Prepared with concrete and pragmatic questions,members of a media delegation from the Republic of the Congo toured the cities of Yunfu and Zhaoqing in Guangdong Province from 16 to 22 November 2025.They visited produc...Prepared with concrete and pragmatic questions,members of a media delegation from the Republic of the Congo toured the cities of Yunfu and Zhaoqing in Guangdong Province from 16 to 22 November 2025.They visited production workshops,explored research institutes,toured beautiful villages and discovered archaeological sites,searching for the keys to Chinese modernisation in its many dimensions.展开更多
At the invitation of the Friedrich Ebert Foundation(Friedrich-Ebert-Stiftung),the Thai-Chinese Culture and Economy Association and the Viet Nam Union of Friendship Organisations,a CAFIU delegation headed by President ...At the invitation of the Friedrich Ebert Foundation(Friedrich-Ebert-Stiftung),the Thai-Chinese Culture and Economy Association and the Viet Nam Union of Friendship Organisations,a CAFIU delegation headed by President Ji Bingxuan,also Vice-Chairperson of the Standing Committee of the 13th National People's Congress of China visited Germany,Thailand and Vietnam from 26 November to 5 December 2024.展开更多
On 22 January 2025,the delegation of Harvard Students'China Trek 2025 arrived in Hangzhou.Forty-six students from Harvard Kennedy School,representing 20 countries,engaged in in-depth exchanges with Chinese and int...On 22 January 2025,the delegation of Harvard Students'China Trek 2025 arrived in Hangzhou.Forty-six students from Harvard Kennedy School,representing 20 countries,engaged in in-depth exchanges with Chinese and international youth delegates,embarking on a journey promoting mutual learning and strengthening friendship.展开更多
From 9 to 12 March 2025,representatives of China NGO Network for International Exchanges(CNIE)attended the 69th Session of the United Nations Commission on the Status of Women(CSW 69)in New York,USA.
At the invitation of the Madagascar-China Friendship Group of the National Assembly of Madagascar,Li Jun,former Vice-Minister of the International Department of the CPC Central Committee and Vice-President of CNIE,led...At the invitation of the Madagascar-China Friendship Group of the National Assembly of Madagascar,Li Jun,former Vice-Minister of the International Department of the CPC Central Committee and Vice-President of CNIE,led a sixmember delegation to visit Madagascar from May 11th to 14th,2025.During the delegation's visit,Justin Tokely,Speaker of the National Assembly of Madagascar and Razafinarivo Augustin,Deputy Speaker met with the delegation.The delegation exchanged views with Rafidi,Director of the Madagascar Economic Development Bureau as well as leaders of local NGOs on Belt and Road cooperation and peopleto-people exchanges.展开更多
From May 14 to 17,2025,at the invitation of the Hellenic Clothing Industry Association and the Greek Enterprise Bureau,Sun Ruizhe,president of the China National Textile and Apparel Council(hereinafter referred to as ...From May 14 to 17,2025,at the invitation of the Hellenic Clothing Industry Association and the Greek Enterprise Bureau,Sun Ruizhe,president of the China National Textile and Apparel Council(hereinafter referred to as CNTAC),led a team to visit Greece to carry out industrial communication and economic cooperation.This visit not only deepened the mutual trust and cooperation in the textile industry between China and Greece but also opened up new pathways for bilateral industrial connections.展开更多
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel...To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.展开更多
New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security...New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications.展开更多
Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services...Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.展开更多
The WFO Technical Forum 2009 (WTF),sponsored by World Foundrymen Organization,organized by Czech Foundrymens Society,was held on the 1st,2nd and 3rd June 2009,at the Hotel Voronez in Brno,Czech Republic. The 4 day... The WFO Technical Forum 2009 (WTF),sponsored by World Foundrymen Organization,organized by Czech Foundrymens Society,was held on the 1st,2nd and 3rd June 2009,at the Hotel Voronez in Brno,Czech Republic. The 4 days included technical presentations,social events and the very important Ph.D conference. During the event there were the General Assembly bringing together the organizations members from around the world,and an exhibition,supported by 34 world's leading foundry based companies. In addition the event coincided with the Czech Foundrymens Society Foundry Days now in its 46th year.……展开更多
Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using c...Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.展开更多
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro...To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.展开更多
Invited by Mr. Matthew Poole, Chairman of the Organization Committee of the 67th World Foundry Congress, the delegation of Foundry Institution of Chinese Mechanical Engineering Society (FICMES) led by LI Xin-ya, Presi...Invited by Mr. Matthew Poole, Chairman of the Organization Committee of the 67th World Foundry Congress, the delegation of Foundry Institution of Chinese Mechanical Engineering Society (FICMES) led by LI Xin-ya, President of China Academy of Machinery Science and Technology, more recently attended the 67th World Foundry Congress, and visited the Royal Institute of Technology, Sweden; LOCOMO Cast Steel Company, Metso Corporation, Finland; Imperial College, London, United Kingdom; and Brunel University, United Kingdom. During the period of the Congress and in the course of visiting, the delegation had deeply technical exchanges with the organizations mentioned above in the fields of such technologies as numerical simulation and design of foundry technical processes, special materials and advanced casting technology for hydraulic turbines and steam turbines, dual-phase steels casting, nuclear shielding materials manufacturing, rheology and semi-solid casting technology, design and development of medium-frequency induction heating furnaces and so on. Both of them are on the chance of cooperation. The visiting of the delegation is quite successful. The 69th World Foundry Congress has been determined by World Foundry Organization to be held in China and it will be organized by Foundry Institution of Chinese Mechanical Engineering Society and China Academy of Machinery Science and Technology. The World Foundry Congress to be held in China will play the active role in facilitating the Chinese foundrymen to further understand and master the advanced foundry technologies in the world and promoting the digitalization, informatization and greening development of China?蒺s foundry technology.展开更多
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform...Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.展开更多
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ...There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.展开更多
From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relation...From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relations.The delegation also engaged in discussions with scholars from the Institute of World Economy and International Relations.展开更多
At the invitation of CAFIU,the delegation of 15 renowned sinologists from 15 countries including Iran,Spain,and Mexico visited China from September 4th to 15th.
The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was...The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was attended by over 3,000 representatives from more than 150 ITU member states, six regional telecommunication organizations in the Asia-Pacific, Europe, Americas, Africa, Arab, and the Commonwealth of Independent States, as well as related international organizations and renowned enterprises, which reaches a record high. The event focused on the direction of ITU's standards research in the period of 2025-2028, and the election of research group management positions, and other important issues.展开更多
On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu J...On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu Jiang,CIIS Vice President and Full-Time Deputy Secretary-General of Xi Jinping Thought on Diplomacy Studies Centre,had in-depth exchanges with Russian scholars on the significance and practice of Xi Jinping Thought on Diplomacy and China-Russia relations.展开更多
文摘Prepared with concrete and pragmatic questions,members of a media delegation from the Republic of the Congo toured the cities of Yunfu and Zhaoqing in Guangdong Province from 16 to 22 November 2025.They visited production workshops,explored research institutes,toured beautiful villages and discovered archaeological sites,searching for the keys to Chinese modernisation in its many dimensions.
文摘At the invitation of the Friedrich Ebert Foundation(Friedrich-Ebert-Stiftung),the Thai-Chinese Culture and Economy Association and the Viet Nam Union of Friendship Organisations,a CAFIU delegation headed by President Ji Bingxuan,also Vice-Chairperson of the Standing Committee of the 13th National People's Congress of China visited Germany,Thailand and Vietnam from 26 November to 5 December 2024.
文摘On 22 January 2025,the delegation of Harvard Students'China Trek 2025 arrived in Hangzhou.Forty-six students from Harvard Kennedy School,representing 20 countries,engaged in in-depth exchanges with Chinese and international youth delegates,embarking on a journey promoting mutual learning and strengthening friendship.
文摘From 9 to 12 March 2025,representatives of China NGO Network for International Exchanges(CNIE)attended the 69th Session of the United Nations Commission on the Status of Women(CSW 69)in New York,USA.
文摘At the invitation of the Madagascar-China Friendship Group of the National Assembly of Madagascar,Li Jun,former Vice-Minister of the International Department of the CPC Central Committee and Vice-President of CNIE,led a sixmember delegation to visit Madagascar from May 11th to 14th,2025.During the delegation's visit,Justin Tokely,Speaker of the National Assembly of Madagascar and Razafinarivo Augustin,Deputy Speaker met with the delegation.The delegation exchanged views with Rafidi,Director of the Madagascar Economic Development Bureau as well as leaders of local NGOs on Belt and Road cooperation and peopleto-people exchanges.
文摘From May 14 to 17,2025,at the invitation of the Hellenic Clothing Industry Association and the Greek Enterprise Bureau,Sun Ruizhe,president of the China National Textile and Apparel Council(hereinafter referred to as CNTAC),led a team to visit Greece to carry out industrial communication and economic cooperation.This visit not only deepened the mutual trust and cooperation in the textile industry between China and Greece but also opened up new pathways for bilateral industrial connections.
基金funded by the Sichuan Science and Technology Program,Grant Nos.2024NSFSC0515,2024ZHCG0182 and MZGC20230013.
文摘To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.
基金Project (No. 602032) supported by the Natural Science Foundationof Zhejiang Province, China
文摘New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications.
文摘Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance.
文摘 The WFO Technical Forum 2009 (WTF),sponsored by World Foundrymen Organization,organized by Czech Foundrymens Society,was held on the 1st,2nd and 3rd June 2009,at the Hotel Voronez in Brno,Czech Republic. The 4 days included technical presentations,social events and the very important Ph.D conference. During the event there were the General Assembly bringing together the organizations members from around the world,and an exhibition,supported by 34 world's leading foundry based companies. In addition the event coincided with the Czech Foundrymens Society Foundry Days now in its 46th year.……
基金supported by the National Science Council under Grant No. NSC100-2410-H-005-046
文摘Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods.
基金Supported by the National Basic Research Program of China(No.2012CB315905)the National Natural Science Foundation of China(No.61272501)the Fund of Tianjin Key Laboratory of Civil Aircraft Airworthiness and Maintenance in CAUC and a General grant from Civil Aviation Flight University of China(No.J2013-31,Q2014-48)
文摘To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.
文摘Invited by Mr. Matthew Poole, Chairman of the Organization Committee of the 67th World Foundry Congress, the delegation of Foundry Institution of Chinese Mechanical Engineering Society (FICMES) led by LI Xin-ya, President of China Academy of Machinery Science and Technology, more recently attended the 67th World Foundry Congress, and visited the Royal Institute of Technology, Sweden; LOCOMO Cast Steel Company, Metso Corporation, Finland; Imperial College, London, United Kingdom; and Brunel University, United Kingdom. During the period of the Congress and in the course of visiting, the delegation had deeply technical exchanges with the organizations mentioned above in the fields of such technologies as numerical simulation and design of foundry technical processes, special materials and advanced casting technology for hydraulic turbines and steam turbines, dual-phase steels casting, nuclear shielding materials manufacturing, rheology and semi-solid casting technology, design and development of medium-frequency induction heating furnaces and so on. Both of them are on the chance of cooperation. The visiting of the delegation is quite successful. The 69th World Foundry Congress has been determined by World Foundry Organization to be held in China and it will be organized by Foundry Institution of Chinese Mechanical Engineering Society and China Academy of Machinery Science and Technology. The World Foundry Congress to be held in China will play the active role in facilitating the Chinese foundrymen to further understand and master the advanced foundry technologies in the world and promoting the digitalization, informatization and greening development of China?蒺s foundry technology.
文摘Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is expected to perform is signing digital signatures on a remote untrustworthy service host that is beyond the control of the agent host. This service host may treat the mobile agents unfairly, i.e. according to its’ own benefit rather than to their time of arrival. In this research, we present a novel protocol, called Collusion-Resistant Distributed Agent-based Signature Delegation (CDASD) protocol, to allow an agent host to delegate its signing power to an anonymous mobile agent in such a way that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The protocol introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The protocol incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the protocol is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed protocol are analyzed, and the protocol is compared with the most related work.
文摘There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
文摘From May 26 to 31,CIIS President Chen Bo led a delegation to Russia.During the visit,they participated in the 22nd China-Russia Bilateral Academic Seminar,hosted by the Moscow State Institute of International Relations.The delegation also engaged in discussions with scholars from the Institute of World Economy and International Relations.
文摘At the invitation of CAFIU,the delegation of 15 renowned sinologists from 15 countries including Iran,Spain,and Mexico visited China from September 4th to 15th.
文摘The World Telecommunication Standardization Assembly(WTSA-24) took place on October 15-24 in New Delhi, India. Held by ITU every four years, the global event defines the next period of study for ITU-T.The assembly was attended by over 3,000 representatives from more than 150 ITU member states, six regional telecommunication organizations in the Asia-Pacific, Europe, Americas, Africa, Arab, and the Commonwealth of Independent States, as well as related international organizations and renowned enterprises, which reaches a record high. The event focused on the direction of ITU's standards research in the period of 2025-2028, and the election of research group management positions, and other important issues.
文摘On November 28,a delegation of Russian scholars led by Victor Larin,Academician of the Russian Academy of Sciences and Director at the Far Eastern Branch,visited the Xi Jinping Thought on Diplomacy Studies Centre.Yu Jiang,CIIS Vice President and Full-Time Deputy Secretary-General of Xi Jinping Thought on Diplomacy Studies Centre,had in-depth exchanges with Russian scholars on the significance and practice of Xi Jinping Thought on Diplomacy and China-Russia relations.