Search scope:
排序: Display mode:
A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation
ZHOU Bing, CUI Guixiang, CHEN Naixiang
Frontiers in Energy 2007, Volume 1, Issue 4, Pages 468-472 doi: 10.1007/s11708-007-0069-z
Keywords: large-eddy simulation Germano identity coefficient subgrid-scale
Development and Application of Network Electronic Identity Management in Major Countries and Regions
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
Keywords: network electronic identity identity management digital signature
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005
This paper analyzes and sorts out the policies, laws, and regulations of network electronic identityIt discusses the development of China's network identity management, and outlines the 13th Five-YearPlan's policies and regulations for network electronic identity management in China, including thedevelopment of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.
Keywords: network electronic identity identity management policies and regulations
Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1, Pages 95-108 doi: 10.15302/J-FASE-2022478
● Consumer preference for environmentally-friendly beverage packaging was investigated.
Keywords: China consumer preference food and beverage packaging green identity label information treatment
The effects of festivals and special events on city image design
LIU Yuan, CHEN Chong
Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2, Pages 255-259 doi: 10.1007/s11709-007-0032-0
Keywords: Visual Identity reversal transmission marketing Behavior Identity
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2, Pages 135-142 doi: 10.1631/FITEE.1500197
Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.
Keywords: Identity Signature Lattice Number theory research unit (NTRU)
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo
Frontiers of Medicine 2012, Volume 6, Issue 1, Pages 79-84 doi: 10.1007/s11684-012-0179-5
Keywords: health insurance urban employee basic health insurance scheme urban-resident scheme new rural cooperative medical system
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2, Pages 141-286 doi: 10.1631/FITEE.1900318
Keywords: Identity-based signature Lattice Strong unforgeability Random oracle model
Cryptanalysis of an identity-based public auditing protocol for cloud storage Comment
Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12, Pages 1972-1977 doi: 10.1631/FITEE.1601530
Keywords: Cloud data Public auditing Data integrity Data privacy
Energy Demand and Carbon Emission Peak Paths for the Rise of Central China
Cheng Yunhe, Dong Hongguang, Geng Jichao, He Jishan
Strategic Study of CAE 2021, Volume 23, Issue 1, Pages 68-78 doi: 10.15302/J-SSCAE-2021.01.014
Keywords: energy revolution rise of Central China Kaya identity scenario analysis carbon emission peak
Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2, Pages 258-277 doi: 10.1631/FITEE.2000366
Keywords: Post-quantum cryptography Threshold proxy re-encryption Lattices Robustness Decentralization
A novel algorithm to counter cross-eye jamming based on a multi-target model Research Articles
Zhi-yong SONG, Xing-lin SHEN, Qiang FU
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 988-1001 doi: 10.1631/FITEE.1800394
Keywords: Particle identity labels Probability hypothesis density Cross-eye jamming Anti-jamming Random finite
Title Author Date Type Operation
A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation
ZHOU Bing, CUI Guixiang, CHEN Naixiang
Journal Article
Development and Application of Network Electronic Identity Management in Major Countries and Regions
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Journal Article
CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY
Journal Article
The effects of festivals and special events on city image design
LIU Yuan, CHEN Chong
Journal Article
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
Integration of current identity-based district-varied health insurance schemes in China: implications
Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo
Journal Article
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Journal Article
Cryptanalysis of an identity-based public auditing protocol for cloud storage
Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN
Journal Article
Energy Demand and Carbon Emission Peak Paths for the Rise of Central China
Cheng Yunhe, Dong Hongguang, Geng Jichao, He Jishan
Journal Article
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Journal Article