期刊文献+
共找到39,087篇文章
< 1 2 250 >
每页显示 20 50 100
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
1
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Otway-Rees协议改进及形式化证明 被引量:3
2
作者 鲁来凤 段新东 马建峰 《通信学报》 EI CSCD 北大核心 2012年第S1期250-254,共5页
选取认证密钥分配协议Otway-Rees协议作为研究对象,利用协议组合逻辑(PCL)作为协议证明工具,对安全协议形式化分析及证明进行了研究。首先给出了Otway-Rees协议常见的攻击形式,分析了存在的缺陷,提出了改进方案(AOR协议);然后,为了更好... 选取认证密钥分配协议Otway-Rees协议作为研究对象,利用协议组合逻辑(PCL)作为协议证明工具,对安全协议形式化分析及证明进行了研究。首先给出了Otway-Rees协议常见的攻击形式,分析了存在的缺陷,提出了改进方案(AOR协议);然后,为了更好地形式化描述AOR协议,对传统的PCL进行一定的扩展;紧接着,用扩展后的PCL对改进的协议中各个实体的行为和协议的安全属性进行形式化描述,将改进后的协议进行模块化划分,并利用PCL进行组合证明;最后,得出改进后的AOR协议具有密钥保密属性。 展开更多
关键词 安全协议 形式化方法 协议组合逻辑 otway-rees协议
在线阅读 下载PDF
基于BAN逻辑分析Otway-Rees协议安全性 被引量:1
3
作者 李新中 周小燕 《微计算机信息》 北大核心 2007年第18期71-72,68,共3页
本文通采用BAN逻辑对Otway-Rees协议建立理想化协议模型,利用协议的初始假设和BAN逻辑的公设分析了Ot-way-Rees协议的安全性。
关键词 安全协议 BAN逻辑 OtwayRees协议
在线阅读 下载PDF
基于串空间模型的改进型Otway-Rees协议分析
4
作者 解颜铭 石曙东 翁艳琴 《信息通信》 2012年第3期160-162,共3页
串空间模型是一种新兴的密码协议形式化分析工具,其理论中理想和诚实概念的提出大大减少了协议的证明步骤。本文在Otway-Rees协议缺陷的基础上对它进行改进,并利用串空间模型的理论对改进后的Otway-Rees协议进行了形式化的分析。新的Otw... 串空间模型是一种新兴的密码协议形式化分析工具,其理论中理想和诚实概念的提出大大减少了协议的证明步骤。本文在Otway-Rees协议缺陷的基础上对它进行改进,并利用串空间模型的理论对改进后的Otway-Rees协议进行了形式化的分析。新的Otway-Rees协议满足其安全目标,是安全可行的。 展开更多
关键词 安全协议 otway-rees协议 串空间 认证性 机密性
在线阅读 下载PDF
Otway-Rees协议的分析及改进 被引量:1
5
作者 程莹 肖美华 《计算机与现代化》 2010年第6期74-76,共3页
通过对Otway-Rees这一密钥交换协议进行协议漏洞分析,本文给出协议本身存在的4种攻击,探讨一种改进方法,从而有效地改善协议的安全性及秘密性。
关键词 otway-rees BAN逻辑 密钥交换 安全性分析
在线阅读 下载PDF
Otway-Rees协议改进及安全分析 被引量:1
6
作者 王君 昝亚洲 +1 位作者 刘爱森 屈萌 《信息工程大学学报》 2014年第5期525-530,共6页
选取Otway-Rees协议作为研究对象,用一种改进的BAN类逻辑――安全协议分析本征逻辑(SPALL)作为协议分析工具展开研究。首先对SPALL系统进行扩展,针对Otway-Rees协议存在的缺陷,提出了改进方案。为了更好地描述改进协议,用SPALL系统对其... 选取Otway-Rees协议作为研究对象,用一种改进的BAN类逻辑――安全协议分析本征逻辑(SPALL)作为协议分析工具展开研究。首先对SPALL系统进行扩展,针对Otway-Rees协议存在的缺陷,提出了改进方案。为了更好地描述改进协议,用SPALL系统对其安全属性进行了形式化描述,并做出安全分析。分析结果表明,改进协议能够确保密钥分发的正确性,并具有密钥机密性和强认证性,还能满足通信双方验证会话密钥一致性的要求。 展开更多
关键词 安全协议 BAN类逻辑 形式化方法 otway-rees协议
在线阅读 下载PDF
基于进程代数的Otway-Rees协议的形式化验证
7
作者 蔡雨桐 王勇 +2 位作者 王然然 姜正涛 代桂平 《计算机科学》 CSCD 北大核心 2021年第S01期477-480,共4页
Otway-Rees协议的目的是完成发起者和响应者之间的双向认证,并且分发服务器产生的会话密钥。该协议的特点是简单实用,没有使用复杂的同步时钟机制或双重加密,仅用少量的信息提供了良好的时效性。此协议允许通过一个网络的个别通信认证... Otway-Rees协议的目的是完成发起者和响应者之间的双向认证,并且分发服务器产生的会话密钥。该协议的特点是简单实用,没有使用复杂的同步时钟机制或双重加密,仅用少量的信息提供了良好的时效性。此协议允许通过一个网络的个别通信认证自己的身份,还可以阻止重放攻击和窃听,允许修改检测。对安全协议的分析是信息时代无法回避的关键问题,事实证明,形式化方法是安全协议分析更为可靠和有效的途径。此协议的形式化验证对于工程实施具有重要意义。对Otway-Rees协议进行抽象处理,得到抽象模型,在此基础上给出基于进程代数的形式化描述,并进行形式化验证。验证结果表明,此协议形式的并行系统展现出了期望的外部行为。 展开更多
关键词 otway-rees 安全协议 协议验证 形式化 进程代数
在线阅读 下载PDF
Otway-Rees协议并行攻击的SG逻辑分析 被引量:1
8
作者 王小锐 陈连俊 +1 位作者 季庆光 曹正君 《计算机工程》 CAS CSCD 北大核心 2007年第6期126-128,共3页
网络信息安全很大程度上取决于密码协议的安全,重放攻击和并行攻击是对密码协议的常见攻击,能够分析并行攻击的形式化分析方法并不多见。该文介绍了一种分析密码协议并行攻击和重放攻击的逻辑方法——SG逻辑,应用它对改进版的Otway-Ree... 网络信息安全很大程度上取决于密码协议的安全,重放攻击和并行攻击是对密码协议的常见攻击,能够分析并行攻击的形式化分析方法并不多见。该文介绍了一种分析密码协议并行攻击和重放攻击的逻辑方法——SG逻辑,应用它对改进版的Otway-Rees协议进行了分析,找出了BAN类逻辑所不能分析出来的缺陷,针对该缺陷给出了协议的进一步改进,并推证了改进后的协议对SG逻辑的分析是安全的。 展开更多
关键词 SG逻辑 并行攻击 Otway—Rees协议 安全性分析
在线阅读 下载PDF
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
9
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol Code crimson HAEMORRHAGE Trauma
暂未订购
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
10
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
11
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
12
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Efficacy and safety of acupoint application for gastrointestinal function in treating post-stroke depression:Protocol for a randomized controlled trial
13
作者 Xuan Zhang Shuhui Li +2 位作者 Juntao Wang Chung Tai Lau Jacky C.P.Chan 《Journal of Traditional Chinese Medical Sciences》 2025年第4期552-558,共7页
Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this ... Objective:To evaluate the efficacy and safety of acupoint application for post-stroke depression(PSD)by regulating gastrointestinal function.A secondary objective is to explore the potential mechanism underlying this approach from the perspective of gut microbiota.Methods:This multicenter,randomized,double-blind(patients and assessors),placebo-controlled trial will enroll 80 patients with PSD,and include a 1-week run-in period,a 4-week treatment phase,and a 12-week follow-up.Eligible participants will randomly be assigned in a 1:1 ratio to either the acupoint application or placebo(non-acupoint)groups.Treatments will be administered thrice weekly for 4 weeks.The primary outcome is change in the Hamilton Rating Scale for Depression(HAMD)score.Secondary outcomes include the Beck Depression Inventory(BDI),36-Item Short-Form Health Survey(SF-36),Barthel Index of Activities of Daily Living,Social Adaptation Self-Evaluation Scale(SASS),and gut microbiota profiling.All outcomes will be assessed at baseline(prior to treatment),during treatment(weeks 2 and 4),and during follow-up(weeks 8,12,and 16).The Treatment Emergent Symptom Scale(TESS)will be used for evaluation throughout the 4-week treatment phase.Discussion:The results of this study will provide important evidence supporting a novel treatment strategy for PSD that targets gastrointestinal regulation,potentially informing future clinical practice. 展开更多
关键词 Acupoint application Gut microbiota Post-stroke depression protocol Randomized controlled trial
暂未订购
Tuning the Coefficients of Thermal Expansion of the Crystallized Cordierite Glasses by Thermal Treatment Protocols
14
作者 DUAN Qiang KE Xuefei +1 位作者 QIAO Ang TAO Haizheng 《Journal of Wuhan University of Technology(Materials Science)》 2025年第5期1239-1243,共5页
Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematica... Focusing on the ultralow expansion functionality of the crystalized glass containing the cordierite crystal phase with the molar composition 20.7MgO·20.7Al_(2)O_(3)·51.6SiO_(2)·7.0TiO_(2),we systematically investigated impacts of thermal treatment protocols on T dependence of coefficients of thermal expansion(CTE).Except for the phase compositions,morphology is identified as another important factor to control the T dependence of CTE.By using X-ray diffraction and scanning electron microscope,various modes of T dependence of CTE for crystallized glasses are ascribed to their different phase compositions and microstructure with finely dispersed nanoparticles.These understanding contributes to the further modification of CTE of the crystalized glass by altering their thermal treatment scenarios. 展开更多
关键词 coefficients of thermal expansion crystalized glass CORDIERITE thermal treatment protocols
原文传递
Ultrasound guided femoral nerve blocks as a compulsory pain protocol in femoral neck fractures
15
作者 Yuri Klassov 《World Journal of Orthopedics》 2025年第12期82-90,共9页
BACKGROUND Femur fractures are one of the most serious injuries that occur in the older population and are associated with severe pain and increased mortality.The primary objective of this study was to find if there w... BACKGROUND Femur fractures are one of the most serious injuries that occur in the older population and are associated with severe pain and increased mortality.The primary objective of this study was to find if there was a significant difference in pain scores in patients treated with femoral nerve blocks(FNB)compared with patients treated with the standard analgesia protocol.The secondary objective was to find if there was a significant difference in morbidity between the two groups.AIM To evaluate the effectiveness of ultrasound(US)-guided FNB in managing preoperative pain and reducing morbidity in patients with neck femur fractures compared to the standard analgesia protocol.The study seeks to determine whether FNB offers superior outcomes in terms of pain control,rehospitalization rates,and mortality.METHODS This retrospective cohort study included 1577 patients suffering from neck femur fractures.387 patients were treated with a FNB for pain management upon arrival at the emergency department,the rest were treated with standard analgesia.Pain was assessed from electronic medical records using the visual analogue scale(VAS)pre surgery,12-and 24-hour post-surgery.To determine morbidity and mortality during hospitalizations and 6 months after,it was collected from electronic medical records.RESULTS In a cohort of 1577 patients,those receiving US-guided FNB had significantly lower preoperative VAS pain scores(1.46±2.49 vs 1.82±2.59,P=0.001),reduced rehospitalization rates(0.99±1.96 vs 1.46±2.34,P<0.001),and lower mortality(16%vs 32%,P<0.001)compared to standard analgesia.CONCLUSION US guided FNB is more effective for pain management compared with standard analgesia.This method was also found to significantly reduce the risk of morbidity in those patients. 展开更多
关键词 Hip fracture Femur fracture Femoral nerve block Ultrasound guided Analgesia protocol
暂未订购
Improving nursing care protocols for diabetic patients through a systematic review and meta-analysis of recent years
16
作者 Mónica Grande-Alonso María Barbado García +2 位作者 Soledad Cristóbal-Aguado Soledad Aguado-Henche Rafael Moreno-Gómez-Toledano 《World Journal of Diabetes》 2025年第2期257-269,共13页
BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes ... BACKGROUND Diabetes mellitus has become one of the major pandemics of the 21st century.In this scenario,nursing interventions are essential for improving self-care and quality of life in patients with type 2 diabetes mellitus.Nursing interventions are crucial for managing the disease and preventing complications.AIM To analyse nursing interventions in recent years through a systematic review and meta-analysis and to propose improvements in care plans.METHODS This study conducted a systematic review and meta-analysis of the impact of nursing interventions on quantitative glycaemic variables,such as glycated haemoglobin and fasting plasma glucose.RESULTS After confirming that the combined effect of all studies from the past 5 years positively impacts quantitative variables,a descriptive analysis of the studies with the most significant changes was conducted.Based on this,an improvement in diabetic patient care protocols has been proposed through follow-up plans tailored to the patient’s technological skills.CONCLUSION The combined results obtained and the proposal for improvement developed in this manuscript could help to improve the quality of life of many people around the world. 展开更多
关键词 Diabetes mellitus Nursing interventions Systematic review META-ANALYSIS protocol enhancement proposal
暂未订购
Effect of alpha-tocopherol and OTR-4131 on muscle degeneration after rotator cuff tear in rats:An experimental protocol
17
作者 Stavros Stamiris Angeliki Cheva +7 位作者 Michael Potoupnis Elissavet Anestiadou Dimitrios Stamiris Chryssa Bekiari Antonia Loukousia Papavasiliou Kyriakos Eleftherios Tsiridis Ioannis Sarris 《World Journal of Methodology》 2025年第4期287-298,共12页
BACKGROUND Massive rotator cuff tears(RCTs)result in impaired shoulder function and quality of life.These tears lead to structural changes in the rotator cuff muscles,which compromise recovery after repair and increas... BACKGROUND Massive rotator cuff tears(RCTs)result in impaired shoulder function and quality of life.These tears lead to structural changes in the rotator cuff muscles,which compromise recovery after repair and increase re-tear rates.AIM To investigate the potential inhibitory effects of alpha-tocopherol(vitamin E)and OTR-4131 on muscle atrophy,fatty infiltration,and fibrosis in rotator cuff muscles following a massive RCT using a Wistar rat model,and establish a standardized methodology for evaluating potential therapeutic agents.METHODS This protocol outlines a controlled animal study using 40 male Wistar rats,randomized into five groups.The experimental groups will receive either systemic administration of alpha-tocopherol or local administration of OTR-4131 via intramuscular injection into the supraspinatus and infraspinatus muscles.Two sham groups will receive systemic and local saline injections respectively,while a control group will undergo no intervention.The interventions will be administered after surgical transection of the supraspinatus and infraspinatus tendons.Outcomes will be assessed via wet muscle weight measurements,muscle fiber diameter,fatty infiltration percentage,and fibrosis evaluation using histological methods.RESULTS The study anticipates that alpha-tocopherol and OTR-4131 will reduce muscle atrophy,fatty infiltration,and fibrosis compared to control and sham groups,supporting their potential protective role in rotator cuff muscle degeneration.CONCLUSION The results are expected to improve the understanding on the role of alpha-tocopherol and OTR-4131 in rotator cuff muscle protection after massive RCT and may serve as a foundation for further preclinical and clinical research aimed at improving rotator cuff repair outcomes. 展开更多
关键词 Alpha-tocopherol OTR-4131 Rotator cuff tears Experimental protocol Muscle atrophy Fatty infiltration
暂未订购
LSAP-IoHT:Lightweight Secure Authentication Protocol for the Internet of Healthcare Things
18
作者 Marwa Ahmim Nour Ouafi +3 位作者 Insaf Ullah Ahmed Ahmim Djalel Chefrour Reham Almukhlifi 《Computers, Materials & Continua》 2025年第12期5093-5116,共24页
The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’healt... The Internet of Healthcare Things(IoHT)marks a significant breakthrough in modern medicine by enabling a new era of healthcare services.IoHT supports real-time,continuous,and personalized monitoring of patients’health conditions.However,the security of sensitive data exchanged within IoHT remains a major concern,as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities.Potential threats include unauthorized access,device compromise,data breaches,and data alteration,all of which may compromise the confidentiality and integrity of patient information.In this paper,we provide an in-depth security analysis of LAP-IoHT,an authentication scheme designed to ensure secure communication in Internet of Healthcare Things environments.This analysis reveals several vulnerabilities in the LAP-IoHT protocol,namely its inability to resist various attacks,including user impersonation and privileged insider threats.To address these issues,we introduce LSAP-IoHT,a secure and lightweight authentication protocol for the Internet of Healthcare Things(IoHT).This protocol leverages Elliptic Curve Cryptography(ECC),Physical Unclonable Functions(PUFs),and Three-Factor Authentication(3FA).Its security is validated through both informal analysis and formal verification using the Scyther tool and the Real-Or-Random(ROR)model.The results demonstrate strong resistance against man-in-the-middle(MITM)attacks,replay attacks,identity spoofing,stolen smart device attacks,and insider threats,while maintaining low computational and communication costs. 展开更多
关键词 Internet of healthcare things(IoHT) authentication protocol CRYPTANALYSIS ATTACKS
在线阅读 下载PDF
Brief Discussion on the Enlightenment of FDA’s Comparability Protocol to the Post-Approval Change Management of New Drugs in China
19
作者 Lu Xiaoling Tian Lijuan 《Asian Journal of Social Pharmacy》 2025年第2期126-133,共8页
Objective To discuss the flexible supervision and communication mode in the post-approval change(PAC)of drugs,to explore how to ensure the quality and availability of drugs during the changes,and to provide some sugge... Objective To discuss the flexible supervision and communication mode in the post-approval change(PAC)of drugs,to explore how to ensure the quality and availability of drugs during the changes,and to provide some suggestions and reference for promoting the timely marketing of drugs.Methods Based on the comparability protocol guidelines issued by the US FDA in October 2022,the regulatory status quo of PAC between China and the US was compared to explore the feasibility of implementing comparability protocols in China.Results and Conclusion According to the specific situation of post-approval of drug change supervision,some suggestions were put forward to optimize the PAC management procedure,such as establishing the communication pathways between holders and health authorities,publishing relevant guidance and strengthening training,so as to provide reference for the implementation of comparability protocols in China. 展开更多
关键词 post-approval change quality risk management risk assessment comparability protocol pharmaceutical quality system
暂未订购
Flex-QUIC:AI for QUIC Transport Protocol with High-Efficiency in Future Wireless Networks
20
作者 Jiang Tao Liu Yang +2 位作者 Zhang Yu Peng Miaoran Wang Haoyu 《China Communications》 2025年第12期1-14,共14页
This paper proposes Flex-QUIC,an AIempowered quick UDP Internet connections(QUIC)enhancement framework that addresses the challenge of degraded transmission efficiency caused by the static parameterization of acknowle... This paper proposes Flex-QUIC,an AIempowered quick UDP Internet connections(QUIC)enhancement framework that addresses the challenge of degraded transmission efficiency caused by the static parameterization of acknowledgment(ACK)mechanisms,loss detection,and forward error correction(FEC)in dynamic wireless networks.Unlike the standard QUIC protocol,Flex-QUIC systematically integrates machine learning across three critical modules to achieve high-efficiency operation.First,a contextual multi-armed bandit-based ACK adaptation mechanism optimizes the ACK ratio to reduce wireless channel contention.Second,the adaptive loss detection module utilizes a long short-term memory(LSTM)model to predict the reordering displacement for optimizing the packet reordering tolerance.Third,the FEC transmission scheme jointly adjusts the redundancy level based on the LSTM-predicted loss rate and congestion window state.Extensive evaluations across Wi-Fi,5G,and satellite network scenarios demonstrate that Flex-QUIC significantly improves throughput and latency reduction compared to the standard QUIC and other enhanced QUIC variants,highlighting its adaptability to diverse and dynamic network conditions.Finally,we further discuss open issues in deploying AI-native transport protocols. 展开更多
关键词 contextual multi-armed bandit long shortterm memory QUIC transport protocol wireless networks
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部