (ratio < 1 with index value 0.19), the Getis-Ord General G test indicated that the oil-spill with high quantities (volume) discharge are significantly clustered within every 400 m. The Moran’s I index indicted that there is <1% likelihood that the clusters are as a result of random chance. These findings will help to combat the environmental problems and risks of prolong exposure to petroleum hydrocarbons by addressing future incidents or relocating oil facilities/communities and positioning of rapid response strategies.展开更多
An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electron...An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electronic contract has been widely studied by researchers.Supported by the basic principles of quantum mechanics,a quantum electronic contract scheme based on the single photon is proposed in this paper.In this scheme,two copies of the same contract are signed by both parties involved,and then a copy of each contract is sent to a trusted third party.The trusted third party verifies the signatures of both parties and compares the signed copies to determine whether the contract is valid.Compared with the previous scheme,this scheme is based on the quantum electronic contract signed by the single photon.Because the single photon is easy to prepare and operate,this scheme is simple and easy to implement.At the same time,the scheme does not need to exchange signatures between the two parties,which reduces the complexity of communication.Nevertheless,it requires both parties and the third party to be honest and trustworthy.展开更多
Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the...Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project.展开更多
Constructing circulation mode of high feasibility and good implementation effect is the key method to solve difficulties in the development of “Agricultural Super-Docking” at present in China. There are many problem...Constructing circulation mode of high feasibility and good implementation effect is the key method to solve difficulties in the development of “Agricultural Super-Docking” at present in China. There are many problems that exist in the process of the development of “Agricultural Super-Docking” by our analyzing from both the benefit of subjects and the whole supply chain perspectives. A large amount of relevant literature research shows that adopting the “cooperation between the government and the third party logistics enterprises to build distribution center” innovation model can solve these problems. This model can effectively remove obstacles between farmers and supermarkets. It is conducive to the development of small and medium-scale the farmer cooperatives, supermarkets and the third party logistics enterprises that don’t have a strong financial strength and a high degree of brand influence. In addition, it can also produce considerable social benefits. In order to ensure the implementation efficiency of the model to maximize, some management issues in the implementation process about the determination of core subject in supply chain, the method of evaluating the third party logistics enterprises grade, the planning of the number of customers for the distribution center, the mechanism of income distribution among multiple subjects and the implementation of relevant policies after the model into practice should be taken into account.展开更多
The Netherlands With the rapid development of computers and Management Information Systems(MIS), increasing number of factories have paid more attention to developing MIS, including provision for maintenance. But mai...The Netherlands With the rapid development of computers and Management Information Systems(MIS), increasing number of factories have paid more attention to developing MIS, including provision for maintenance. But maintenance systems in many organizations have been developed in a piecemeal fashion and often in isolation from other management systems . This paper describes the main relationship between maintenance and one of the maintenance resourcesPersonal.展开更多
With key exchange protocols, a secure session key is generated between two remote users, andservers and exchanged between them. It is generally used to prevent unauthorised users fromgaining access to sensitive data. ...With key exchange protocols, a secure session key is generated between two remote users, andservers and exchanged between them. It is generally used to prevent unauthorised users fromgaining access to sensitive data. This article presents an enhanced three-party authenticated keyexchange protocols (ETP-AKE) protocol that does not depend on symmetric key encryption andinstead uses asymmetric key encryption. A key component of the proposed ETP-AKE protocol isusing elliptic curve encryption in conjunction with a one-way hash function. Its integrity certificationwas confirmed via the usage of the AVISPA tool package. Our proposed protocol is intendedto protect against various security threats, including the man-in-the-middle assault, the parallelattack, and the key-compromise attack, among others.展开更多
Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle i...Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle in geographic space is a severe problem since adversaries will surely regard these constraints. A novel framework is proposed to enhance location-dependent queries, based on the theoretical work of k-anonymity and Voronoi diagrams, allows a user to express service requirement and privacy require- ment by specifying a region and an appropriate value ofk. A trusted anonymity server form a restricted set (k, r, s), which is composed of a number of discrete points to meet the requirements for location k-anonymity and location /-diversity. The location-based services (LBS) server implements an efficient algorithm for continu- ous-region-query processing. Simulation results demonstrated that the framework is superior to previous works in terms of privacy. Moreover, discreteness and randomness of the anonymous set are conducive to resisting location tracking attacks.展开更多
The increased number of free and open Sentinel satellite images has led to new applications of these data.Among them is the systematic classification of land cover/use types based on patterns of settlements or agricul...The increased number of free and open Sentinel satellite images has led to new applications of these data.Among them is the systematic classification of land cover/use types based on patterns of settlements or agriculture recorded by these images,in particular,the identification and quantification of their temporal changes.In this paper,we will present guidelines and practical examples of how to obtain rapid and reliable image patch labelling results and their validation based on data mining techniques for detecting these temporal changes,and presenting these as classification maps and/or statistical analytics.This represents a new systematic validation approach for semantic image content verification.We will focus on a number of different scenarios proposed by the user community using Sentinel data.From a large number of potential use cases,we selected three main cases,namely forest monitoring,flood monitoring,and macro-economics/urban monitoring.展开更多
What has been China’s approach to conflict management in the Middle East?The article begins with a review of Chinese responses to conflict,its wariness at intervention and the emergence of a new model of third-party ...What has been China’s approach to conflict management in the Middle East?The article begins with a review of Chinese responses to conflict,its wariness at intervention and the emergence of a new model of third-party intervention labelled‘quasimediation’.The article then examines three cases of conflict in the region since 2011 and China’s engagement with them:in Libya,Syria and Yemen.While quasi-mediation is not the principal form of Chinese behavior in each case,several common themes are present.They include Chinese wariness at the initial protests;rhetorical appeals for political dialogue between government and opposition and national unity;deference to powerful external actors with interests in the conflict-affected state;and a willingness to pursue commercial opportunities,which advantage some actors and marginalize others.The article therefore suggests that China is not currently making use of quasi-mediation in the Middle East,but that cross-regional comparative studies may reveal if it is occurring elsewhere.展开更多
文摘Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networks (OSN)has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and externalapplications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as well as tothe OSN. Despite paying millions of dollars as fine every year, the OSN hasnot done any significant changes, as data is the fuel and what it loses as fine isfar less compared to the money OSN makes out of the shared data. In this work,we have discussed a wide range of possible privacy threats and solutions prevailing in OSN-Third Party Application (TPA) data sharing scenario. Our solutionmodels the behavior of the user, as well as TPA and pinpoints the avenues of oversharing to the users, thereby limiting the privacy loss of the user.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61402058,61572086 and 61370203the Fund for Middle and Young Academic Leaders of Chengdu University of Information Technology under Grant No J201511+2 种基金the Science and Technology Support Project of Sichuan Province under Grant No 2013GZX0137the Fund for Young Persons Project of Sichuan Province under Grant No 12ZB017the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No szjj2014-074
文摘In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack.
文摘Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require ments are the standardization and normalization for enhancing the Chinese enterp rises’ level of logistic activities.This paper reveal the importance of manageme nt technique,information technique and business model in enterprise’s BPR throug h the positive analysis for business process of the third party logistics as a new system after reengineering businees process. Reorganization of marketing target. The characters of business procedure after N ew Sunshine recomposed include: "the last mile " service systems of logistics; s etting up HUB to control many end-points in big and middle cities, setting up s ingle-points in small cities, the small parts acting delivering system which st yle of "assembly and allot" are made of in. Reorganization of business model. The New Sunshine reorganized has three aspects of business model which set up: HUB, end-point and single-point. Reorganization of business process.The mainly business process of restructure Ne w Sunshine include : standard quote declaring prices to all attendants; on line, timely and exactly declaring prices; The net contract of B2C work on line; Tran smit to attendant; Logistice operating; feedback the working information; User t rack goods condition; Settling information; paying and so on, the different busi ness can separate into kinds of right corresponding to the business process, suc h as the picture of distributing parcel, ordering, moving, picking, transporting , delivering, information, inquiring and settling. Set up standard systems. Aims to execute standard management is to make distribu te and logistics for norm and standard, according to the resources share tog ether with the progresses especially and base on reducing the necessary expenses to reduce the living expenses, while low cost and effectively to ensure the goo d service for satisfy the present and potential needs of the customers.
文摘Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to diminish the threat to the inter-locutor's face in expressing disagreement have been carried out in English-as-the-first-language settings with lttle effort in ex-ploring disageement in Chinese culture.Therefore,this paper seeks to explore what disagreement strategies Chinese college stu-dents will use to mitigate the face-threatening act with absence or presence of a third party for an attempt to shed some light on the speech act theory in Chinese settings.
文摘The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitutionalization of private law” worldwide provides knowledge resources and reference materials for scholars in China;the second is the understanding and exploration of the judicial application of the Constitution since the 1980s. Among them, such concepts as “the Constitution has direct legal effect” and “the Constitution needs to be implemented by the people” could have directly affected the Qi Yuling case. Focusing on such topics as the case of Qi Yuling, judicial enforcement of the Constitution, and the compilation of the Civil Code, scholars discussed the ways and scope for inclu ding fundamental rights in private law based on their experience abroad. They also looked into specific issues, covering how fundamental rights affect civil acts and the private law effects fundamental rights like personality rights, equali ty rights, freedom of speech, and protection of personal information. In the context of promoting the full implementation of the Constitution in the new era, “fundamental rights and private law” is still a field with great potential in both practice and theory.
基金DB is supported by grants from the German Research Foundation(361210922/RTG 2408 and SFB 854/A23).
文摘Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell transplantation(allo-SCT),but the antiviral activity of CMV-CTL types has not been compared.To determine whether third-party CMV-CTLs provide comparable long-term antiviral efficacy to transplant donor CMV-CTLs,we first compared the antiviral abilities of transplant donors and third-party CMV-CTLs for treatment of CMV infection in two mouse models,compared the in vivo recovery of CMV-specific immunity,and analyzed the underlying mechanisms driving sustained antiviral immunity.The results showed that both donor and third-party CMV-CTLs effectively combated systemic CMV infection by reducing CMV pathology and tumor burden 28 days postinfusion.The in vivo recovery of CMV-specific immunity after CMV-CTL infusion was comparable in both groups.A detailed analysis of the source of recovered CMV-CTLs showed the proliferation and expansion of graft-derived endogenous CMV-CTLs in both groups.Our clinical study,which enrolled 31 patients who received third-party CMV-CTLs and 62 matched pairs of individuals who received transplant donor CMV-CTLs for refractory CMV infection,further showed that adoptive therapy with donor or third-party CMV-CTLs had comparable clinical responses without significant therapy-related toxicity.We observed strong expansion of CD8+tetramer+T cells and proliferation of recipient endogenous CMV-CTLs after CMV-CTL infusion,which were associated with a reduced or cleared viral load.Our data confirmed that adoptive therapy with third-party or transplant donor CMV-CTLs triggered comparable antiviral responses to CMV infection that might be mediated by restoration of endogenous CMV-specific immunity.
文摘Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc.
基金supported by the National Natural Science Foundation of China(Grant No.61572086)Major Project of Education Department in Sichuan(Grant No.18ZA0109)Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).
文摘Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.
基金the Third Prize at the 7th Youth Paper Awards of Urban Planning Society of China, which was also named as the 13th National Youth Thesis Competition on Urban Planning, sponsored by the Urban Planning Society of China
文摘Taking the Enning Road Neighborhood Renovation Project in Guangzhou as a case, the paper aims to illustrate, based on the materials collected from interviews and news media, the dilemma of public participation in China's urban planning, as well as the role of a third party in urban planning. It argues that, within the current public participation framework, neither the "bottom-up" active participation nor the "top-down" passive participation can generate satisfactory effects or mediate multiple interests, whereas a professional third party could effectively promote public participation by bridging the public with the government. Besides, the third party plays an increasingly significant role in maintaining public interest, particularly in a context where the government often overemphasizes economic interests and there is a ubiquitous lack of awareness among the general public.
文摘Oil spill occurrence during exploration, production and distribution can cause deleterious impact on the environment. Contamination of local streams/rivers, farmlands, forest resources and biodiversity in oil producing areas presents strong significant possibility of significant harm to human health. Geo-information technologies present new opportunities for assessing stress environment and ways of determining exposure susceptibility in such areas. The study assesses the geographical distribution of oil-spills cluster and pattern using three geospatial techniques with ground data at 443 oil-spill incident sites from 1985-2008. The places with high (high-volume/ large impact/close proximity to communities) and low incident (low-volume/less impact/far-distance) are related to the quantity of oil-spills identified within those communities considered susceptible to spill impact and possible exposure. While the average nearest neighborhood analysis showed a probability that oil-spill distribution in the area is clustered (ratio < 1 with index value 0.19), the Getis-Ord General G test indicated that the oil-spill with high quantities (volume) discharge are significantly clustered within every 400 m. The Moran’s I index indicted that there is <1% likelihood that the clusters are as a result of random chance. These findings will help to combat the environmental problems and risks of prolong exposure to petroleum hydrocarbons by addressing future incidents or relocating oil facilities/communities and positioning of rapid response strategies.
基金This work is supported by NSFC(Grant Nos.61572086,61402058)Sichuan Science and Technology Program(Grant Nos.2017JY0168,2018TJPT0012,2018GZ0232,2018CC0060,2017GFW0119,2017GZ0006,2016GFW0127)+2 种基金the National Key Research and Development Program(No.2017YFB0802302)Sichuan innovation team of quantum security communication(No.17TD0009)Sichuan academic and technical leaders training funding support projects(No.2016120080102643).
文摘An electronic contract is a contract signed by electronic means,which is widely used in electronic commerce activities.In recent years,with the rapid development of quantum cryptography technology,the quantum electronic contract has been widely studied by researchers.Supported by the basic principles of quantum mechanics,a quantum electronic contract scheme based on the single photon is proposed in this paper.In this scheme,two copies of the same contract are signed by both parties involved,and then a copy of each contract is sent to a trusted third party.The trusted third party verifies the signatures of both parties and compares the signed copies to determine whether the contract is valid.Compared with the previous scheme,this scheme is based on the quantum electronic contract signed by the single photon.Because the single photon is easy to prepare and operate,this scheme is simple and easy to implement.At the same time,the scheme does not need to exchange signatures between the two parties,which reduces the complexity of communication.Nevertheless,it requires both parties and the third party to be honest and trustworthy.
文摘Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project.
文摘Constructing circulation mode of high feasibility and good implementation effect is the key method to solve difficulties in the development of “Agricultural Super-Docking” at present in China. There are many problems that exist in the process of the development of “Agricultural Super-Docking” by our analyzing from both the benefit of subjects and the whole supply chain perspectives. A large amount of relevant literature research shows that adopting the “cooperation between the government and the third party logistics enterprises to build distribution center” innovation model can solve these problems. This model can effectively remove obstacles between farmers and supermarkets. It is conducive to the development of small and medium-scale the farmer cooperatives, supermarkets and the third party logistics enterprises that don’t have a strong financial strength and a high degree of brand influence. In addition, it can also produce considerable social benefits. In order to ensure the implementation efficiency of the model to maximize, some management issues in the implementation process about the determination of core subject in supply chain, the method of evaluating the third party logistics enterprises grade, the planning of the number of customers for the distribution center, the mechanism of income distribution among multiple subjects and the implementation of relevant policies after the model into practice should be taken into account.
文摘The Netherlands With the rapid development of computers and Management Information Systems(MIS), increasing number of factories have paid more attention to developing MIS, including provision for maintenance. But maintenance systems in many organizations have been developed in a piecemeal fashion and often in isolation from other management systems . This paper describes the main relationship between maintenance and one of the maintenance resourcesPersonal.
文摘With key exchange protocols, a secure session key is generated between two remote users, andservers and exchanged between them. It is generally used to prevent unauthorised users fromgaining access to sensitive data. This article presents an enhanced three-party authenticated keyexchange protocols (ETP-AKE) protocol that does not depend on symmetric key encryption andinstead uses asymmetric key encryption. A key component of the proposed ETP-AKE protocol isusing elliptic curve encryption in conjunction with a one-way hash function. Its integrity certificationwas confirmed via the usage of the AVISPA tool package. Our proposed protocol is intendedto protect against various security threats, including the man-in-the-middle assault, the parallelattack, and the key-compromise attack, among others.
基金Supported by the National Natural Science Foundation of China(61472097)Specialized Research Fund for the Doctoral Program of Higher Education of China(20132304110017)Natural Science Foundation of Heilongjiang Province of China(F2015022)
文摘Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle in geographic space is a severe problem since adversaries will surely regard these constraints. A novel framework is proposed to enhance location-dependent queries, based on the theoretical work of k-anonymity and Voronoi diagrams, allows a user to express service requirement and privacy require- ment by specifying a region and an appropriate value ofk. A trusted anonymity server form a restricted set (k, r, s), which is composed of a number of discrete points to meet the requirements for location k-anonymity and location /-diversity. The location-based services (LBS) server implements an efficient algorithm for continu- ous-region-query processing. Simulation results demonstrated that the framework is superior to previous works in terms of privacy. Moreover, discreteness and randomness of the anonymous set are conducive to resisting location tracking attacks.
基金The work was supported by the European Commission’s H2020 CANDELA project under Grant Agreement No.776193.
文摘The increased number of free and open Sentinel satellite images has led to new applications of these data.Among them is the systematic classification of land cover/use types based on patterns of settlements or agriculture recorded by these images,in particular,the identification and quantification of their temporal changes.In this paper,we will present guidelines and practical examples of how to obtain rapid and reliable image patch labelling results and their validation based on data mining techniques for detecting these temporal changes,and presenting these as classification maps and/or statistical analytics.This represents a new systematic validation approach for semantic image content verification.We will focus on a number of different scenarios proposed by the user community using Sentinel data.From a large number of potential use cases,we selected three main cases,namely forest monitoring,flood monitoring,and macro-economics/urban monitoring.
文摘What has been China’s approach to conflict management in the Middle East?The article begins with a review of Chinese responses to conflict,its wariness at intervention and the emergence of a new model of third-party intervention labelled‘quasimediation’.The article then examines three cases of conflict in the region since 2011 and China’s engagement with them:in Libya,Syria and Yemen.While quasi-mediation is not the principal form of Chinese behavior in each case,several common themes are present.They include Chinese wariness at the initial protests;rhetorical appeals for political dialogue between government and opposition and national unity;deference to powerful external actors with interests in the conflict-affected state;and a willingness to pursue commercial opportunities,which advantage some actors and marginalize others.The article therefore suggests that China is not currently making use of quasi-mediation in the Middle East,but that cross-regional comparative studies may reveal if it is occurring elsewhere.