期刊文献+
共找到2,471篇文章
< 1 2 124 >
每页显示 20 50 100
Slope rockbolting using key block theory:Force transfer and artificial intelligence-assisted multi-objective optimisation
1
作者 Jessica Ka Yi Chiu Charlie Chunlin Li +1 位作者 Ole Jakob Mengshoel Vidar Kveldsvik 《Journal of Rock Mechanics and Geotechnical Engineering》 2026年第1期73-91,共19页
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u... This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility. 展开更多
关键词 Rock anchoring Slope stability 3D modelling key block Parametric design Bio-inspired artificial intelligence(AI)
在线阅读 下载PDF
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
2
《China Rare Earth Information》 2025年第2期F0002-F0002,共1页
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.
关键词 key laboratories State key Laboratory rare earth resource National key Laboratories Baiyun Obo Rare Earth Resources Ministry Science Technology Comprehensive Utilization key laboratory
在线阅读 下载PDF
Practical 15 Mb/s Quantum Key Distribution Using Compact Single-Photon Detectors
3
作者 Tingting Shi Zhengyu Yan +4 位作者 Yuanbin Fan Lai Zhou Yuanfei Gao Davide G.Marangon Zhiliang Yuan 《Chinese Physics Letters》 2025年第12期172-177,共6页
Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key r... Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key rate(SKR),which is a critical factor for real-world applications.Herein,we report a practical QKD system,equipped with compact gated InGaAs/InP single-photon detectors(SPDs),that can generate a high SKR of 15.2 Mb/s with a channel loss of 2 dB.This exceptional performance stems from the ultra-low afterpulsing probability of the SPDs,which significantly reduces the bit error rate in the QKD system.The typical quantum bit error rate is 1.3%.The results validate the feasibility of an integrated,practical QKD system and offer a reliable solution for the future development of real-world QKD networks. 展开更多
关键词 quantum key distribution qkd afterpulsing probability secure key rate quantum key distribution single photon detectors secure key rate skr which bit error rate
原文传递
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
4
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
5
《China Rare Earth Information》 2025年第4期F0002-F0002,共1页
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la... State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization. 展开更多
关键词 key laboratories rare earth resource Ministry Science Technology state key laboratory Baiyun Obo rare earth resource researches comprehensive utilization reconstruction national key laboratories
在线阅读 下载PDF
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
6
《China Rare Earth Information》 2025年第1期F0002-F0002,共1页
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la... State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization. 展开更多
关键词 key laboratories rare earth resource Ministry Science Technology state key laboratory Baiyun Obo rare earth resource researches comprehensive utilization rare earth resources reconstruction national key laboratories
在线阅读 下载PDF
A knowledge-data dually driven paradigm for accurate identification of key blocks in complex rock slopes
7
作者 Xiaoyu Qi Han Meng +2 位作者 Nengxiong Xu Gang Mei Jianbing Peng 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第6期3726-3746,共21页
Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impair... Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impairs the ability to characterize complex rock slopes accurately and inhibits the identification of key blocks.In this paper,a knowledge-data dually driven paradigm for accurate identification of key blocks in complex rock slopes is proposed.Our basic idea is to integrate key block theory into data-driven models based on finely characterizing structural features to identify key blocks in complex rock slopes accurately.The proposed novel paradigm consists of(1)representing rock slopes as graph-structured data based on complex systems theory,(2)identifying key nodes in the graph-structured data using graph deep learning,and(3)mapping the key nodes of graph-structured data to corresponding key blocks in the rock slope.Verification experiments and real-case applications are conducted by the proposed method.The verification results demonstrate excellent model performance,strong generalization capability,and effective classification results.Moreover,the real case application is conducted on the northern slope of the Yanqianshan Iron Mine.The results show that the proposed method can accurately identify key blocks in complex rock slopes,which can provide a decision-making basis and rational recommendations for effective support and instability prevention of rock slopes,thereby ensuring the stability of rock engineering and the safety of life and property. 展开更多
关键词 key blocks identification Rock slope stability key block theory Knowledge-data dually driven Graph deep learning
在线阅读 下载PDF
Mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states
8
作者 Zhigang Shen Yuting Lu +1 位作者 Yang Yu Shengmei Zhao 《Chinese Physics B》 2025年第9期57-64,共8页
A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralde... A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack. 展开更多
关键词 mode-pairing quantum key distribution heralded pair-coherent source passive decoy-state key generation rate
原文传递
Multi-protocol quantum key distribution decoding chip
9
作者 Chun-Xue Zhang Jian-Guang Li +3 位作者 Yue Wang Wei Chen Jia-Shun Zhang Jun-Ming An 《Chinese Physics B》 2025年第5期34-41,共8页
Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca... Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks. 展开更多
关键词 quantum key distribution(QKD) secure key rate decoding chip quantum bit error rate
原文传递
Mode-pairing quantum key distribution with multi-step advantage distillation
10
作者 Shizhuo Li Xin Liu +1 位作者 Zhenrong Zhang Kejin Wei 《Chinese Physics B》 2025年第9期85-95,共11页
The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)prot... The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate. 展开更多
关键词 mode-pairing quantum key distribution multi-step advantage distillation secret key rate
原文传递
融合代理重加密和零知识证明的USBKey联盟链追溯系统 被引量:2
11
作者 张磊 万昕元 +3 位作者 肖超恩 王建新 邓昊东 郑玉崝 《信息安全研究》 北大核心 2025年第1期81-90,共10页
目前,基于区块链技术的信息追溯系统在物联网领域中得到了广泛应用.但是,基于区块链的追溯系统在追溯数据存储和查询的过程中存在数据及用户隐私泄露的风险.针对此类问题,融合代理重加密和零知识证明技术,设计了基于联盟链构造的USB Ke... 目前,基于区块链技术的信息追溯系统在物联网领域中得到了广泛应用.但是,基于区块链的追溯系统在追溯数据存储和查询的过程中存在数据及用户隐私泄露的风险.针对此类问题,融合代理重加密和零知识证明技术,设计了基于联盟链构造的USB Key可信追溯解决方案.首先,在区块链上链存储过程中引入了星际文件系统(interplanetary file system,IPFS)和代理重加密技术,为参与双方建立了一个安全、高效的信息存储机制;同时,在数据查询过程中引入了zk-SNARK零知识证明机制,对查询用户进行身份认证和确权操作,确保了追溯数据查询过程中用户身份的私密性;最后,基于上述可信追溯解决方案,利用Hyperledger Fabric分布式账本实现了一个USB Key的信息追溯原型系统.通过实验,证明了该方案切实可行,并有效地保障了USB Key追溯系统中追溯信息的保密性和真实性,以及在实现权限分配的前提下用户身份的隐私性. 展开更多
关键词 USB key 代理重加密 零知识证明 区块链 信息追溯
在线阅读 下载PDF
Aerodynamic uplift force improvement in single-strip high-speed pantograph via key parameter regulation with mechanism investigation 被引量:1
12
作者 Yafeng Zou Xianghong Xu +2 位作者 Rui Zhou Zichen Liu Liming Lin 《Theoretical & Applied Mechanics Letters》 2025年第4期378-387,共10页
This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to... This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to evaluate the influence of key geometric parameters on aerodynamic characteristics,culminating in two targeted adjustment strategies.The reliability of the computational methodology was validated through comparative analysis,which revealed less than a 6%deviation in aerodynamic drag between the numerical simulations and wind tunnel tests.Aerodynamic decomposition revealed that the operating direction critically impacts the uplift force,which is governed by two factors:streamwise cross-strip positioning and the angular orientation of the arm hinge.These factors collectively determine the divergent aerodynamic responses of the panhead and frame during directional changes.By establishing a parametric database encompassing four strip-to-crossbar spacing configurations and six arm diameter variations,nonlinear response patterns of the uplift forces under different operating directions to geometric modifications were quantified.Both adjustment approaches,simultaneously reducing both streamwise and vertical strip-to-crossbar spacings to half of the original dimensions or increasing the upper arm spanwise diameter to 1.45 times and decreasing the lower arm spanwise diameter to 0.55 times the baseline values,successfully constrained aerodynamic uplift force deviations between operating directions within 3%. 展开更多
关键词 High-speed pantograph Aerodynamic uplift force key parameter regulation Numerical simulation
在线阅读 下载PDF
uddiKey及其分配策略研究
13
作者 彭立 《湖南第一师范学院学报》 2010年第5期148-151,共4页
UDDI要求实体在发布时必须被分配一key作为其唯一性标识。UDDIV2的key由UDDI节点生成,key的可读性差且不可移植。UDDIV3的uddiKey方案规定key必须采用URI格式,并通过引入key分区概念使发布者为新实体分配key成为可能。通过研究uddiKey... UDDI要求实体在发布时必须被分配一key作为其唯一性标识。UDDIV2的key由UDDI节点生成,key的可读性差且不可移植。UDDIV3的uddiKey方案规定key必须采用URI格式,并通过引入key分区概念使发布者为新实体分配key成为可能。通过研究uddiKey的格式及两种分配方式,探讨了解决老版本key问题的办法,提出了单注册中心和多注册中心环境下的uddiKey分配策略,其核心内容是确保key的唯一性,特别是在多注册中心环境下,需要一根注册中心负责key空间的分配。 展开更多
关键词 uddikey 分配策略 key分区 key移植
在线阅读 下载PDF
Optimizing Fine-Tuning in Quantized Language Models:An In-Depth Analysis of Key Variables
14
作者 Ao Shen Zhiquan Lai +1 位作者 Dongsheng Li Xiaoyu Hu 《Computers, Materials & Continua》 SCIE EI 2025年第1期307-325,共19页
Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in speci... Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments. 展开更多
关键词 Large-scale Language Model Parameter-Efficient Fine-Tuning parameter quantization key variable trainable parameters experimental analysis
在线阅读 下载PDF
Optimizing the key parameter to accelerate the recovery of AMOC under a rapid increase of greenhouse gas forcing
15
作者 Haolan Ren Fei Zheng +1 位作者 Tingwei Cao Qiang Wang 《Atmospheric and Oceanic Science Letters》 2025年第1期39-45,共7页
Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in c... Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in climate models.Previous studies have suggested that the deviation of model parameters is one of the major factors in inducing inaccurate AMOC simulations.In this work,with a low-resolution earth system model,the authors try to explore whether a reasonable adjustment of the key model parameter can help to re-establish the AMOC after its collapse.Through a new optimization strategy,the extra freshwater flux(FWF)parameter is determined to be the dominant one affecting the AMOC’s variability.The traditional ensemble optimal interpolation(EnOI)data assimilation and new machine learning methods are adopted to optimize the FWF parameter in an abrupt 4×CO_(2) forcing experiment to improve the adaptability of model parameters and accelerate the recovery of AMOC.The results show that,under an abrupt 4×CO_(2) forcing in millennial simulations,the AMOC will first collapse and then re-establish by the default FWF parameter slowly.However,during the parameter adjustment process,the saltier and colder sea water over the North Atlantic region are the dominant factors in usefully improving the adaptability of the FWF parameter and accelerating the recovery of AMOC,according to their physical relationship with FWF on the interdecadal timescale. 展开更多
关键词 Recovery of AMOC 4×CO_(2) forcing key parameter Parameter estimation Data assimilation Machine learning
在线阅读 下载PDF
A Key Management Scheme Using(p,q)-Lucas Polynomials in Wireless Sensor Network
16
作者 Amit Kumar Gautam Rakesh Kumar 《China Communications》 SCIE CSCD 2021年第11期210-228,共19页
Wireless Sensor Network(WSN)has witnessed an unpredictable growth for the last few decades.It has many applications in various critical sectors such as real-time monitoring of nuclear power plant,disaster management,e... Wireless Sensor Network(WSN)has witnessed an unpredictable growth for the last few decades.It has many applications in various critical sectors such as real-time monitoring of nuclear power plant,disaster management,environment,military area etc.However,due to the distributed and remote deployment of sensor nodes in such networks,they are highly vulnerable to different security threats.The sensor network always needs a proficient key management scheme to secure data because of resourceconstrained nodes.Existing polynomial based key management schemes are simple,but the computational complexity is a big issue.Lucas polynomials,Fibonacci polynomials,Chebychev polynomials are used in Engineering,Physics,Combinatory and Numerical analysis etc.In this paper,we propose a key management scheme using(p,q)-Lucas polynomial to improve the security of WSN.In(p,q)-Lucas polynomial,p represents a random base number while q represents a substitute value of x in the polynomial.The value of p is unique,and q is different according to communication between nodes.Analysis of the proposed method on several parameters such as computational overhead,efficiency and storage cost have been performed and compared with existing related schemes.The analysis demonstrates that the proposed(p,q)-Lucas polynomial based key management scheme outperforms over other polynomials in terms of the number of keys used and efficiency. 展开更多
关键词 key management lucas polynomial WSN security pairwise key distribution key generation hierarchical key management
在线阅读 下载PDF
Light-Weighted Mutual Authentication and Key Agreement in V2N VANET
17
作者 Yanan Liu Lei Cao +3 位作者 Zheng Zhang Ge Li Shuo Qiu Suhao Wang 《Computers, Materials & Continua》 2025年第9期4997-5019,共23页
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari... As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience. 展开更多
关键词 KERBEROS PUF AUTHENTICATION key agreement VANET
在线阅读 下载PDF
Key Factors and Countermeasures for the Current Development of Chinese Language Education in Italy
18
作者 Siyu Chen 《Journal of Contemporary Educational Research》 2025年第7期216-225,共10页
With the deepening cultural and economic ties between China and Italy,Chinese language education in Italy has been at the forefront of Europe,and significant progress has been made in localized teaching in Italy.Howev... With the deepening cultural and economic ties between China and Italy,Chinese language education in Italy has been at the forefront of Europe,and significant progress has been made in localized teaching in Italy.However,the current“Chinese language craze”in Italy seems to have cooled down,and the demand for Italians to learn Chinese has stabilized or even declined.This phenomenon involves multiple factors.From the perspective of cross-cultural perspective,this paper analyzes the current development status of Chinese language education in Italy,as well as the practical problems existing in various aspects such as teachers,textbooks,and curriculum settings.It explores the key factors for the better development of Chinese language education in Italy and provides suggestions on how to solve the current problems,aiming to promote the sound development of Chinese language education in Italy. 展开更多
关键词 ITALY Chinese education key factors SOLUTIONS CULTURE
在线阅读 下载PDF
Key West, Florida
19
作者 龚珍妮(编译) 《疯狂英语(双语世界)》 2025年第3期17-21,37,共6页
Key West is in the state of Florida.It is the southernmost city in the USA.That means it is the city farthest to the south.It is very close to Cuba,another country.
关键词 CUBA key West southernmost city Florida USA
在线阅读 下载PDF
CD-AKA-IoV:A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle
20
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第10期1715-1732,共18页
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi... With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency. 展开更多
关键词 AUTHENTICATION key agreement IoV cross-domain
在线阅读 下载PDF
上一页 1 2 124 下一页 到第
使用帮助 返回顶部