Search scope:
排序: Display mode:
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Strategic Study of CAE 2010, Volume 12, Issue 1, Pages 67-73
Keywords: 802.11i Bellare-Rogaway model provable security formal analysis
Low-computation certificateless hybrid signcryption scheme Article
Hui-fang YU, Bo YANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7, Pages 928-940 doi: 10.1631/FITEE.1601054
Keywords: Hybrid signcryption Scalar multiplication Certificateless cryptosystem Provable security
Aleakage-resilient certificateless public key encryption scheme withCCA2security None
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4, Pages 481-493 doi: 10.1631/FITEE.1601849
Keywords: Certificateless public-key encryption Leakage-resilience Provable security CCA2 security Decisional Diffie-Hellman
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICS 2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority (CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition, which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman (RSA), and computational Diffie-Hellman (CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH.
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security
Soil security and global food security
Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530
● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.
Keywords: Agriculture soil security food security regenerative
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2, Pages 144-151 doi: 10.15302/J-FASE-2015062
Keywords: food security protein security nutrition dietary pattern
Ecological security evaluation of Africa
Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN
Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 4, Pages 467-477 doi: 10.15302/J-FASE-2020320
Keywords: Africa ecological security evaluation system PSR model
Water, energy and food interactions–Challenges and opportunities
Gustaf OLSSON
Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5, Pages 787-793 doi: 10.1007/s11783-013-0526-z
Keywords: water security energy security food security water-energy nexus water conflicts
Water environment security indicator system for urban water management
Tian HAO, Pengfei DU, Yun GAO
Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 5, Pages 678-691 doi: 10.1007/s11783-012-0450-7
Keywords: water environment security supervision and management monitoring parameter indicator system Suzhou
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016
Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.
Keywords: cyberspace security emergency for cyberspace security response for cyberspace security transformation
Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 2, Pages 262-267 doi: 10.15302/J-FASE-2023496
● To achieve food security, Chinese agriculture– food system could
Keywords: agriculture carbon neutrality carbon peak food security carbon mitigation strategies
Yuanmei ZUO,Zhenjiao ZHANG,Caihong LIU,Weina ZHANG
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2, Pages 134-143 doi: 10.15302/J-FASE-2015069
Keywords: intercropping food security energy security high production marginal land
China’s new problems of food security revealed by the Food Equivalent Unit
Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN
Frontiers of Agricultural Science and Engineering 2014, Volume 1, Issue 1, Pages 69-76 doi: 10.15302/J-FASE-2014023
Keywords: food security nutrition security food equivalent unit grassland agriculture China
Development of Industrial Internet Security Technology in China
Dong Yue, Wang Zhiqin, Tian Huirong, Li Shan, Qin Guoying, Wushour Silamu
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 65-73 doi: 10.15302/J-SSCAE-2021.02.009
Keywords: industrial Internet security security protection technology security evaluation technology security
Susan J. NICHOLS, Fiona J. DYER
Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5, Pages 669-687 doi: 10.1007/s11783-013-0556-6
Keywords: ecological water security biological assessment river health
Title Author Date Type Operation
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Journal Article
Aleakage-resilient certificateless public key encryption scheme withCCA2security
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Journal Article
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Journal Article
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Journal Article
Ecological security evaluation of Africa
Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN
Journal Article
Water environment security indicator system for urban water management
Tian HAO, Pengfei DU, Yun GAO
Journal Article
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Journal Article
AGRICULTURAL GREEN DEVELOPMENT TO ACHIEVE FOOD SECURITY AND CARBON REDUCTION IN THE CONTEXT OF CHINA’
Journal Article
Achieving food security and high production of bioenergy crops through intercropping with efficient resource
Yuanmei ZUO,Zhenjiao ZHANG,Caihong LIU,Weina ZHANG
Journal Article
China’s new problems of food security revealed by the Food Equivalent Unit
Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN
Journal Article
Development of Industrial Internet Security Technology in China
Dong Yue, Wang Zhiqin, Tian Huirong, Li Shan, Qin Guoying, Wushour Silamu
Journal Article