期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
On Autonomy of Will and the Applicable Law of Labor Contract:From the Perspective of Chinese Legislation
1
作者 Fan Jiaoyan 《中国国际私法与比较法年刊》 CSSCI 2014年第1期80-94,共15页
There are so many different opinions on whether the autonomy of will is applied in labor contract.In this paper,the author discusses the application and limitation of autonomy of will in labor contract,and puts forwar... There are so many different opinions on whether the autonomy of will is applied in labor contract.In this paper,the author discusses the application and limitation of autonomy of will in labor contract,and puts forward some suggestions on the application of Article 43 of Law of the Application of Law for Foreign-related Civil Relationships after the introduction of Chinese legislation of the applicable law of labor contract.Autonomy of will is a useful principle in resolving disputes arising from foreign-related labor contract in China. 展开更多
关键词 China SERVICE On Autonomy of Will and the Applicable Law of Labor Contract:From the Perspective of Chinese Legislation
下载PDF
An Image Encryption Method Based on Quantum Fourier Transformation
2
作者 Ying Liu Bing Zhou +2 位作者 Zijing Li Jiangnan Deng Zhengying Cai 《International Journal of Intelligence Science》 2018年第3期75-87,共13页
The image security problem is an important area in information security, and image encryption plays a vital role in this day. To protect the image encryption from the attack of quantum algorithm appeared recently, an ... The image security problem is an important area in information security, and image encryption plays a vital role in this day. To protect the image encryption from the attack of quantum algorithm appeared recently, an image encryption method based on quantum Fourier transformation is proposed here. First, the image encryption and Fourier transformation are discussed here, then a encryption function is proposed. Second, a quantum Fourier transformation is introduced to quantum encryption, and the full step of quantum encryption is given as well. Third, the security of the proposed quantum encryption if analyzed, and some propositions are also presented. Lastly, some conclusions are indicated and some possible directions are also listed. 展开更多
关键词 IMAGE ENCRYPTION QUANTUM ENCRYPTION QUANTUM FOURIER TRANSFORMATION QUANTUM IMAGE
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部