期刊文献+
共找到9,616篇文章
< 1 2 250 >
每页显示 20 50 100
Repeatability,reproducibility,and agreement regarding measurement of choroidal vascularity index between OCT and OCT angiography
1
作者 Mu-Han Zhong Jia-Li Zhang +5 位作者 Ke-Xin Yu Shu-Qi Fan Xue Li Hao Chen Jin-Hua Bao Ying-Ying Huang 《International Journal of Ophthalmology(English edition)》 2026年第3期498-508,共11页
AIM:To explore the repeatability,reproducibility,and agreement in the measurement of the choroidal vascularity index(CVI)for different swept-source optical coherence tomography(OCT)devices and between OCT and OCT angi... AIM:To explore the repeatability,reproducibility,and agreement in the measurement of the choroidal vascularity index(CVI)for different swept-source optical coherence tomography(OCT)devices and between OCT and OCT angiography(OCTA)images.METHODS:Two swept-source OCT imaging systems,VG200I and Topcon DRI OCT Triton,were used to capture OCT and OCTA images in triplicate.The first and third images were taken by one operator,and the second image was taken by another operator.The built-in software was used to calculate the CVI from the OCTA images(CVI-OCTA),and a custom-designed algorithm was used to calculate the CVI from the OCT images(CVI-OCT).Repeatability and reproducibility were assessed with the intraclass correlation coefficient(ICC),and agreement between devices and between OCT and OCTA were evaluated with Bland-Altman analysis.RESULTS:Sixty-eight eyes from 35 adults(17 females)were included in the analysis.The average age of the participants was 23.6±2.3y,with an average spherical equivalent refraction of-3.08±2.47 D and an average AL of 25.21±1.20 mm.Both OCT devices demonstrated high repeatability and reproducibility in measuring the CVI-OCTA(all ICCs>0.894 across five choroidal regions)and CVI-OCT(all ICCs>0.838).Furthermore,the between-device agreement in measuring the CVI-OCT was good[mean difference(MD)ranging from-2.32%to-3.07%],but that in measuring the CVI-OCTA was poor(MD,1.48%to-7.43%).Additionally,the between-imaging agreement(CVI-OCTA versus CVI-OCT)was poor for both devices(Triton,MD,6.05%to 12.68%;VG200I,MD,6.67%to 12.09%).CONCLUSION:Both OCT devices and the two analytical methods demonstrate good stability.The inter-device consistency of CVI-OCT is good,while the inter-device consistency of CVI-OCTA and the consistency between the two analytical methods in the same device are both poor. 展开更多
关键词 choroidal vascularity index optical coherence tomography angiography agreement
原文传递
The Next Chapter of China-ASEAN Free Trade Agreement
2
《China Report ASEAN》 2026年第2期16-17,共2页
The dedicated freight channel at the Youyiguan Border Gate in south China’s Guangxi Zhuang Autonomous Region buzzes with activity as trucks loaded with export goods move steadily through customs.Thanks to a system up... The dedicated freight channel at the Youyiguan Border Gate in south China’s Guangxi Zhuang Autonomous Region buzzes with activity as trucks loaded with export goods move steadily through customs.Thanks to a system upgraded at the start of 2026,clearance personnel at this China-Vietnam crossing simply place an order online,and the entire process is handled almost instantly via an intelligent platform.Adding to the efficiency,the border gate also features dedicated lanes that support driverless container trucks. 展开更多
关键词 export goods freight channel intelligent platformadding China ASEAN Free Trade agreement driverless container trucks Guangxi Zhuang Autonomous Region customs clearance border gate
在线阅读 下载PDF
Database of Clause Depth of China’s Regional Trade Agreement and Its Characteristics
3
作者 Jin Sun Ruixian Chen 《Proceedings of Business and Economic Studies》 2025年第4期345-359,共15页
This paper analyzes the text of 3261 clauses of 20 RTAs signed by China,classifies them into 52 policy areas according to the international mainstream HMS method,and assigns them through coding.The clause depth of Ch... This paper analyzes the text of 3261 clauses of 20 RTAs signed by China,classifies them into 52 policy areas according to the international mainstream HMS method,and assigns them through coding.The clause depth of China’s RTAs is measured across three-dimensional systems(policy areas,clauses,and core clauses)and two generations of trade policy areas(WTO+,WTO-X,and all policy areas).It is observed that China’s RTAs exhibit greater depth in Industrial Products,Agricultural Products,TBT,Antidumping,Countervailing,and Investment,while showing comparatively less depth in Fiscal Policy,Innovation Policies,and related areas. 展开更多
关键词 Regional trade agreement Clause depth Database construction agreement text
在线阅读 下载PDF
CD-AKA-IoV:A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle
4
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第10期1715-1732,共18页
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi... With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency. 展开更多
关键词 AUTHENTICATION key agreement IoV cross-domain
在线阅读 下载PDF
Light-Weighted Mutual Authentication and Key Agreement in V2N VANET
5
作者 Yanan Liu Lei Cao +3 位作者 Zheng Zhang Ge Li Shuo Qiu Suhao Wang 《Computers, Materials & Continua》 2025年第9期4997-5019,共23页
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari... As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience. 展开更多
关键词 KERBEROS PUF AUTHENTICATION key agreement VANET
在线阅读 下载PDF
A Review and Outlook of Bilateral Eco-nomic and Trade Cooperation Against the Backdrop of the 20th Anniversary of the China-Chile Free Trade Agreement
6
作者 Gao Shujun Lu Yao 《China's Foreign Trade》 2025年第5期44-52,共9页
Chile,a pioneer and benchmark partner for China's free trade.cooperation in Latin America,holds a special position in China-Latin America economic and trade relations.It was the first Latin American country to sig... Chile,a pioneer and benchmark partner for China's free trade.cooperation in Latin America,holds a special position in China-Latin America economic and trade relations.It was the first Latin American country to sign a bilateral free trade agreement with China and the first to reach an upgraded protocol.Chile also established mutual recognition of Authorized Economic Operators(AEO)with China,the first country in South America to do so. 展开更多
关键词 mutual recognition authorized economic operators aeo bilateral free trade agreement Latin America AEO authorized economic operators bilateral economic cooperation trade agreement China Chile FTA
在线阅读 下载PDF
Policy coherence analysis of Türkiye’s lignite production and the Paris agreement ratification:an investigation through the water‑energy‑climate nexus
7
作者 Suleyman O.Altiparmak 《International Journal of Coal Science & Technology》 2025年第2期52-67,共16页
Lignite provides energy security and contributes economically.However,it also causes dirty outcomes in terms of climate aspect.In addition to the energy and climate dimensions of the Sustainable Development Goals,ther... Lignite provides energy security and contributes economically.However,it also causes dirty outcomes in terms of climate aspect.In addition to the energy and climate dimensions of the Sustainable Development Goals,there is also a water issue:lignite is usually found submerged below the local groundwater tables.Mining lignite could be exploited to achieve drinkable and agriculturally usable water.In today’s literature,while the impact of lignite production on global warming and emissions are already highly discussed,the water management side of the issue is regularly omitted.However,considering the complex interlink between these three areas(the Water-Energy-Climate(WEC)nexus)is necessary within policy coherence,which is mostly ignored even though it is one of the development targets.Here in this framework,Turkiye,which aims to reduce its heavy dependency on energy imports,is worth studying because almost all of its coal,the country’s largest fossil resource,is lignite.Therefore,this study examines the WEC nexus related to lignite production and combustion and seeks policy coherence between their outputs in the context of Turkiye’s historical steps to climate change mitigation,specifically oriented with the Paris Agreement.This story expands from the absence of specific development policy objectives to the practicalities of politics and economics. 展开更多
关键词 Turkiye LIGNITE Water-energy-climate(WEC)nexus Paris agreement Sustainable development goals
在线阅读 下载PDF
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
8
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
9
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
Quantum-resistant dynamic authenticated group key agreement scheme for the Internet of Things
10
作者 JIANG Rui XU Tengyu 《Journal of Southeast University(English Edition)》 2025年第3期392-400,共9页
With the recent advances in quantum computing,the key agreement algorithm based on traditional cryptography theory,which is applied to the Internet of Things(IoT)scenario,will no longer be secure due to the possibilit... With the recent advances in quantum computing,the key agreement algorithm based on traditional cryptography theory,which is applied to the Internet of Things(IoT)scenario,will no longer be secure due to the possibility of information leakage.In this paper,we propose a anti-quantum dynamic authenticated group key agreement scheme(AQDA-GKA)according to the ring-learning with errors(RLWE)problem,which is suitable for IoT environments.First,the proposed AQDA-GKA scheme can implement a group key agreement against quantum computing attacks by leveraging an RLWE-based key agreement mechanism.Second,this scheme can achieve dynamic node management,ensuring that any node can freely join or exit the current group.Third,we formally prove that the proposed scheme can resist quantum computing attacks as well as collusion attacks.Finally,the performance and security analysis reveals that the proposed AQDA-GKA scheme is secure and effective. 展开更多
关键词 group key agreement lattice-based cryptogra-phy dynamic authentication collusion attack resistance Internet of Things
在线阅读 下载PDF
A hyperelliptic curve-based authenticated key agreement scheme for unmanned aerial vehicles in cross-domain environments
11
作者 Muhammad Asghar KHAN Insaf ULLAH +2 位作者 Haralambos MOURATIDIS Abdulmajeed ALQHATANI Pascal LORENZ 《Chinese Journal of Aeronautics》 2025年第10期245-259,共15页
Unmanned Aerial Vehicles(UAVs)are increasingly recognized for their pivotal role in military and civilian applications,serving as essential technology for transmitting,evaluating,and gathering information.Unfortunatel... Unmanned Aerial Vehicles(UAVs)are increasingly recognized for their pivotal role in military and civilian applications,serving as essential technology for transmitting,evaluating,and gathering information.Unfortunately,this crucial process often occurs through unsecured wireless connections,exposing it to numerous cyber-physical attacks.Furthermore,UAVs’limited onboard computing resources make it challenging to perform complex cryptographic operations.The main aim of constructing a cryptographic scheme is to provide substantial security while reducing the computation and communication costs.This article introduces an efficient and secure cross-domain Authenticated Key Agreement(AKA)scheme that uses Hyperelliptic Curve Cryptography(HECC).The HECC,a modified version of ECC with a smaller key size of 80 bits,is well-suited for use in UAVs.In addition,the proposed scheme is employed in a cross-domain environment that integrates a Public Key Infrastructure(PKI)at the receiving end and a Certificateless Cryptosystem(CLC)at the sending end.Integrating CLC with PKI improves network security by restricting the exposure of encryption keys only to the message’s sender and subsequent receiver.A security study employing ROM and ROR models,together with a comparative performance analysis,shows that the proposed scheme outperforms comparable existing schemes in terms of both efficiency and security. 展开更多
关键词 Computation cost Cross-domain authentication Hyperelliptic curve cryptography Key agreement ROM ROR SECURITY Unmanned aerial vehicles
原文传递
Evaluating the impact of the BBNJ Agreement on regulatory gaps in a competent IFB:a case study of MGRs management in the Antarctic Treaty Area
12
作者 PAN Min 《Advances in Polar Science》 2025年第3期203-212,共10页
On 19 June 2023,the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction(BBNJ Agreement)was a... On 19 June 2023,the Agreement under the United Nations Convention on the Law of the Sea on the Conservation and Sustainable Use of Marine Biological Diversity of Areas beyond National Jurisdiction(BBNJ Agreement)was adopted.The BBNJ Agreement aims to regulate the conservation and sustainable use of marine biodiversity in areas beyond national jurisdiction,including the high seas and the international seabed area.The BBNJ Agreement enters into an already crowded institutional landscape as a global authority with broad objectives,inevitably interacting with existing institutions,frameworks,and bodies(IFBs).Existing research has primarily focused on two areas:the first examines the impact of the institutions established by the BBNJ Agreement on existing marine governance IFBs;the second explores its influence on issues currently lacking institutional arrangements.However,comparatively little attention has been given to the Agreement’s potential impact on governance gaps within established systems.This paper takes the case of marine genetic resource(MGRs)management in the Antarctic Treaty Area to explore how the BBNJ Agreement may address regulatory gaps in a competent governance framework.Due to shortcomings in addressing core issues,concerning the legal status of MGRs access regulations,benefit-sharing mechanisms,and disclosure of origin,the Agreement is unlikely to have a significant impact on the governance of MGRs in the Antarctic Treaty System(ATS)in the short term.On the other hand,the ATS,as an effective governance framework for the Antarctic Treaty Area,has mature regulations and practical experience in Antarctic governance.Over the years,the ATS has focused on regulating bioprospecting activities as scientific research ones and strict environmental impact assessment procedures.However,there has not been an effective consensus on the regulation of commercial biological prospecting.This paper further explores the coordination issue between the BBNJ Agreement and the ATS,suggesting that in the future,MGRs governance in the Antarctic Treaty Area may evolve into a polycentric governance system. 展开更多
关键词 BBNJ agreement Antarctic Treaty System(ATS) marine genetic resources(MGRs) polycentric governance
在线阅读 下载PDF
China’s Approach to Labor Provisions in Free Trade Agreements:Evolution,Impact,and Framework
13
作者 WU Wenfang HUANG Linhan JIANG Yu(Translated) 《The Journal of Human Rights》 2025年第2期341-369,共29页
Labor provisions have become a fundamental trade rule in regional and bilateral trade agreements.Although China’s legislation on pilot Free Trade Zones includes content related to labor protection,it primarily aligns... Labor provisions have become a fundamental trade rule in regional and bilateral trade agreements.Although China’s legislation on pilot Free Trade Zones includes content related to labor protection,it primarily aligns with labor indicators in“Doing Business”,the assessment of business situations issued by the World Bank.It differs from the labor rights protection focus emphasized in trade agreements.The latest strategic documents issued by the State Council of China have addressed this issue to fully achieve the goal of aligning Free Trade Zones with high-standard trade agreements.Building on the development of Free Trade Zone legislation and domestic labor law governance,China should proactively explore a tailored approach to labor provisions in Free Trade Agreements.In this approach,it should explicitly define the“baseline”and“ceiling”for labor provisions during negotiations and,within this framework,establish benchmarks for labor rights protection,enforcement mechanisms,and cross-border regulatory mechanisms suited to the specific conditions of the agreement parties. 展开更多
关键词 labor law governance pilot free trade zones free trade agreements labor standards China’s approach
原文传递
长处和困难问卷与儿童行为量表在12~16岁儿童中的一致性研究
14
作者 刘豫鑫 戴振威 +7 位作者 刘倩丽 杨曦 黄悦勤 贾存显 于红梅 张婷婷 姜雯 刘肇瑞 《中国心理卫生杂志》 北大核心 2026年第3期217-224,共8页
目的:检验儿童自评版长处和困难问卷(SDQ)与家长版Achenbach儿童行为量表(CBCL)在12~16岁青少年心理健康问题筛查中的一致性,为评估工具的合理选用及本土化评估体系完善提供依据。方法:于2024年9-11月选取山东省山东大学和内蒙古自治区通... 目的:检验儿童自评版长处和困难问卷(SDQ)与家长版Achenbach儿童行为量表(CBCL)在12~16岁青少年心理健康问题筛查中的一致性,为评估工具的合理选用及本土化评估体系完善提供依据。方法:于2024年9-11月选取山东省山东大学和内蒙古自治区通辽市12~16岁社区儿童及其家长共124对作为研究对象。通过儿童自评SDQ及家长评定CBCL评估青少年的心理健康问题,SDQ总分>15分及CBCL任一因子阳性提示存在心理健康问题。通过患者健康问卷(PHQ-9)和广泛性焦虑障碍问卷(GAD-7)检验效标关联效度。运用Spearman相关性分析、McNemar检验分析数据。结果:SDQ筛查出心理健康问题阳性率为40.3%(50/124);CBCL筛查阳性率为28.2%(35/124)。两种工具的总体一致率为50.81%,McNemar检验显示二者筛查结果无统计学关联(χ^(2)=3.21,P>0.05)。SDQ、CBCL得分与PHQ-9、GAD-7得分的相关性均无统计学意义(均P>0.05)。结论:儿童自评版SDQ与家长版CBCL在12~16岁青少年心理健康筛查中的一致性较弱,二者在核心情绪症状评估上缺乏足够效标关联效度。临床与科研实践中应审慎解读单一工具结果,同时需基于本土特征开发更精准的评估工具。 展开更多
关键词 青少年 心理健康 长处和困难问卷 ACHENBACH儿童行为量表 一致性
在线阅读 下载PDF
区际行政合作协议履行纠纷的诉讼化解——兼论区域协调作为检察公益诉讼的独立类型
15
作者 叶必丰 《东方法学》 北大核心 2026年第1期189-200,共12页
区际行政合作协议是不同行政区的行政机关之间为实现区域合作,经协商一致所达成的一种对等行政协议,可以分为财产性合作协议和非财产性合作协议、双务合作协议和涉他合作协议、法定义务的合作协议和约定义务的合作协议。其履行除了取决... 区际行政合作协议是不同行政区的行政机关之间为实现区域合作,经协商一致所达成的一种对等行政协议,可以分为财产性合作协议和非财产性合作协议、双务合作协议和涉他合作协议、法定义务的合作协议和约定义务的合作协议。其履行除了取决于缔约主体外,还受行政层级制度、相对人以及客观情况的制约。对此,有关国家建立了符合本国国情的区际行政合作协议诉讼制度。基于中立性和专业性需求,我国的区际行政合作协议纠纷也应该允许由法院解决。但当前,《行政诉讼法》规定的行政协议不包括区际行政合作协议,《检察公益诉讼法(草案)》亦未列举规定区际行政合作协议或区际合作,故公益诉讼范围不能全面涵摄区际行政合作协议。区际行政合作协议是对国家义务的协同履行,保障区际合作是维护宪法和法律所规定的公共利益。因此,有必要把区际行政合作协议纠纷纳入公益诉讼范围。同时从实践观察,只有将区域协调作为检察公益诉讼的独立类型,才能全面保障区域协调国家义务的履行。 展开更多
关键词 区际合作 区际行政合作协议 区域协调 行政协议 纠纷解决 公益诉讼
在线阅读 下载PDF
美国在《预防中北冰洋不管制公海渔业协定》谈判中的战略逻辑及其启示
16
作者 桂静 王碧莹 张建辉 《浙江海洋大学学报(人文科学版)》 2026年第1期35-44,共10页
《预防中北冰洋不管制公海渔业协定》是管理中北冰洋公海商业性捕鱼活动的第一份具有法律约束力的国际协议。该协定谈判过程中,美国是一个不可忽视的因素。美国通过各种国际平台包括联大会议、北极理事会及其他多边场合,寻求其国内渔业... 《预防中北冰洋不管制公海渔业协定》是管理中北冰洋公海商业性捕鱼活动的第一份具有法律约束力的国际协议。该协定谈判过程中,美国是一个不可忽视的因素。美国通过各种国际平台包括联大会议、北极理事会及其他多边场合,寻求其国内渔业管理制度措施适用向国际社会延伸。美国在推动北冰洋渔业国际合作的同时,形成了对北冰洋公海渔业治理一定的主导地位。美国推动该协定谈判最直接的驱动因素是本国渔业利益,而实施国内北极政策与获取北极治理国际引领力也是重要的考量。《BBNJ协定》是当前国际海洋治理备受瞩目的协议,其中公海保护区划设机制与中北冰洋公海密切关联。鉴于美国在《预防中北冰洋不管制公海渔业协定》谈判过程中形成的主导优势,它对未来《BBNJ协定》的实施及各相关方的利益关切将产生一定的影响。 展开更多
关键词 《预防中北冰洋不管制公海渔业协定》 《BBNJ协定》 北极理事会 渔业利益
在线阅读 下载PDF
对赌协议业绩补偿税法规范论
17
作者 张世明 《政法论丛》 北大核心 2026年第2期51-67,共17页
基于金融恒等性理论,金融产品之间的经济价值可以通过重组创造出彼此相当。对赌协议并不能与价格调整机制混为一谈,不仅与真正意义上的估值调整模式具有异质性,而且与股权转让交易价格调整本身无关联性。中国对赌协议本质上是一种降低... 基于金融恒等性理论,金融产品之间的经济价值可以通过重组创造出彼此相当。对赌协议并不能与价格调整机制混为一谈,不仅与真正意义上的估值调整模式具有异质性,而且与股权转让交易价格调整本身无关联性。中国对赌协议本质上是一种降低风险的对冲策略,正向对赌与反向对赌之间现金流改变的经济实质,使两者适用的税法规则截然不同。对赌协议业绩补偿是否构成课税要件事实有必要从法教义学角度按照税收构成要件进行规范分析,归纳出明确的处理规则以定分止争。税收属性不同产生不同税务处理,对赌协议业绩调整税法处理构成两层阶梯式识别的顺位。对赌协议业绩补偿宁无税乎?答案应该是否定的。 展开更多
关键词 对赌协议 业绩补偿 所得税 对冲交易 税收构成要件
在线阅读 下载PDF
反垄断法视角下“内卷式”竞争的治理
18
作者 李剑 胡寅 《山东大学学报(哲学社会科学版)》 北大核心 2026年第2期163-173,共11页
“内卷式”竞争现象的出现对反垄断法的基本价值和执法必要性形成了挑战。“内卷式”竞争的特征在于供需结构性失衡、产品高度同质化以及竞争结果的无效性乃至负面性。在反垄断法框架内,可以通过垄断协议豁免、经营者集中以及公平竞争... “内卷式”竞争现象的出现对反垄断法的基本价值和执法必要性形成了挑战。“内卷式”竞争的特征在于供需结构性失衡、产品高度同质化以及竞争结果的无效性乃至负面性。在反垄断法框架内,可以通过垄断协议豁免、经营者集中以及公平竞争审查等路径治理“内卷式”竞争。然而,不同治理工具在功能定位、风险程度以及可操作性方面各有差异,执法机构应当建立各路径适用的优先顺位并加快完善垄断协议豁免规则。“内卷式”竞争与反垄断理论不存在冲突,也不会削弱反垄断执法的必要性。反垄断法已经充分展现了市场结构、行为、绩效之间的复杂关联,并为应对“内卷式”竞争提供了充足的制度工具。积极、稳健的反垄断执法有助于打破质疑并推动市场尽快走出“内卷”困境。 展开更多
关键词 “内卷式”竞争 反垄断法 垄断协议豁免 经营者集中 公平竞争审查
在线阅读 下载PDF
离婚财产协议对债权人撤销权规则的参照适用
19
作者 汪洋 林婉婷 《妇女研究论丛》 北大核心 2026年第1期112-128,共17页
离婚财产协议参照适用债权人撤销权规则时,首先须审查其属于有偿还是无偿行为。夫妻之间财产分割条款中基于《民法典》第1087条法定化的伦理因素、基于离婚救济制度的和解以及基于内部份额的财产交换安排均构成对价。涉及子女权益财产约... 离婚财产协议参照适用债权人撤销权规则时,首先须审查其属于有偿还是无偿行为。夫妻之间财产分割条款中基于《民法典》第1087条法定化的伦理因素、基于离婚救济制度的和解以及基于内部份额的财产交换安排均构成对价。涉及子女权益财产约定,若基于父母分担连带抚养义务则属有偿,若基于纯粹赠与则属无偿。在是否诈害债权的构成要件判断上,应对夫妻之间财产分割条款采取“应然—实然”的整体比较法,并协同考量夫妻之间财产分割条款与涉及子女权益财产约定。基于尽量减少内部财产安排干预以及保障未成年子女利益的理念,债权人撤销权的法律效果应予以修正,采用部分撤销和顺位撤销的规则。但在离婚财产协议中数项财产约定存在互为前提的紧密联系进而构成“整体的法律行为”时,部分撤销的效力应扩张到整体。 展开更多
关键词 离婚财产协议 离婚财产分割 债权人撤销权 诈害债权 参照适用
原文传递
区域贸易协定环境规则对企业出口产品范围的影响
20
作者 杨继军 郭欣然 《国际商务研究》 北大核心 2026年第1期16-30,共15页
本文基于2000~2015年中国工业企业数据库与中国海关进出口数据库,构建企业层面区域贸易协定环境规则综合深度指数,研究区域贸易协定环境规则对企业出口产品范围的影响。研究结果表明,区域贸易协定环境规则推动企业缩小了出口产品范围,... 本文基于2000~2015年中国工业企业数据库与中国海关进出口数据库,构建企业层面区域贸易协定环境规则综合深度指数,研究区域贸易协定环境规则对企业出口产品范围的影响。研究结果表明,区域贸易协定环境规则推动企业缩小了出口产品范围,这一结论在经过一系列内生性检验与稳健性检验后依然成立。机制检验结果表明,区域贸易协定环境规则通过增加企业生产经营成本与促进企业技术进步两条渠道推动企业缩小出口产品范围。异质性分析表明,区域贸易协定环境规则对经营能力强、融资约束高的企业缩小出口产品范围的推动作用更强。进一步分析表明,区域贸易协定环境规则有利于提高企业出口产品质量与企业全球价值链的嵌入度;政府效能强化了区域贸易协定环境规则对企业出口产品范围的影响。本文的研究结论对推动中国出口企业绿色转型、实现对外贸易高质量发展与碳达峰碳中和目标具有重要意义。 展开更多
关键词 区域贸易协定环境规则 企业出口产品范围 核心产品出口占比
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部