Security相关论文
目的 分析氟哌啶醇与利培酮治疗痴呆患者精神行为症状(BPSD)的临床疗效以及安全性?方法 选取本院接收的痴呆合并BPSD 患者110例,通......
In this paper, we have proposed a novel encryption scheme with chaotic process based on Enigma. The encryption scheme ta......
提出一个基于四粒子GHZ纠缠态实现未知单粒子态的可控量子双向传态方案.通信双方Alice和Bob以及控制方事先密享两对四粒子GHZ纠缠......
Intelligent Detection and Identification in Fiber-Optical Perimeter Intrusion Monitoring System Base
A real-time intelligent fiber-optic perimeter intrusion detection system (PIDS) based on the fiber Bragg grating (FBG) s......
人们对无线宽带通信技术的需求在近些年稳步增长。无线电波频谱的带宽限制和频带拥堵,通过微波无线网络的发展已经有了明显的改善......
为客观评价超宽谱高功率微波对某型连续波多普勒引信的干扰能力,构建了引信辐照效应试验系统,并开展了辐照效应试验。试验结果表明:受......
目的探讨促肾上腺皮质激素(adrenocorticotropic hormone,ACTH)治疗糖皮质激素(激素)及钙调神经磷酸酶抑制剂(CNIs)双重耐药的原发性肾病......
Impact of Climate Change on Ecological Security of the Yellow River Basin and Its Adaptation Counter
The Yellow River Basin (YRB) is not only an important ecological barrier in north China,but also an important agricultur......
权限管理系统是应用系统中比较重要的一个子系统,随着互联网的不断发展,应用项目对权限管理系统的要求也逐渐提高。目前许多传统权......
提单、仓单等物权凭证在我国现行法上的法律地位未臻明确,导致了权利变动与设定担保过程中的诸多争议。此类权利凭证的法律属性受......
该文提出了利用传统的PKI技术结合XKMS来实现新型的证书解决方案,在理论分析的基础上对该方案进行了系统设计,实现并验证了该系统.......
随着互联网技术的发展,特别是IPv6,网络的规模正在迅速扩大,IP网络已经渗透到社会各个领域,尤其在教育、商业、金融等重要部门.基......
目的对强迫症患者的自我认同感和安全感进行研究。方法研究对象为符合诊断标准的强迫症患者(n=63),以及年龄和教育程度匹配的正常对......
目的 构建布鲁杆菌M5-90Δbp26基因缺失株,对比观察其免疫原性与M5-90亲本株的区别,研制毒力弱、安全性能好并能进行鉴别诊断的布......
目的比较加倍剂量吸入激素与吸入激素联合茶碱治疗哮喘的临床效果。方法选取哮喘患者64例,按照治疗方案的不同将其分为观察组和对照......
目的探讨宫腔镜取环术用于宫内节育环嵌顿的临床效果,并评估其安全性。方法选择采用宫腔镜下取环术586例(研究组),同期常规方法取环6......
In the eve of the 9/11 attacks,the Afgh-Pak region received the attention of the whole International Community as one of......
A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods develop......
他汀类药物,英文名称statins,是羟甲基戊二酰辅酶A (HMG-CoA)还原酶抑制剂.经过大量的循证医学证据证实,他汀类药物目前比较肯定的......
目的:研究左乙拉西坦(LEV)单药治疗新诊断成人癫痫的临床疗效及安全性。方法对45例新诊断成人癫痫患者进行LEV单药治疗,并进行开放......
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPK
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of......
目的:探讨不同剂量辛伐他汀治疗冠心病的疗效与安全性。方法选取来我院就诊的冠心病患者48例,在知情自愿的原则上分为观察组和对照组......
We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service (DBaaS)......
The rise of multi-cloud systems has been spurred. For safety-critical missions, it is important to guarantee their secur......
Vehicular Ad-hoc NETworks(VANETs)enable cooperative behaviors in vehicular environments and are seen as an integral comp......
Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,......
The long awaited cloud computing concept is a reality now due to the transformation of computer generations.However,secu......
,Novel architectures and security solutions of programmable software-defined networking: a comprehen
Nowadays, cyberspace has become a vital part of social infrastructure. With the rapid development of the scale of networ......
,Stochastic stability analysis of networked control systems with random cryptographic protection und
Security issues in networked control systems (NCSs) have received increasing attention in recent years. However, securit......
In order to provide privacy pro-visioning for the secondary information,we propose an energy harvesting based se-cure tr......
At the end of colonial rule in West Africa witnessed the rise of different transnational security threats in the region,......
C1 Introduction loud computing has recently been experiencing fast development as a distributed model for performing ......
With the rapid development of Internet technology, the volume of data has increased exponentially. As the large amounts o......
The security of wireless local area network (WLAN) becomes a bottleneck for its further applications.At present, many st......
With the heavy dependence of worlds growing economy on energy supply, the energy issue again comes into the spotlight th......
E-busnisse has become a hot issue for Internet application,in which security is a key factor.This paper introduces the i......
20世纪70年代以来,世界各国和地区已经发生了大大小小几十次的金融危机,这些危机在影响的深度、广度以及对经济的损害程度方面越来......
粮食周期性波动是影响粮食安全的重要因素.本课题研究的目的是通过对建国60年来粮食周期性波动的轨迹、特点、原因的分析比较,提出......
在2010年9月1日开幕的20lO中国国际安全生产及职业健康展览会(COS+H 2010)上,ABB(中国)有限公司携旗下的过程控制和安全系统以及机......
回眸2009年,内蒙古自治区无线电管理系统广大干部职工,坚持以科学发展观为指导,以提高服务质量为目标,认真贯彻落实国家无线电办公......
今年以来,玲珑集团以科学发展观为指导,大力推进“转方式、调结构、保增长”战略.通过“两调一转”,成功布局品牌和市场的国际化,......
"云计算最根本的事实就是你必须与其他人共享数据,而这是极大的安全风险。如果我是用自己的服务器来处理自己的数据,我总有办法保......
存在的问题及需求rn随着企业计算机内网应用越来越广泛,计算机内网的信息安全问题日益突出,内网中的病毒、木马泛滥,违规接入、非......
只要微软这只巨型蝴蝶轻扇一下翅膀.立即能在无数网民的神经中掀起一场龙卷风.这就是“微软产品”的蝴蝶效应。Windows桌面的盛世......
可信的AODV路由协议(Trusted Ad hoc On Demand Distance Vector Routing Algorithm,TAODV)是一种在AODV中加入信任机制的协议,对......
(上接2011年第1期)美国花旗集团亚太区(位于香港)安全调查服务部区域执行官AlDemeter:(2)风险控制框架和面临的挑战下面谈一下风险......