Resource Type

Journal Article 220

Year

2023 27

2022 21

2021 24

2020 13

2019 14

2018 15

2017 16

2016 26

2015 13

2014 7

2013 6

2012 3

2011 3

2010 5

2009 3

2008 3

2007 4

2006 2

2005 2

2004 2

open ︾

Keywords

food security 39

energy security 19

China 7

sustainable development 7

Physical layer security 5

cyberspace security 5

security 5

water security 4

Internet of Things (IoT) 3

Network security 3

Security 3

industrial Internet security 3

Artificial intelligence (AI) 2

Block cipher 2

Embedded security 2

Encryption 2

Lightweight cryptography 2

Moving target defense 2

Provable security 2

open ︾

Search scope:

排序: Display mode:

The provable security formal analysis of 802.11i authentication scheme

Song Yubo,Hu Aiqun,Yao Bingxin

Strategic Study of CAE 2010, Volume 12, Issue 1,   Pages 67-73

Abstract: style="text-align: justify;">802.11i standard is proposed by IEEE 802.11 Standard Group to improve the securityHow to analyze the security of the new protocol to prove its validity is the most interesting problemIn order to solve this problem, an expanded Bellare-Rogaway model is established to give a provable security

Keywords: 802.11i     Bellare-Rogaway model     provable security     formal analysis    

Low-computation certificateless hybrid signcryption scheme Article

Hui-fang YU, Bo YANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7,   Pages 928-940 doi: 10.1631/FITEE.1601054

Abstract: Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption. In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme. In the random oracle model, this scheme is proven to have indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the elliptic-curve computation Diffie-Hellman assumption. Also, it has a strong existential unforgeability against adaptive chosen-message attacks (sUF-CMA) under the elliptic-curve discrete logarithm assumption. Analysis shows that the cryptographic algorithm does not rely on pairing operations and is much more efficient than other algorithms. In addition, it suits well to applications in environments where resources are constrained, such as wireless sensor networks and ad hoc networks.

Keywords: Hybrid signcryption     Scalar multiplication     Certificateless cryptosystem     Provable security    

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: CCA2) secure, leakage-resilient, and certificateless public-key encryption scheme is proposed, whose security

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash None

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 176-186 doi: 10.1631/FITEE.1700005

Abstract:

Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICS 2014. The double-authentication-preventing property means that any pair of signatures on two different messages with the same subject will result in an immediate collapse of the signature system. A few potential applications of DAPS have been discussed by its inventors, such as providing a kind of self-enforcement to discourage certificate authority (CA) from misbehaving in public key infrastructure and offering CA some cryptographic arguments to resist legal coercion. In this study, we focus on some fundamental issues on DAPS. We propose a new definition, which is slightly weakened but still reasonable and strong enough to capture the DAPS concept. We develop the new notion of invertible chameleon hash functions with key exposure. Then we propose a generic DAPS scheme, which is provably secure if the underlying invertible chameleon hash function with key exposure is secure. We instantiate this general construction to obtain the DAPS schemes respectively based on the well-known assumptions of integer factorization, Rivest-Shamir-Adleman (RSA), and computational Diffie-Hellman (CDH). They are more efficient than previous DAPS schemes. Furthermore, unlike previous constructions, the trusted setup condition is not needed by our DAPS schemes based on RSA and CDH.

Keywords: Double-authentication-preventing signatures     Chameleon hash function     Digital signature     Provable security    

Soil security and global food security

Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530

Abstract:

● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.

Keywords: Agriculture     soil security     food security     regenerative    

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 144-151 doi: 10.15302/J-FASE-2015062

Abstract: Food security, the need to meet nutritional requirements, and four main problems for food protein securityresidents’ nutritional requirements and balanced dietary patterns, the conclusion is that food securityin China is in essence dependent on protein production and security of supply and that fat and carbohydratespolicy suggestions are made, which could ensure a balanced supply and demand for food protein and food security

Keywords: food security     protein security     nutrition     dietary pattern    

Ecological security evaluation of Africa

Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN

Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 4,   Pages 467-477 doi: 10.15302/J-FASE-2020320

Abstract: Ecological security comprehensively reflects the heath and integrity of an ecosystem, and it is broadlydefined as the security state of a complex artificial ecosystem composed of natural, economic and socialEcological security determines the potential for sustainable development in Africa, especially with itsHowever, there is a lack of information on the ecological security state of the continent as a whole.In general, African countries showed relatively good ecological security.

Keywords: Africa     ecological security     evaluation system     PSR model    

Water, energy and food interactions–Challenges and opportunities

Gustaf OLSSON

Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5,   Pages 787-793 doi: 10.1007/s11783-013-0526-z

Abstract: living standards and food consumption will require an integrated approach where food, water and energy securityIn this paper we examine water, energy and food security and their couplings.

Keywords: water security     energy security     food security     water-energy nexus     water conflicts    

Water environment security indicator system for urban water management

Tian HAO, Pengfei DU, Yun GAO

Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 5,   Pages 678-691 doi: 10.1007/s11783-012-0450-7

Abstract: Water environment security (WES) is defined in terms of three aspects: first, that it meets basic demandsLimitations associated with current water environment security indicators in China — including inefficiencyprocedures used to assess the risks associated with poor management practices relating to water environment securityas well as design an appropriate water environment security indicator system.

Keywords: water environment security     supervision and management     monitoring parameter     indicator system     Suzhou    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation    

AGRICULTURAL GREEN DEVELOPMENT TO ACHIEVE FOOD SECURITY AND CARBON REDUCTION IN THE CONTEXT OF CHINA’

Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 2,   Pages 262-267 doi: 10.15302/J-FASE-2023496

Abstract:

● To achieve food security, Chinese agriculture– food system could

Keywords: agriculture     carbon neutrality     carbon peak     food security     carbon mitigation strategies    

Achieving food security and high production of bioenergy crops through intercropping with efficient resource

Yuanmei ZUO,Zhenjiao ZHANG,Caihong LIU,Weina ZHANG

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 134-143 doi: 10.15302/J-FASE-2015069

Abstract: nonrenewable fossil fuel consumption worldwide, we are facing great challenges in ensuring food and energy securityutilization efficiency and illustrate the practical application of intercropping in ensuring food and energy security

Keywords: intercropping     food security     energy security     high production     marginal land    

China’s new problems of food security revealed by the Food Equivalent Unit

Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN

Frontiers of Agricultural Science and Engineering 2014, Volume 1, Issue 1,   Pages 69-76 doi: 10.15302/J-FASE-2014023

Abstract: China's food security has a great influence on the world, and has always been the top priority in ChinaIn recent years, as the concept of food security is evolving into one of nutrition security and the importanceof food diversity is increasing, research based on nutrition security and broad food systems are increasinglyChina’s current agriculture system had a low efficiency in being able to achieve food and nutrition security

Keywords: food security     nutrition security     food equivalent unit     grassland agriculture     China    

Development of Industrial Internet Security Technology in China

Dong Yue, Wang Zhiqin, Tian Huirong, Li Shan, Qin Guoying, Wushour Silamu

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 65-73 doi: 10.15302/J-SSCAE-2021.02.009

Abstract: Meanwhile, industrial Internet security problems have increased; therefore, improving the technologicalcapabilities forguaranteeing industrial Internet security becomes the prerequisite for the high-qualityinvestigate the development trend, technologicaldifficulties, and challenges for the industrial Internet securityTo promote the safe and healthy development of industrial Internet in China, the industrial Internet securityintegrate with new technologies such asbig data and AI, to achieve active defense and create endogenous security

Keywords: industrial Internet security     security protection technology     security evaluation technology     security    

Contribution of national bioassessment approaches for assessing ecological water security: an AUSRIVAS

Susan J. NICHOLS, Fiona J. DYER

Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5,   Pages 669-687 doi: 10.1007/s11783-013-0556-6

Abstract: River managers in Australia are managing in the face of extremes to provide security of water supplyBalancing the water requirements of people, environments and economies requires that water security isCommon definitions of water security focus on the needs of both humans and ecosystems for purposes suchInformation about achieving water security for the environment or ecological purposes can be a challengeYet the concepts surrounding river health are inherently linked to holistic concepts of water security

Keywords: ecological water security     biological assessment     river health    

Title Author Date Type Operation

The provable security formal analysis of 802.11i authentication scheme

Song Yubo,Hu Aiqun,Yao Bingxin

Journal Article

Low-computation certificateless hybrid signcryption scheme

Hui-fang YU, Bo YANG

Journal Article

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Journal Article

Soil security and global food security

Journal Article

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Journal Article

Ecological security evaluation of Africa

Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN

Journal Article

Water, energy and food interactions–Challenges and opportunities

Gustaf OLSSON

Journal Article

Water environment security indicator system for urban water management

Tian HAO, Pengfei DU, Yun GAO

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

AGRICULTURAL GREEN DEVELOPMENT TO ACHIEVE FOOD SECURITY AND CARBON REDUCTION IN THE CONTEXT OF CHINA’

Journal Article

Achieving food security and high production of bioenergy crops through intercropping with efficient resource

Yuanmei ZUO,Zhenjiao ZHANG,Caihong LIU,Weina ZHANG

Journal Article

China’s new problems of food security revealed by the Food Equivalent Unit

Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN

Journal Article

Development of Industrial Internet Security Technology in China

Dong Yue, Wang Zhiqin, Tian Huirong, Li Shan, Qin Guoying, Wushour Silamu

Journal Article

Contribution of national bioassessment approaches for assessing ecological water security: an AUSRIVAS

Susan J. NICHOLS, Fiona J. DYER

Journal Article