期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
The Security Strategy of the European Union: Origin, Evolution, and Policy Direction
1
作者 Zhang Jian 《Contemporary International Relations》 2022年第5期1-32,共32页
With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of secur... With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of security and established corresponding mechanisms. In this process,the EU has also formed and developed its National Security Strategy and issued four versions of security strategy reports in 2003, 2008, 2016, and 2022. The 2022 version of the EU security strategy(hereafter referred to as the New Security Strategy), for the first time, has identified Russia as a long-term and direct threat. Furthermore, it has paid increased attention to traditional security, especially the upgrading of military capabilities and has become more reliant on the United States and the North Atlantic Treaty Organization. In the future, the EU will accelerate the militarization process, exert all-out efforts to contain Russia, scrutinize neighborhood security, and increase its swing on China policy. 展开更多
关键词 European Union security strategy European integration EU-Russia relations
下载PDF
Strategic Direction of Russia Interpreted from Its New National Security Strategy
2
作者 Chen Yu 《Contemporary International Relations》 2022年第1期46-70,共25页
In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that secu... In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that security should be prioritized over other aspects;it gives more attention to the chaotic aspects of order change in its assessment of the international situation;it highlights the threats from the West;and it places increased emphasis on domestic capacity building as a means for safeguarding national security.From the content of the new Strategy as well as Russia’s policies in recent years,the strategy of Russia for the foreseeable future can be generally characterized as inward-looking.Domestically,its policies will become more conservative;diplomatically,it will take up a defensive position;and economically,it will increasingly emphasize security and selfreliance.In other words,several issues that were previously overlooked will be given attention.However,strategic introversion does not mean that Russia will invest all its energy in defense.Instead,Russia will build up strength for changes that lie ahead.With the expected strategic introversion,Russia will fnd difculty in making breakthroughs in terms of its relations with the West;the China-Russia relations will continue on the path of steady development;and Russia will place greater importance to the balance of power among major countries. 展开更多
关键词 RUSSIA national security strategy strategic introversion major country relations
下载PDF
India’s National Security Strategy:Pursuits,Origins,and Practice
3
作者 Hu Shisheng Wang Jun 《Contemporary International Relations》 2022年第6期118-145,共28页
India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of ... India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of national security strategy that has distinct Indian characteristics. Generally, successive governments in India have followed the basic principles articulated in Kautilya’s Arthasastra and various security practices adopted during the British Raj. India’s national security strategies are based on an internal logic of geopolitical rivalry and changes in international scenarios, and they are strongly influenced by Hindu traditions and the “Sad-Dharma” purported by King Ashoka. The objective is to create an India-dominated security order in the South Asian subcontinent, which persistently builds its capacity and system as a “net security provider” in the Indian Ocean Rim. Moreover, India is vigorously expanding its network of influence in the Pacific region in an effort to become a world leading power that enjoys a high level of strategic autonomy. 展开更多
关键词 INDIA national security strategy strategic autonomy
下载PDF
RECENT DEVELOPMENTS OF US ASIA-PACIFIC SECURITY STRATEGY AND CHINA'S COUNTERMEASURES
4
作者 ZHANG JINGQUAN 《Contemporary World》 2017年第2期14-17,共4页
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi... The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald 展开更多
关键词 US in IS on WILL that RECENT DEVELOPMENTS OF US ASIA-PACIFIC security strategy AND CHINA’S COUNTERMEASURES ROK of
下载PDF
The Impact of E-commerce on the Development of Regional Economy and Its Analysis of Security Strategy
5
作者 Pengfei GAO 《International Journal of Technology Management》 2015年第5期59-62,共4页
The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively dis... The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role. 展开更多
关键词 Network shopping E-commerce system Regional economy security strategy
下载PDF
CHINA'S POST-COLD WAR SECURITY STRATEGY
6
作者 Yan Xuetong Deputy Director,Center for China’s Foreign Policy Studies,China Institute of Contemporary International Relations 《Contemporary International Relations》 1995年第5期1-16,共16页
Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether ... Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether will Chi-na seek external expansion when it becomes powerful? In 1992, there began to ap-pear a myth of so-called "China threat". In its November 28 issue of that year, 展开更多
关键词 CHINA’S POST-COLD WAR security strategy
下载PDF
Suggestions on China's Petroleum Security Strategy and Policies
7
《China Oil & Gas》 CAS 2001年第1期23-27,共5页
关键词 security Suggestions on China’s Petroleum security strategy and Policies
下载PDF
Security strategy of powered-off SRAM for resisting physical attack to data remanence
8
作者 余凯 邹雪城 +1 位作者 余国义 王伟旭 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2009年第9期102-106,共5页
This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered- off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the s... This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered- off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%. 展开更多
关键词 SRAM security strategy physical attack data remanence low-voltage low-power
原文传递
Gulf Region and EU’s Maritime Security Strategy:The Expanding‘Blue Border’?
9
作者 Zhen Yu 《Asian Journal of Middle Eastern and Islamic Studies》 2022年第1期102-112,共11页
The European Union(EU)and its core member states are active participants and stakeholders in the security affairs of the Gulf region.European maritime security is not only an important extension of European security i... The European Union(EU)and its core member states are active participants and stakeholders in the security affairs of the Gulf region.European maritime security is not only an important extension of European security in geospatial and functional areas,but also an indispensable part of Europe’s overall security strategy.However,the attention to the EU’s maritime security was distracted before 2010,while the concern for European maritime security and the Gulf region was limited to safe transit routes through the international straits and archipelagic waters of the Gulf region.With the tension in Gulf was increased by oil tanker attacks,the role of EU and its core member states as major stakeholders in Gulf maritime security affairs has been more and more important. 展开更多
关键词 Gulf Region EU Maritime security strategy
下载PDF
Some Observations on The U.S.Greater Central Asia Security Strategy Planning
10
作者 De Quanying Jiang Shujuan 《Peace》 2013年第3期51-59,共9页
The United States is shaping a Central Asian Security Strategy Planning with priority on economics and trade. In area of economics and trade, it pushes on the U.S.-Central Asian trade and investment framework agreemen... The United States is shaping a Central Asian Security Strategy Planning with priority on economics and trade. In area of economics and trade, it pushes on the U.S.-Central Asian trade and investment framework agreement, focusing on developing trade in greater Central Asian region so as to encourage the regional countries to lower trade barriers and to advance reconfiguration of the regional countries and Afghanistan neighboring areas. In area of energy, it builds a greater Central Asian transportation network composed of highway, railway, natural gas-pipeline and electricity grid line to boom the regional trade and economy. In area of anti-terrorism, it strengthens security cooperation with the Central Asian countries. Meanwhile, it also pushes forward a multi-lateral security mechanism, increases economic aid, and promotes regional cooperation so as to achieve the regional lasting peace. 展开更多
关键词 Some Observations on The U.S.Greater Central Asia security strategy Planning security Asia OSCE
原文传递
欧盟经济安全战略析要
11
作者 董一凡 《Contemporary International Relations》 2024年第3期96-118,共23页
Against the backdrop of the accelerating changes unseen in a century and the intensifying major-country competition,the European Union(EU) has significantly modified its economic security concepts,as illustrated by th... Against the backdrop of the accelerating changes unseen in a century and the intensifying major-country competition,the European Union(EU) has significantly modified its economic security concepts,as illustrated by the release of its first-ever strategy on economic security in 2023,which will continue to be advanced in 2024.This article discusses the possible pathways for the EU to implement its economic security strategy in the context of “de-risking” by taking stock of the evolution of EU economic security concepts and its relevant policy documents and foreign economic policies and practices in recent years.Finally,this article will analyze some of the negative impacts of the latest EU policy on the global economy and trade,as well as on European economic prospects. 展开更多
关键词 de-risking economic security economic security strategy European Union
下载PDF
土耳其国家安全战略:演变、特征与实践
12
作者 李亚男 《Contemporary International Relations》 2024年第3期52-78,共27页
Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideolog... Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideology guiding its national security strategy has gradually transitioned from Kemalism to Erdo?anism.At the present stage,Türkiye's national security strategy is prominently characterized by its geographical and cultural duality,the expansivity deep-rooted in its history and religion,and an enterprising response to its geopolitical realities.Such a strategy will comprehensively shape Türkiye's practice of preserving national security and guide the future of its security policies,prompting the country to seek a balance between its differentiated perceptions of identity and generalized national interests. 展开更多
关键词 diverse identity national security strategy TURKIYE
下载PDF
Present Situation and Strategies for State Foodstuff Security 被引量:2
13
作者 Jiayong Song Jun Yin 《Chinese Business Review》 2005年第2期52-55,共4页
The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstu... The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstuff Security: integrating new biological techniques with traditional methods, full utilization of soil with its protection, policies leading with market regulation, steady high yield with promoting additional value through further processing, general foodstuff production with substitute food seeking, domestic self-supply with international trade complementarities as well as short-term exploiting with long-term development on the basis of the increase of general foodstuff production capability. 展开更多
关键词 foodstuff security strategy
下载PDF
Strategic Thinking on the Path of National Security with Chinese Characteristics
14
作者 Yuan Peng 《Contemporary International Relations》 2022年第3期1-26,共26页
General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,whi... General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,which are synergistic and inseparable.Compared with other major global powers,China is embarking on a path of national security that incorporates distinctive Chinese characteristics.Unlike the United States,which seeks international expansion and hegemony while pursuing national security,China is dedicated to maintaining global security and building a community with a shared future for humanity.Unlike Russia,which prioritizes national security over everything else,China places greater emphasis on balancing development and security.Unlike Europe and Japan,which entrust their national security to other countries,China has always adhered to the principle of independence and self-reliance.An essential feature of the path of national security with Chinese characteristics is that it upholds the unity of the people’s security,political security,and the supremacy of national interests.Moreover,China will remain committed to peaceful development while defending its interests.China will continue to balance development and security imperatives,maintaining an independent foreign policy while building a community with a shared future for humanity.To make solid strides on the path of national security with Chinese characteristics,the fundamental task will be pursuing a holistic approach to national security and implementing the Ten Upholds. 展开更多
关键词 holistic approach to national security path of national security with Chinese characteristics national security strategy
下载PDF
Construction of Regional Grain Industry Chain and Supply Chain in Yunnan Province
15
作者 Xuejiao WANG Liang LI +2 位作者 Zhaoqing MAO Longwei LI Liangzheng CHEN 《Agricultural Biotechnology》 CAS 2022年第4期124-131,135,共9页
As a southwestern border province of China,Yunnan is featured by the geographical advantage of proximity to the Indo-China Peninsula which is known as World Rice Warehouse,and its capital and technology are ahead of t... As a southwestern border province of China,Yunnan is featured by the geographical advantage of proximity to the Indo-China Peninsula which is known as World Rice Warehouse,and its capital and technology are ahead of the neighboring countries of China.Therefore,to enhance its support capability in consolidating and improving the national food security strategy,Yunnan should further develop its comparative advantages by building the regional food industry chain and supply chain depending on the province's grain system of production,processing,storage and transportation,as well as its agricultural economic and trade cooperation platforms and channels with the neighboring countries of China.In this study,comparative analysis and related methods were used to systematically analyze the scale of grain production in Yunnan,the proportion of its grain production to the national total amount,the transition of its grain variety structure and the characteristics of its food security system,as well as the grain export trade of the 6 countries in the Indo-China Peninsula from 2010 to 2019.Then,the problems in grain production in Yunnan were clarified,such as the decrease of grain ration production capacity,the decline of comparative benefits of grain production and the insufficient support for agricultural"going global"strategy.Finally,a series of countermeasures were put forward,including further implementing the strategy of"reserving grain in land and technology"to increase Yunnan's production capacity of grain,focusing on agricultural products storage and transportation system to improve the ability to obtain grain from abroad,expanding the border processing and logistics industry,optimizing the policy of agricultural products'import and export,and etc. 展开更多
关键词 Food security strategy Industry chain and supply chain Comparative advantage Production capacity YUNNAN
下载PDF
From Stalin to Putin: Russian Strategic Culture in the XXI Century, Its Continuity, and Change
16
作者 Polina Sinovets 《Journal of Philosophy Study》 2016年第7期417-423,共7页
The last two years have attracted the world's attention to Russia. The annexation of Crimea, the hybrid war in Eastern Ukraine, and finally the unexpected interference in Syria--all these actions bring us back to the... The last two years have attracted the world's attention to Russia. The annexation of Crimea, the hybrid war in Eastern Ukraine, and finally the unexpected interference in Syria--all these actions bring us back to the question of understanding the Russian motivation properly. Generally, it includes the whole interpretation of Russian strategic culture which is based on the research and analysis of the different factors: from literature and history to religion and political nature of the Russian state. Significant attempts to understand Moscow's strategic culture were made by the American experts during the Cold War; therefore the article analyzes the main pillars of Russian strategic culture, its continuity and change in comparison to Soviet times as well as the main reactions of Moscow for what it considers to be a threat. 展开更多
关键词 strategic culture Russian identity security strategy geopolitical approach
下载PDF
A new method of encryption wireless energy transmission for EV in the smart grid 被引量:1
17
作者 Li Ji Lifang Wang Chenglin Liao 《CES Transactions on Electrical Machines and Systems》 2017年第4期405-410,共6页
Wireless charging has played a crucial role in electric vehicle charging market presently.As electric vehicles will be important nodes access to the smart grid in the future,the security flow of energy and information... Wireless charging has played a crucial role in electric vehicle charging market presently.As electric vehicles will be important nodes access to the smart grid in the future,the security flow of energy and information between wireless charging infrastructure and the smart grid will directly affect the security of the smart grid.A novel secure wireless transfer method for energy and information transfer simultaneously has been represented in this paper by designing a reasonable dual-band coil for simultaneous transmission of energy and information,using improved chaotic modulation and a three times handshake protocol for encrypting energy and information between wireless charging infrastructure and the smart grid.Both the simulation and experiments show that the security of energy transmission can be effectively improved by this structure,in the premise of ensuring the power and efficiency of wireless energy transmission. 展开更多
关键词 Chaotic modulation dual-band coil secure wireless energy transfer strategy smart grid.
下载PDF
EXISTENCE OF STOCHASTIC EQUILIBRIUM WITH INCOMPLETE FINANCIAL MARKETS
18
作者 ZHANG SHUNMING 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1998年第1期77-94,共18页
This paper analyzes the aritrage free security markets and the general equilibrium existence problem for a stochastic economy with incomplete financial markets. Information structure is given by an event tree. This pa... This paper analyzes the aritrage free security markets and the general equilibrium existence problem for a stochastic economy with incomplete financial markets. Information structure is given by an event tree. This paper restricts attention to purely financial securities. It is assume that trading takes place in the sequence of spot markets and futures markets for securities payable in units of account. Unlimited short selling in securities is allowed. Financial markets may be incomplete: some consumption streams may be impossible to obtain by any trading strategy. Securities may be individually precluded from trade at arbitrary states and dates. The security price process is arbitrage free the dividend process if and only if there exists a stochstic state price (present value) process: the present value of the security prices at every vertex is the present value of their dividend and capital values over the set of immediate successors; the current value of each security at every vertex is the present value of its future dividend stream over all succeeding vertices. The existence of such an equilibrium is proved under the following condition: continuous, weakly convex, strictly monotone and complete preferences, strictly positive endowments and dividends processes. 展开更多
关键词 Stochastic equilibrium security trading strategy arbitrage free price process incomplete financial markets.
全文增补中
INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM
19
作者 XIN LIN WEIHUI SHI YONGXIANG DU 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2013年第4期62-72,共11页
The distributed simulation system interoperation can be divided into six levels.Interactive data encryption can be completed in each level,lead to six encryption strategies:data field encryption,data package encryptio... The distributed simulation system interoperation can be divided into six levels.Interactive data encryption can be completed in each level,lead to six encryption strategies:data field encryption,data package encryption,program module encryption,simulation application encryption,simulation node encryption,and simulation system encryption.There are four basic Encryption/decryption realization modes:serial modes with software or hardware realization,parallel modes based on embedded processor or FPGA/ASIC system.Large and Complex distributed simulation system may employ one or several encryption strategies and realization modes. 展开更多
关键词 INTEROPERABILITY ENCRYPTION DECRYPTION security strategy
原文传递
QUASI-CONVEX MULTIOBJECTIVE GAME-SOLUTION CONCEPTS,EXISTENCE AND SCALARIZATION
20
作者 LI YUANXI 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 1995年第2期233-244,共12页
This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be appl... This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be applied to prove the existence of solutions for quasi-convexmultiobjective generalized game. On the other hand,a new concept of security strategy isintroduced and its existence is proved.At last,some relations between these solutions areestablished. 展开更多
关键词 Multiobjective generalized game Pareto-optimal absolute security strategy Pareto-optimal weakly efficient security strategy.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部