Search scope:
排序: Display mode:
Changes in public trust in physicians: empirical evidence from China
Dahai Zhao, Zhiruo Zhang
Frontiers of Medicine 2019, Volume 13, Issue 4, Pages 504-510 doi: 10.1007/s11684-018-0666-4
Keywords: trust in physicians public trust physician-patient relationship health system performance
Research of trust valuation based on cloud model
Lu Feng,Wu Huizhong
Strategic Study of Chinese Academy of Engineering 2008, Volume 10, Issue 10, Pages 84-90
At present, the existing descriptions of trust by trust valuation modelsthis problem, this paper discusses the co-existence and integration of fuzziness and randomness of trustcloud, a trust evaluation model based on cloud theory.This model provides the algorithms of trust information transfer and combination described by digitalCompared with traditional trust valuation models, trust values obtained in this model contains more semantic
Keywords: trust valuation trust model cloud model cloud generator
Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM
Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 1, Pages 1-4 doi: 10.15302/J-FASE-2016123
Keywords: culture food safety systems technology trust
Building trust networks in the absence of trust relations Article
Xin WANG, Ying WANG, Jian-hua GUO
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1591-1600 doi: 10.1631/FITEE.1601341
Keywords: Trust network Sparse learning Homophily effect Interaction behaviors
DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks Article
Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4, Pages 559-569 doi: 10.1631/FITEE.1601535
Keywords: Mobile P2P networks Trust management Dynamic grouping Super peer
Secure connectivity analysis in unmanned aerial vehicle networks None
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3, Pages 409-422 doi: 10.1631/FITEE.1700032
Keywords: Unmanned aerial vehicle networks (UAVNs) Trust model Secure connectivity Doppler shift
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICS 2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority (CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition, which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman (RSA), and computational Diffie-Hellman (CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH.
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security Authority trust
Lin Heng,Zhou Yuan and Liu Yufei
Strategic Study of Chinese Academy of Engineering 2017, Volume 19, Issue 1, Pages 124-132 doi: 10.15302/J-SSCAE-2017.01.018
This paper focuses on technology hot spots, frontier identification,In this paper, we take robot technology as an example in order to identify hot spots and frontiers intechnology, along with their development trends.These findings have great significance for the proposal of a technology list and for the allocation ofthe technology industry in the Research on China’s Engineering Science and Technology Development
Keywords: technology foresight technology hot spots frontier of technology patent analysis robot technology
Technology Foresight Research on China’s Environmental Engineering Science and Technology to 2035
Dan Zhigang,Shi Feifei,Wang Zhizeng,Wang Huieng、Zhang Peilei、Hao Jiming、Duan Ning
Strategic Study of Chinese Academy of Engineering 2017, Volume 19, Issue 1, Pages 80-86 doi: 10.15302/J-SSCAE-2017.01.012
The Delphi method is the most common method of technology foresight,which is a significant basis for establishing development strategies and policies of science and technologyThis study proposes 45 alternative technologies in the field of environmental engineering science and technologyestablishing development strategies and objectives for China’s environmental engineering science and technology
Keywords: environmental engineering science and technology technology foresight Delphi method key technology common technology disruptive technology
The Development Trend of Aeronautic Technology and the Building of Technology Innovation Bases
Zhang Yanzhong
Strategic Study of Chinese Academy of Engineering 1999, Volume 1, Issue 1, Pages 19-23
Keywords: aeronautic technology development trend technology innovation key laboratory
Digital technology-driven smart society governance mechanism and practice exploration
Frontiers of Engineering Management doi: 10.1007/s42524-022-0200-x
Keywords: digital technology new infrastructure smart society governance system governance modernization
Status of domestic gasification technology in China
Zhimin HUANG , Jiansheng ZHANG , Guangxi YUE ,
Frontiers in Energy 2009, Volume 3, Issue 3, Pages 330-336 doi: 10.1007/s11708-009-0021-1
Keywords: domestic gasification technology research and development performance commercialization
LU Chun-guang, MENG Li-li
Frontiers of Mechanical Engineering 2006, Volume 1, Issue 3, Pages 305-312 doi: 10.1007/s11465-006-0039-6
Keywords: PBOM systematic technological implementation technology management workflow technology
Research on Development Strategy of Unmanned Driving Technology
Yang Yanming, Gao Zenggui, Zhang Zilong, Shen Yue, Wang Linjun
Strategic Study of Chinese Academy of Engineering 2018, Volume 20, Issue 6, Pages 101-104 doi: 10.15302/J-SSCAE-2018.06.016
Unmanned driving technology is considered as a highly disruptive technologyanalysis and literature research, this paper analyses the development trend and stage of unmanned driving technologyIt also proposes to promote the development of unmanned driving technology by strengthening the researchon automobile wire control technology, energy power technology and driving cognitive technology.
Keywords: disruptive technology unmanned driving technology automotive wire control technology energy powertechnology driving cognitive technology
Mirosɬaw J. Skibniewski
Frontiers of Engineering Management 2014, Volume 1, Issue 3, Pages 246-259 doi: 10.15302/J-FEM-2014034
Keywords: international research journal research trends industrial safety engineering and management construction technology building engineering information technology
Title Author Date Type Operation
Changes in public trust in physicians: empirical evidence from China
Dahai Zhao, Zhiruo Zhang
Journal Article
Delivering food safety
Kaye BASFORD,Richard BENNETT,Joanne DALY,Mary Ann AUGUSTIN,Snow BARLOW,Tony GREGSON,Alice LEE,Deli CHEN,Matt WENHAM
Journal Article
Building trust networks in the absence of trust relations
Xin WANG, Ying WANG, Jian-hua GUO
Journal Article
DGTM:a dynamic grouping based trust model for mobile peer-to-peer networks
Mei-juan JIA, Hui-qiang WANG, Jun-yu LIN, Guang-sheng FENG, Hai-tao YU
Journal Article
Secure connectivity analysis in unmanned aerial vehicle networks
Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU
Journal Article
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Journal Article
Technology Hot Spots and Frontier Identification Support to 2035: The Technology List Adjustment Method, Using Robot Technology as an Example
Lin Heng,Zhou Yuan and Liu Yufei
Journal Article
Technology Foresight Research on China’s Environmental Engineering Science and Technology to 2035
Dan Zhigang,Shi Feifei,Wang Zhizeng,Wang Huieng、Zhang Peilei、Hao Jiming、Duan Ning
Journal Article
The Development Trend of Aeronautic Technology and the Building of Technology Innovation Bases
Zhang Yanzhong
Journal Article
Digital technology-driven smart society governance mechanism and practice exploration
Journal Article
Status of domestic gasification technology in China
Zhimin HUANG , Jiansheng ZHANG , Guangxi YUE ,
Journal Article
Computer aided process planning system based on workflow technology and integrated bill of material tree
LU Chun-guang, MENG Li-li
Journal Article
Research on Development Strategy of Unmanned Driving Technology
Yang Yanming, Gao Zenggui, Zhang Zilong, Shen Yue, Wang Linjun
Journal Article