期刊文献+
共找到9,539篇文章
< 1 2 250 >
每页显示 20 50 100
Repeatability,reproducibility,and agreement regarding measurement of choroidal vascularity index between OCT and OCT angiography
1
作者 Mu-Han Zhong Jia-Li Zhang +5 位作者 Ke-Xin Yu Shu-Qi Fan Xue Li Hao Chen Jin-Hua Bao Ying-Ying Huang 《International Journal of Ophthalmology(English edition)》 2026年第3期498-508,共11页
AIM:To explore the repeatability,reproducibility,and agreement in the measurement of the choroidal vascularity index(CVI)for different swept-source optical coherence tomography(OCT)devices and between OCT and OCT angi... AIM:To explore the repeatability,reproducibility,and agreement in the measurement of the choroidal vascularity index(CVI)for different swept-source optical coherence tomography(OCT)devices and between OCT and OCT angiography(OCTA)images.METHODS:Two swept-source OCT imaging systems,VG200I and Topcon DRI OCT Triton,were used to capture OCT and OCTA images in triplicate.The first and third images were taken by one operator,and the second image was taken by another operator.The built-in software was used to calculate the CVI from the OCTA images(CVI-OCTA),and a custom-designed algorithm was used to calculate the CVI from the OCT images(CVI-OCT).Repeatability and reproducibility were assessed with the intraclass correlation coefficient(ICC),and agreement between devices and between OCT and OCTA were evaluated with Bland-Altman analysis.RESULTS:Sixty-eight eyes from 35 adults(17 females)were included in the analysis.The average age of the participants was 23.6±2.3y,with an average spherical equivalent refraction of-3.08±2.47 D and an average AL of 25.21±1.20 mm.Both OCT devices demonstrated high repeatability and reproducibility in measuring the CVI-OCTA(all ICCs>0.894 across five choroidal regions)and CVI-OCT(all ICCs>0.838).Furthermore,the between-device agreement in measuring the CVI-OCT was good[mean difference(MD)ranging from-2.32%to-3.07%],but that in measuring the CVI-OCTA was poor(MD,1.48%to-7.43%).Additionally,the between-imaging agreement(CVI-OCTA versus CVI-OCT)was poor for both devices(Triton,MD,6.05%to 12.68%;VG200I,MD,6.67%to 12.09%).CONCLUSION:Both OCT devices and the two analytical methods demonstrate good stability.The inter-device consistency of CVI-OCT is good,while the inter-device consistency of CVI-OCTA and the consistency between the two analytical methods in the same device are both poor. 展开更多
关键词 choroidal vascularity index optical coherence tomography angiography agreement
原文传递
Database of Clause Depth of China’s Regional Trade Agreement and Its Characteristics
2
作者 Jin Sun Ruixian Chen 《Proceedings of Business and Economic Studies》 2025年第4期345-359,共15页
This paper analyzes the text of 3261 clauses of 20 RTAs signed by China,classifies them into 52 policy areas according to the international mainstream HMS method,and assigns them through coding.The clause depth of Ch... This paper analyzes the text of 3261 clauses of 20 RTAs signed by China,classifies them into 52 policy areas according to the international mainstream HMS method,and assigns them through coding.The clause depth of China’s RTAs is measured across three-dimensional systems(policy areas,clauses,and core clauses)and two generations of trade policy areas(WTO+,WTO-X,and all policy areas).It is observed that China’s RTAs exhibit greater depth in Industrial Products,Agricultural Products,TBT,Antidumping,Countervailing,and Investment,while showing comparatively less depth in Fiscal Policy,Innovation Policies,and related areas. 展开更多
关键词 Regional trade agreement Clause depth Database construction agreement text
在线阅读 下载PDF
CD-AKA-IoV:A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle
3
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第10期1715-1732,共18页
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi... With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency. 展开更多
关键词 AUTHENTICATION key agreement IoV cross-domain
在线阅读 下载PDF
Light-Weighted Mutual Authentication and Key Agreement in V2N VANET
4
作者 Yanan Liu Lei Cao +3 位作者 Zheng Zhang Ge Li Shuo Qiu Suhao Wang 《Computers, Materials & Continua》 2025年第9期4997-5019,共23页
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari... As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience. 展开更多
关键词 KERBEROS PUF AUTHENTICATION key agreement VANET
在线阅读 下载PDF
A Review and Outlook of Bilateral Eco-nomic and Trade Cooperation Against the Backdrop of the 20th Anniversary of the China-Chile Free Trade Agreement
5
作者 Gao Shujun Lu Yao 《China's Foreign Trade》 2025年第5期44-52,共9页
Chile,a pioneer and benchmark partner for China's free trade.cooperation in Latin America,holds a special position in China-Latin America economic and trade relations.It was the first Latin American country to sig... Chile,a pioneer and benchmark partner for China's free trade.cooperation in Latin America,holds a special position in China-Latin America economic and trade relations.It was the first Latin American country to sign a bilateral free trade agreement with China and the first to reach an upgraded protocol.Chile also established mutual recognition of Authorized Economic Operators(AEO)with China,the first country in South America to do so. 展开更多
关键词 mutual recognition authorized economic operators aeo bilateral free trade agreement Latin America AEO authorized economic operators bilateral economic cooperation trade agreement China Chile FTA
在线阅读 下载PDF
Policy coherence analysis of Türkiye’s lignite production and the Paris agreement ratification:an investigation through the water‑energy‑climate nexus
6
作者 Suleyman O.Altiparmak 《International Journal of Coal Science & Technology》 2025年第2期52-67,共16页
Lignite provides energy security and contributes economically.However,it also causes dirty outcomes in terms of climate aspect.In addition to the energy and climate dimensions of the Sustainable Development Goals,ther... Lignite provides energy security and contributes economically.However,it also causes dirty outcomes in terms of climate aspect.In addition to the energy and climate dimensions of the Sustainable Development Goals,there is also a water issue:lignite is usually found submerged below the local groundwater tables.Mining lignite could be exploited to achieve drinkable and agriculturally usable water.In today’s literature,while the impact of lignite production on global warming and emissions are already highly discussed,the water management side of the issue is regularly omitted.However,considering the complex interlink between these three areas(the Water-Energy-Climate(WEC)nexus)is necessary within policy coherence,which is mostly ignored even though it is one of the development targets.Here in this framework,Turkiye,which aims to reduce its heavy dependency on energy imports,is worth studying because almost all of its coal,the country’s largest fossil resource,is lignite.Therefore,this study examines the WEC nexus related to lignite production and combustion and seeks policy coherence between their outputs in the context of Turkiye’s historical steps to climate change mitigation,specifically oriented with the Paris Agreement.This story expands from the absence of specific development policy objectives to the practicalities of politics and economics. 展开更多
关键词 Turkiye LIGNITE Water-energy-climate(WEC)nexus Paris agreement Sustainable development goals
在线阅读 下载PDF
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
7
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
8
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
Quantum-resistant dynamic authenticated group key agreement scheme for the Internet of Things
9
作者 JIANG Rui XU Tengyu 《Journal of Southeast University(English Edition)》 2025年第3期392-400,共9页
With the recent advances in quantum computing,the key agreement algorithm based on traditional cryptography theory,which is applied to the Internet of Things(IoT)scenario,will no longer be secure due to the possibilit... With the recent advances in quantum computing,the key agreement algorithm based on traditional cryptography theory,which is applied to the Internet of Things(IoT)scenario,will no longer be secure due to the possibility of information leakage.In this paper,we propose a anti-quantum dynamic authenticated group key agreement scheme(AQDA-GKA)according to the ring-learning with errors(RLWE)problem,which is suitable for IoT environments.First,the proposed AQDA-GKA scheme can implement a group key agreement against quantum computing attacks by leveraging an RLWE-based key agreement mechanism.Second,this scheme can achieve dynamic node management,ensuring that any node can freely join or exit the current group.Third,we formally prove that the proposed scheme can resist quantum computing attacks as well as collusion attacks.Finally,the performance and security analysis reveals that the proposed AQDA-GKA scheme is secure and effective. 展开更多
关键词 group key agreement lattice-based cryptogra-phy dynamic authentication collusion attack resistance Internet of Things
在线阅读 下载PDF
A hyperelliptic curve-based authenticated key agreement scheme for unmanned aerial vehicles in cross-domain environments
10
作者 Muhammad Asghar KHAN Insaf ULLAH +2 位作者 Haralambos MOURATIDIS Abdulmajeed ALQHATANI Pascal LORENZ 《Chinese Journal of Aeronautics》 2025年第10期245-259,共15页
Unmanned Aerial Vehicles(UAVs)are increasingly recognized for their pivotal role in military and civilian applications,serving as essential technology for transmitting,evaluating,and gathering information.Unfortunatel... Unmanned Aerial Vehicles(UAVs)are increasingly recognized for their pivotal role in military and civilian applications,serving as essential technology for transmitting,evaluating,and gathering information.Unfortunately,this crucial process often occurs through unsecured wireless connections,exposing it to numerous cyber-physical attacks.Furthermore,UAVs’limited onboard computing resources make it challenging to perform complex cryptographic operations.The main aim of constructing a cryptographic scheme is to provide substantial security while reducing the computation and communication costs.This article introduces an efficient and secure cross-domain Authenticated Key Agreement(AKA)scheme that uses Hyperelliptic Curve Cryptography(HECC).The HECC,a modified version of ECC with a smaller key size of 80 bits,is well-suited for use in UAVs.In addition,the proposed scheme is employed in a cross-domain environment that integrates a Public Key Infrastructure(PKI)at the receiving end and a Certificateless Cryptosystem(CLC)at the sending end.Integrating CLC with PKI improves network security by restricting the exposure of encryption keys only to the message’s sender and subsequent receiver.A security study employing ROM and ROR models,together with a comparative performance analysis,shows that the proposed scheme outperforms comparable existing schemes in terms of both efficiency and security. 展开更多
关键词 Computation cost Cross-domain authentication Hyperelliptic curve cryptography Key agreement ROM ROR SECURITY Unmanned aerial vehicles
原文传递
Evaluating the impact of the BBNJ Agreement on regulatory gaps in a competent IFB:a case study of MGRs management in the Antarctic Treaty Area
11
作者 PAN Min 《Advances in Polar Science》 2025年第3期203-212,共10页
On 19 June 2023,the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction(BBNJ Agreement)was a... On 19 June 2023,the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction(BBNJ Agreement)was adopted.The BBNJ Agreement aims to regulate the conservation and sustainable use of marine biodiversity in areas beyond national jurisdiction,including the high seas and the international seabed area.The BBNJ Agreement enters into an already crowded institutional landscape as a global authority with broad objectives,inevitably interacting with existing institutions,frameworks,and bodies(IFBs).Existing research has primarily focused on two areas:the first examines the impact of the institutions established by the BBNJ Agreement on existing marine governance IFBs;the second explores its influence on issues currently lacking institutional arrangements.However,comparatively little attention has been given to the Agreement’s potential impact on governance gaps within established systems.This paper takes the case of marine genetic resource(MGRs)management in the Antarctic Treaty Area to explore how the BBNJ Agreement may address regulatory gaps in a competent governance framework.Due to shortcomings in addressing core issues,concerning the legal status of MGRs access regulations,benefit-sharing mechanisms,and disclosure of origin,the Agreement is unlikely to have a significant impact on the governance of MGRs in the Antarctic Treaty System(ATS)in the short term.On the other hand,the ATS,as an effective governance framework for the Antarctic Treaty Area,has mature regulations and practical experience in Antarctic governance.Over the years,the ATS has focused on regulating bioprospecting activities as scientific research ones and strict environmental impact assessment procedures.However,there has not been an effective consensus on the regulation of commercial biological prospecting.This paper further explores the coordination issue between the BBNJ Agreement and the ATS,suggesting that in the future,MGRs governance in the Antarctic Treaty Area may evolve into a polycentric governance system. 展开更多
关键词 BBNJ agreement Antarctic Treaty System(ATS) marine genetic resources(MGRs) polycentric governance
在线阅读 下载PDF
China’s Approach to Labor Provisions in Free Trade Agreements:Evolution,Impact,and Framework
12
作者 WU Wenfang HUANG Linhan JIANG Yu(Translated) 《The Journal of Human Rights》 2025年第2期341-369,共29页
Labor provisions have become a fundamental trade rule in regional and bilateral trade agreements.Although China’s legislation on pilot Free Trade Zones includes content related to labor protection,it primarily aligns... Labor provisions have become a fundamental trade rule in regional and bilateral trade agreements.Although China’s legislation on pilot Free Trade Zones includes content related to labor protection,it primarily aligns with labor indicators in“Doing Business”,the assessment of business situations issued by the World Bank.It differs from the labor rights protection focus emphasized in trade agreements.The latest strategic documents issued by the State Council of China have addressed this issue to fully achieve the goal of aligning Free Trade Zones with high-standard trade agreements.Building on the development of Free Trade Zone legislation and domestic labor law governance,China should proactively explore a tailored approach to labor provisions in Free Trade Agreements.In this approach,it should explicitly define the“baseline”and“ceiling”for labor provisions during negotiations and,within this framework,establish benchmarks for labor rights protection,enforcement mechanisms,and cross-border regulatory mechanisms suited to the specific conditions of the agreement parties. 展开更多
关键词 labor law governance pilot free trade zones free trade agreements labor standards China’s approach
原文传递
长处和困难问卷与儿童行为量表在12~16岁儿童中的一致性研究
13
作者 刘豫鑫 戴振威 +7 位作者 刘倩丽 杨曦 黄悦勤 贾存显 于红梅 张婷婷 姜雯 刘肇瑞 《中国心理卫生杂志》 北大核心 2026年第3期217-224,共8页
目的:检验儿童自评版长处和困难问卷(SDQ)与家长版Achenbach儿童行为量表(CBCL)在12~16岁青少年心理健康问题筛查中的一致性,为评估工具的合理选用及本土化评估体系完善提供依据。方法:于2024年9-11月选取山东省山东大学和内蒙古自治区通... 目的:检验儿童自评版长处和困难问卷(SDQ)与家长版Achenbach儿童行为量表(CBCL)在12~16岁青少年心理健康问题筛查中的一致性,为评估工具的合理选用及本土化评估体系完善提供依据。方法:于2024年9-11月选取山东省山东大学和内蒙古自治区通辽市12~16岁社区儿童及其家长共124对作为研究对象。通过儿童自评SDQ及家长评定CBCL评估青少年的心理健康问题,SDQ总分>15分及CBCL任一因子阳性提示存在心理健康问题。通过患者健康问卷(PHQ-9)和广泛性焦虑障碍问卷(GAD-7)检验效标关联效度。运用Spearman相关性分析、McNemar检验分析数据。结果:SDQ筛查出心理健康问题阳性率为40.3%(50/124);CBCL筛查阳性率为28.2%(35/124)。两种工具的总体一致率为50.81%,McNemar检验显示二者筛查结果无统计学关联(χ^(2)=3.21,P>0.05)。SDQ、CBCL得分与PHQ-9、GAD-7得分的相关性均无统计学意义(均P>0.05)。结论:儿童自评版SDQ与家长版CBCL在12~16岁青少年心理健康筛查中的一致性较弱,二者在核心情绪症状评估上缺乏足够效标关联效度。临床与科研实践中应审慎解读单一工具结果,同时需基于本土特征开发更精准的评估工具。 展开更多
关键词 青少年 心理健康 长处和困难问卷 ACHENBACH儿童行为量表 一致性
在线阅读 下载PDF
离婚财产协议对债权人撤销权规则的参照适用
14
作者 汪洋 林婉婷 《妇女研究论丛》 北大核心 2026年第1期112-128,共17页
离婚财产协议参照适用债权人撤销权规则时,首先须审查其属于有偿还是无偿行为。夫妻之间财产分割条款中基于《民法典》第1087条法定化的伦理因素、基于离婚救济制度的和解以及基于内部份额的财产交换安排均构成对价。涉及子女权益财产约... 离婚财产协议参照适用债权人撤销权规则时,首先须审查其属于有偿还是无偿行为。夫妻之间财产分割条款中基于《民法典》第1087条法定化的伦理因素、基于离婚救济制度的和解以及基于内部份额的财产交换安排均构成对价。涉及子女权益财产约定,若基于父母分担连带抚养义务则属有偿,若基于纯粹赠与则属无偿。在是否诈害债权的构成要件判断上,应对夫妻之间财产分割条款采取“应然—实然”的整体比较法,并协同考量夫妻之间财产分割条款与涉及子女权益财产约定。基于尽量减少内部财产安排干预以及保障未成年子女利益的理念,债权人撤销权的法律效果应予以修正,采用部分撤销和顺位撤销的规则。但在离婚财产协议中数项财产约定存在互为前提的紧密联系进而构成“整体的法律行为”时,部分撤销的效力应扩张到整体。 展开更多
关键词 离婚财产协议 离婚财产分割 债权人撤销权 诈害债权 参照适用
原文传递
区域贸易协定环境规则对企业出口产品范围的影响
15
作者 杨继军 郭欣然 《国际商务研究》 北大核心 2026年第1期16-30,共15页
本文基于2000~2015年中国工业企业数据库与中国海关进出口数据库,构建企业层面区域贸易协定环境规则综合深度指数,研究区域贸易协定环境规则对企业出口产品范围的影响。研究结果表明,区域贸易协定环境规则推动企业缩小了出口产品范围,... 本文基于2000~2015年中国工业企业数据库与中国海关进出口数据库,构建企业层面区域贸易协定环境规则综合深度指数,研究区域贸易协定环境规则对企业出口产品范围的影响。研究结果表明,区域贸易协定环境规则推动企业缩小了出口产品范围,这一结论在经过一系列内生性检验与稳健性检验后依然成立。机制检验结果表明,区域贸易协定环境规则通过增加企业生产经营成本与促进企业技术进步两条渠道推动企业缩小出口产品范围。异质性分析表明,区域贸易协定环境规则对经营能力强、融资约束高的企业缩小出口产品范围的推动作用更强。进一步分析表明,区域贸易协定环境规则有利于提高企业出口产品质量与企业全球价值链的嵌入度;政府效能强化了区域贸易协定环境规则对企业出口产品范围的影响。本文的研究结论对推动中国出口企业绿色转型、实现对外贸易高质量发展与碳达峰碳中和目标具有重要意义。 展开更多
关键词 区域贸易协定环境规则 企业出口产品范围 核心产品出口占比
在线阅读 下载PDF
面向6G的无线物理层安全认证与密钥协商技术综述
16
作者 王俊杰 毛丹丹 +2 位作者 韩刚涛 申凌峰 王宁 《移动通信》 2026年第1期25-34,共10页
在当前无线通信向6G万物智联演进的时代,海量终端接入与异构融合特性对安全机制提出轻量化与低开销的迫切需求。物理层认证与密钥协商作为构建无线通信安全的关键环节,为数据传输提供高效的前置保障:从物理层安全的角度先通过认证验证... 在当前无线通信向6G万物智联演进的时代,海量终端接入与异构融合特性对安全机制提出轻量化与低开销的迫切需求。物理层认证与密钥协商作为构建无线通信安全的关键环节,为数据传输提供高效的前置保障:从物理层安全的角度先通过认证验证通信方合法性,再借助密钥协商生成加密密钥。物理层认证机制兼具低时延与高可靠性,适于资源受限的智联场景;物理层密钥协商则基于信道、设备等多维特征生成密钥,减少对复杂密码体系的依赖。首先对物理层认证技术的主要研究方向进行了综述,包括基于数字标签嵌入的主动式方案与基于信道或设备特征的被动式方案,分别阐述其基本原理、发展脉络与性能指标;进而介绍了物理层安全密钥协商的基本思想,并重点分析基于多维特征的高效密钥协商方案。最后,结合6G万物智联对轻量化安全的需求,总结了物理层认证与密钥协商面临的关键挑战,并展望了未来研究方向与潜在解决路径。 展开更多
关键词 物理层安全 身份认证 内生特征 密钥协商 多维优势提取
在线阅读 下载PDF
契约治理背景下流域横向生态保护补偿制度的检视与完善
17
作者 孙海涛 刘意如 丁洁 《水利经济》 北大核心 2026年第1期68-76,共9页
基于《生态保护补偿条例》的要求和流域横向生态保护补偿制度的实践现状,当下以行政区划为基础的流域管理模式,难以满足生态系统的整体性保护需求。在此背景下,契约治理模式渐趋成为替代性方案及关键实施路径。契约治理将建构契约的自... 基于《生态保护补偿条例》的要求和流域横向生态保护补偿制度的实践现状,当下以行政区划为基础的流域管理模式,难以满足生态系统的整体性保护需求。在此背景下,契约治理模式渐趋成为替代性方案及关键实施路径。契约治理将建构契约的自我实现机制作为实现特定政策目标或进行公共事业管理的工具。鉴于广泛的实践需要,流域横向生态保护补偿制度的构建存在公众参与不足、补偿主体界定不清且范围受限、补偿标准欠妥和补偿方式单一等局限,制约了该制度的有效发挥和高效运行。因此,流域横向生态保护补偿制度的完善应着重于把生态补偿协议内容纳入事前主动公开的范围,在协议起草、实施阶段保障公众全程参与,适当将企业、居民等流域利益相关者纳入补偿主体,科学设定补偿标准,探索多元化的补偿方式,从而实现流域横向生态保护补偿工作的可持续发展。 展开更多
关键词 契约治理 流域横向生态保护补偿 补偿协议 流域环境管理
在线阅读 下载PDF
《民法典》体系下身份关系协议概念构造的解释论展开
18
作者 姜大伟 《辽宁师范大学学报(社会科学版)》 2026年第1期109-120,共12页
由于工具理性以及个人主义理念的浸润与影响,身份共同体成员订立并通过协议形塑和调适身份关系是身份秩序生成和维系的重要依据。《民法典》虽然对身份领域可协议事项予以碎片化确认,但并未对其内涵及外延给予概念化界定。廓清身份关系... 由于工具理性以及个人主义理念的浸润与影响,身份共同体成员订立并通过协议形塑和调适身份关系是身份秩序生成和维系的重要依据。《民法典》虽然对身份领域可协议事项予以碎片化确认,但并未对其内涵及外延给予概念化界定。廓清身份关系协议的确切所指,是正确理解和适用涉身份关系协议规范的基础前提。就内涵而言,身份关系协议是身份人以合意为基础缔结的发生身份法效果的协议;就外延而言,身份关系协议包括纯粹的身份关系协议以及附随身份的财产协议。同居关系协议宜目的性扩张解释为身份关系协议。没有受法律拘束的效果意思的身份合意不是身份关系协议,不为身份法所评价。 展开更多
关键词 身份关系协议 概念构造 体系解释
在线阅读 下载PDF
劳动力市场中互不挖角协议的反垄断法规制
19
作者 曹明睿 郑娅翠 《哈尔滨学院学报》 2026年第1期54-58,共5页
在现代市场经济中,企业间达成的互不挖角协议旨在稳定企业的人才队伍,并减少因人才流失带来的成本增加与生产不稳定性,但同时对劳动力自由流动构成了挑战。文章深入探讨互不挖角协议的表现形式、类型及其产生的反竞争效果,分析提出需要... 在现代市场经济中,企业间达成的互不挖角协议旨在稳定企业的人才队伍,并减少因人才流失带来的成本增加与生产不稳定性,但同时对劳动力自由流动构成了挑战。文章深入探讨互不挖角协议的表现形式、类型及其产生的反竞争效果,分析提出需要在我国现行法律框架下以反垄断法对互补挖角协议进行分类规制,并引入集体诉讼促进劳动力市场健康发展。 展开更多
关键词 互不挖角协议 反垄断法 劳动力市场 竞争效应
在线阅读 下载PDF
从“旧金山和约”到“冲绳协定”:战后东亚国际秩序乱源分析
20
作者 杨伯江 曹煜雯 《东北亚论坛》 北大核心 2026年第2期3-17,127,共16页
二战后期,同盟国领袖通过开罗会议、德黑兰会议、雅尔塔会议和波茨坦会议等一系列重要会议擘画战后国际体系蓝图,构建起以联合国为制度核心、以《联合国宪章》为价值原则、以国际法文件为法理柱石的战后国际秩序框架,以期在严惩法西斯... 二战后期,同盟国领袖通过开罗会议、德黑兰会议、雅尔塔会议和波茨坦会议等一系列重要会议擘画战后国际体系蓝图,构建起以联合国为制度核心、以《联合国宪章》为价值原则、以国际法文件为法理柱石的战后国际秩序框架,以期在严惩法西斯主义、军国主义战争罪行基础上永绝战祸、永葆世界和平。然而,在东西方冷战背景下,1951年“旧金山和约”通过以“片面媾和”取代“全面和解”、以“双边交易”取代“吾人决定”、以“单独控制”取代“联合国托管”、以“冷战利益”取代“战争惩戒”,为战后东亚埋下了持续发酵与外溢的争端之种。1971年美日“冲绳协定”作为非法和约的延伸,以施政权移交的名义实践且固化了“旧金山和约”中的争议性安排,通过制度化与制造“既成事实”的方式将地缘政治风险嵌入东亚政治安全格局的运行之中,形成了本地区在地缘政治、安全结构、领土法理与地区关系上的“病灶”。由此,战后东亚地缘政治格局朝着有利于美日的方向改变,冲绳被置于非法控制之下,钓鱼岛争端成为中日关系难解之结。新形势下,伴随大国博弈激化,“旧金山和约”与“冲绳协定”制造出的问题在地区权力结构变动下被重新激活并升级成为新的冲突,不断挑战域内国家关系及地区和平稳定。 展开更多
关键词 “旧金山和约” 旧金山体制 “冲绳协定” 东亚秩序 合法性缺陷
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部