期刊文献+
共找到218,372篇文章
< 1 2 250 >
每页显示 20 50 100
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data
1
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
A New Double Layer Multi-Secret Sharing Scheme
2
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
3
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
下载PDF
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
4
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
原文传递
Prevalence and Factors Associated with Sharing of Human Immunodeficiency Seropositivity Status among Serodiscordant Couples in the City of Parakou (Benin)
5
作者 Djossou Sègnon Eurydice Elvire Damien Georgia Barikissou +7 位作者 Meba Bio Mamatou Tokpanoude Ignace Ahanhanzo-Glele Rhonel Ataigba Iretinethania Elie Agossoukpe Benoit Kakpo-Zannou Rodrigue Kamoutchoni Corneille Aguemon Badirou 《Open Journal of Epidemiology》 2024年第1期1-18,共18页
Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing am... Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple. 展开更多
关键词 Serodiscordance sharing of Serostatus HIV PARTNER BENIN
下载PDF
Blockchain-Based MCS Detection Framework of Abnormal Spectrum Usage for Satellite Spectrum Sharing Scenario
6
作者 Ning Yang Heng Wang +3 位作者 Jingming Hu Bangning Zhang Daoxing Guo Yuan Liu 《China Communications》 SCIE CSCD 2024年第2期32-48,共17页
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit... In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework. 展开更多
关键词 blockchain hypothesis test mobile crowdsensing satellite communication spectrum sharing
下载PDF
Layered Coded Cache Placement and Cooperative Delivery with Sharing Links in Satellite-Terrestrial Integrated Networks
7
作者 Gu Shushi Chen Zihan +2 位作者 Wu Yaonan Zhang Qinyu Wang Ye 《China Communications》 SCIE CSCD 2024年第3期217-229,共13页
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver... Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances. 展开更多
关键词 coded content placement cooperative delivery energy efficiency sharing links STINs
下载PDF
Discreet investors exert greater influence on cooperation in the public goods game
8
作者 康洪炜 金展瑶 +4 位作者 李明远 旺咩 孙兴平 沈勇 陈清毅 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期170-178,共9页
This paper studies the evolutionary process of cooperative behavior in a public goods game model with heterogeneous investment strategies in square lattices.In the proposed model,players are divided into defectors,coo... This paper studies the evolutionary process of cooperative behavior in a public goods game model with heterogeneous investment strategies in square lattices.In the proposed model,players are divided into defectors,cooperators and discreet investors.Among these,defectors do not participate in investing,discreet investors make heterogeneous investments based on the investment behavior and cooperation value of their neighbors,and cooperators invest equally in each neighbor.In real life,heterogeneous investment is often accompanied by time or economic costs.The discreet investors in this paper pay a certain price to obtain their neighbors'investment behavior and cooperation value,which quantifies the time and economic costs of the heterogeneous investment process.The results of Monte Carlo simulation experiments in this study show that discreet investors can effectively resist the invasion of the defectors,form a stable cooperative group and expand the cooperative advantage in evolution.However,when discreet investors pay too high a price,they lose their strategic advantage.The results in this paper help us understand the role of heterogeneous investment in promoting and maintaining human social cooperation. 展开更多
关键词 public goods game heterogeneous investment discreet investors COOPERATION
原文传递
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms
9
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
下载PDF
Structured Multi-Head Attention Stock Index Prediction Method Based Adaptive Public Opinion Sentiment Vector
10
作者 Cheng Zhao Zhe Peng +2 位作者 Xuefeng Lan Yuefeng Cen Zuxin Wang 《Computers, Materials & Continua》 SCIE EI 2024年第1期1503-1523,共21页
The present study examines the impact of short-term public opinion sentiment on the secondary market,with a focus on the potential for such sentiment to cause dramatic stock price fluctuations and increase investment ... The present study examines the impact of short-term public opinion sentiment on the secondary market,with a focus on the potential for such sentiment to cause dramatic stock price fluctuations and increase investment risk.The quantification of investment sentiment indicators and the persistent analysis of their impact has been a complex and significant area of research.In this paper,a structured multi-head attention stock index prediction method based adaptive public opinion sentiment vector is proposed.The proposedmethod utilizes an innovative approach to transform numerous investor comments on social platforms over time into public opinion sentiment vectors expressing complex sentiments.It then analyzes the continuous impact of these vectors on the market through the use of aggregating techniques and public opinion data via a structured multi-head attention mechanism.The experimental results demonstrate that the public opinion sentiment vector can provide more comprehensive feedback on market sentiment than traditional sentiment polarity analysis.Furthermore,the multi-head attention mechanism is shown to improve prediction accuracy through attention convergence on each type of input information separately.Themean absolute percentage error(MAPE)of the proposedmethod is 0.463%,a reduction of 0.294% compared to the benchmark attention algorithm.Additionally,the market backtesting results indicate that the return was 24.560%,an improvement of 8.202% compared to the benchmark algorithm.These results suggest that themarket trading strategy based on thismethod has the potential to improve trading profits. 展开更多
关键词 public opinion sentiment structured multi-head attention stock index prediction deep learning
下载PDF
Impact of Sharing Marketing on Marketing Willingness of Employees in Internet Decoration Industry
11
作者 Zhongxin LI 《Asian Agricultural Research》 2024年第1期10-13,共4页
With the development of information technology,sharing marketing,as an innovative marketing method,plays an important role in promoting the marketing willingness and enthusiasm of employees in the Internet decoration ... With the development of information technology,sharing marketing,as an innovative marketing method,plays an important role in promoting the marketing willingness and enthusiasm of employees in the Internet decoration industry.Based on the data obtained from the ques-tionnaire survey,this paper makes an empirical analysis of the impact of the economic value,social value,perceived ease of use,perceived convenience,enabling conditions and subjective norms of sharing marketing on the marketing willingness of employees in the Internet decoration industry.The results showed that the questionnaire had good internal consistency and construct validity.Through empirical analysis,it can be found that the economic value,social value,perceived ease of use,perceived convenience,enabling conditions and subjective norms of sharing marketing have a significant positive impact on employees'marketing willingness. 展开更多
关键词 MARKETING sharing marketing Internet decoration Marketing willingness
下载PDF
Use of cognitive-behavioral career coaching to reduce work anxiety and depression in public employees
12
作者 Mkpoikanke Sunday Otu Maximus Monaheng Sefotho 《World Journal of Clinical Cases》 SCIE 2024年第2期322-334,共13页
BACKGROUND Public employees worldwide are increasingly concerned about work anxiety and depression.Cognitive-behavioral career coaching has emerged as a promising strategy for addressing these mental health disorders,... BACKGROUND Public employees worldwide are increasingly concerned about work anxiety and depression.Cognitive-behavioral career coaching has emerged as a promising strategy for addressing these mental health disorders,which can negatively impact on a person's overall well-being and performance.AIM To examine whether cognitive-behavioral career coaching reduces work anxiety and depression among Nigerian public employees.METHODS A total of 120 public employees(n=60)suffering from severe anxiety and depression were randomly assigned to the treatment or control groups in this study.Cognitive behavioral coaching was provided twice a week to those in the treatment group,whereas no treatment was given to those in the control group.As part of the study,the Hamilton Anxiety Rating Scales and Beck Depression Inventory were used to collect data.RESULTS Analysis of covariance of the data from participants indicates a significant effect of cognitive-behavioral career coaching on work anxiety and depression.CONCLUSION Insights into the underlying mechanisms by which cognitive behavior career coaching exerts its effects have been gained from this study.Also,the study has gathered valuable data that can inform future practice and guide the development of strategies for supporting mental health at work. 展开更多
关键词 Cognitive-behavioral career coaching Work anxiety Depression public employees North Central Nigeria
下载PDF
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
13
作者 Yan Dong 《Journal of Computer and Communications》 2024年第3期101-106,共6页
The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, e... The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities. 展开更多
关键词 Intelligent Security System Higher Education Park Open sharing
下载PDF
A Novel Agricultural Data Sharing Mode Based on Rice Disease Identification
14
作者 Mengmeng ZHANG Xiujuan WANG +3 位作者 Mengzhen KANG Jing HUA Haoyu WANG Feiyue WANG 《Plant Diseases and Pests》 2024年第2期9-16,共8页
In this paper,a variety of classical convolutional neural networks are trained on two different datasets using transfer learning method.We demonstrated that the training dataset has a significant impact on the trainin... In this paper,a variety of classical convolutional neural networks are trained on two different datasets using transfer learning method.We demonstrated that the training dataset has a significant impact on the training results,in addition to the optimization achieved through the model structure.However,the lack of open-source agricultural data,combined with the absence of a comprehensive open-source data sharing platform,remains a substantial obstacle.This issue is closely related to the difficulty and high cost of obtaining high-quality agricultural data,the low level of education of most employees,underdeveloped distributed training systems and unsecured data security.To address these challenges,this paper proposes a novel idea of constructing an agricultural data sharing platform based on a federated learning(FL)framework,aiming to overcome the deficiency of high-quality data in agricultural field training. 展开更多
关键词 Rice disease and pest identification Convolutional neural networks Distributed training Federated learning(FL) Open-source data sharing platform
下载PDF
Research on Public Engineering Emergency Decision-Making Based on Multi-Granularity Language Information
15
作者 Huajun Liu Zengqiang Wang 《Journal of Architectural Research and Development》 2024年第1期32-37,共6页
To effectively deal with fuzzy and uncertain information in public engineering emergencies,an emergency decision-making method based on multi-granularity language information is proposed.Firstly,decision makers select... To effectively deal with fuzzy and uncertain information in public engineering emergencies,an emergency decision-making method based on multi-granularity language information is proposed.Firstly,decision makers select the appropriate language phrase set according to their own situation,give the preference information of the weight of each key indicator,and then transform the multi-granularity language information through consistency.On this basis,the sequential optimization technology of the approximately ideal scheme is introduced to obtain the weight coefficient of each key indicator.Subsequently,the weighted average operator is used to aggregate the preference information of each alternative scheme with the relative importance of decision-makers and the weight of key indicators in sequence,and the comprehensive evaluation value of each scheme is obtained to determine the optimal scheme.Lastly,the effectiveness and practicability of the method are verified by taking the earthwork collapse accident in the construction of a reservoir as an example. 展开更多
关键词 public engineering EMERGENCY Multi-granularity language DECISION-MAKING
下载PDF
Exploring Digital Visualization Methods in Urban Public Building Space Design
16
作者 Pan Liang Sharul Azim Sharudin 《Journal of Architectural Research and Development》 2024年第2期55-61,共7页
Digital technology has driven the innovation of architectural design methods and tools,applying digital techniques to allow greater possibilities for more innovative and scientific design of public building spaces.Thi... Digital technology has driven the innovation of architectural design methods and tools,applying digital techniques to allow greater possibilities for more innovative and scientific design of public building spaces.This article first analyzes the characteristics of digital visualization and its advantages in the design of urban public building spaces,including aspects such as visualizing three-dimensional expression,rational analysis of building space,Virtual Reality Experience,and integration of design and construction processes.Subsequently,by introducing digital design methods such as parametric design,algorithmic generation,nonlinear design,and artificial intelligence-assisted design,it explores the methods and implementation approaches of digital visualization in the design of public building spaces.The aim is to offer insights and references for the deeper integration of digital technology into architectural design practices. 展开更多
关键词 public building Space design Digital visualization METHODS
下载PDF
Research on the Optimization of Enterprise Financial Management under the Financial Sharing Model
17
作者 Feiyang Zhang 《Proceedings of Business and Economic Studies》 2024年第1期180-185,共6页
With the advancement of globalization and information technology,the financial sharing mode has gradually emerged as a crucial means for enterprises to optimize their financial management.Particularly within the conte... With the advancement of globalization and information technology,the financial sharing mode has gradually emerged as a crucial means for enterprises to optimize their financial management.Particularly within the context of economic globalization,informatization,and digital transformation,enterprises find themselves navigating a rapidly evolving market environment by intensifying competition.To enhance efficiency and competitiveness,many enterprises have embraced the financial sharing model to streamline financial management processes,curtail costs,and bolster the execution of corporate strategies.This article aims to dissect the definition and essence of the financial sharing model and its significance in the realm of enterprise financial management.Drawing upon this analysis and aligning with the needs of enterprise financial management,the article proposes ideas for optimizing management practices,aspiring to foster reform and innovation in enterprise financial management while enhancing its level of financial management and ability to respond to financial risks.This contribution seeks to provide valuable insights for practitioners in the field. 展开更多
关键词 Financial sharing Enterprise management Financial management Management optimization
下载PDF
基于WeChatPublic公众平台联合慕课强化实践能力教学模式在外科教学中应用研究
18
作者 张继琛 《中文科技期刊数据库(文摘版)教育》 2024年第2期0157-0160,共4页
基于WeChat Public公众平台联合慕课强化实践能力教学模式在外科教学中应用研究。方法 以60例实习生为例,将其分为两组对不同教学方式的价值分析,评估外科教学中WeChat Public公众平台联合慕课教学模式的价值。结果 两组患者研究对象成... 基于WeChat Public公众平台联合慕课强化实践能力教学模式在外科教学中应用研究。方法 以60例实习生为例,将其分为两组对不同教学方式的价值分析,评估外科教学中WeChat Public公众平台联合慕课教学模式的价值。结果 两组患者研究对象成绩评分对比有差异,(P<0.05)。两组患者自我导向学习能力评分对比,带教后评分有差异,(P<0.05)。两组学生自我学习效果评价评分有差异,(P<0.05)。两组研究对象临床能力评分有差异,(P<0.05)。两组实习生对教学方式满意度,有差异,(P<0.05)。结论 外科教学中应用WeChat Public公众平台联合慕课教学模式能够有效的提高实习生的临床能力,学生的成绩更高,学生的自我学习能力更强,有推广的价值。 展开更多
关键词 基于WeChat public公众平台 慕课强化实践能力 教学模式 外科教学 应用研究
下载PDF
Geographical Indication Intellectual Property Protection and Regional Public Brand Construction of Rape Industry in China 被引量:4
19
作者 Li GAO Yamin PENG +3 位作者 Leying WU Jin ZENG Yuanpeng SUN Zhiguo SUN 《Asian Agricultural Research》 2023年第6期7-13,共7页
As China s largest oil crop,rape occupies a central position in ensuring the safety of China s cooking oil supply.This paper introduced China s rapeseed industry from the rape type,rapeseed production,planting area,na... As China s largest oil crop,rape occupies a central position in ensuring the safety of China s cooking oil supply.This paper introduced China s rapeseed industry from the rape type,rapeseed production,planting area,national rapeseed production protected area,rape national dominant characteristic industrial clusters,and rapeseed industry,etc.Besides,from the aspects of geographical indication products,geographical indication trademarks,and geographical indications of agricultural products,this paper discussed the intellectual property protection of geographical indications of rape,rapeseed,and rapeseed oil in China.It analyzed the main problems such as the lag in the formulation of relevant standards for geographical indications and the low use of special signs for geographical indications,and finally came up with recommendations including building a public brand of geographical indications and expanding foreign exchanges of geographical indications. 展开更多
关键词 RAPE RAPESEED Rapeseed oil Geographical indication Regional public brand China
下载PDF
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing
20
作者 Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 《Computers, Materials & Continua》 SCIE EI 2023年第7期753-769,共17页
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).... With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency. 展开更多
关键词 Post-quantum cryptography NTRU Shamir’s secret sharing public key
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部