期刊文献+
共找到536篇文章
< 1 2 27 >
每页显示 20 50 100
Real-Time Identity Authentication Scheme Based on Dynamic Credentials for Power AIGC System
1
作者 Feng Wei Zhao Chen +3 位作者 Yin Wang Dongqing Liu Xun Zhang Zhao Zhou 《Computers, Materials & Continua》 2025年第3期5325-5341,共17页
The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artifici... The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artificial Intelligence Generated Content(AIGC).However,the openness of power system channels and the resource-constrained nature of power sensors have led to new challenges for the secure transmission of power data and decision instructions.Although traditional public key cryptographic primitives can offer high security,the substantial key management and computational overhead associated with these primitives make them unsuitable for power systems.To ensure the real-time and security of power data and command transmission,we propose a lightweight identity authentication scheme tailored for power AIGC systems.The scheme utilizes lightweight symmetric encryption algorithms,minimizing the resource overhead on power sensors.Additionally,it incorporates a dynamic credential update mechanism,which can realize the rotation and update of temporary credentials to ensure anonymity and security.We rigorously validate the security of the scheme using the Real-or-Random(ROR)model and AVISPA simulation,and the results show that our scheme can resist various active and passive attacks.Finally,performance comparisons and NS3 simulation results demonstrate that our proposed scheme offers enhanced security features with lower overhead,making it more suitable for power AIGC systems compared to existing solutions. 展开更多
关键词 Cyber security identity authentication dynamic credential update AIGC
在线阅读 下载PDF
Stricter national standards are required for credentialing of endoscopic-retrograde-cholangiopan-creatography in the United States 被引量:9
2
作者 Mitchell S Cappell David M Friedel 《World Journal of Gastroenterology》 SCIE CAS 2019年第27期3468-3483,共16页
Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly stee... Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly steeper learning curve than that for other standard gastrointestinal(GI) endoscopies, such as esophagogastroduodenoscopy or colonoscopy, due to greater technical difficulty and higher risk of complications. Yet, GI fellows have limited exposure to ERCP during standard-three-year-GI-fellowships because ERCP is much less frequently performed than esophagogastroduodenoscopy/colonoscopy. This led to adding an optional year of training in therapeutic endoscopy. Yet many graduates from standard three-year-fellowships without advanced training intensely pursue independent/unsupervised ERCP privileges despite inadequate numbers of performed ERCPs and unacceptably low rates of successful selective cannulation of desired(biliary or pancreatic) duct. Hospital credentialing committees have traditionally performed ERCP credentialing, but this practice has led to widespread flouting of recommended guidelines(e.g., planned privileging of applicant with 20% successful cannulation rate, or after performing only 7 ERCPs);and intense politicking of committee members by applicants, their practice groups, and potential competitors. Consequently, some gastroenterologists upon completing standard fellowships train and learn ERCP 'on the job' during independent/unsupervised practice, which can result in bad outcomes: high rates of failed bile duct cannulation. This severe clinical problem is indicated by publication of ≥ 12 ERCP competency studies/guidelines during last 5 years. However, lack of mandatory, quantitative, ERCP credentialing criteria has permitted neglect of recommended guidelines. This work comprehensively reviews literature on ERCP credentialing;reviews rationales for proposed guidelines;reports problems with current system;and proposes novel criteria for competency. This work advocates for mandatory, national, written,minimum, quantitative, standards, including cognitive skills(possibly assessed by a nationwide examination), and technical skills, assessed by number performed(≥ 200-250 ERCPs), types of ERCPs, success rate(approximately ≥ 90%cannulation of desired duct), and letters of recommendation by program director/ERCP mentor. Mandatory criteria should ideally not be monitored by a hospital committee subjected to intense politicking by applicants, their employers, and sometimes even competitors, but an independent national entity,like the National Board of Medical Examiners/American Board of Internal Medicine. 展开更多
关键词 Endoscopic retrograde CHOLANGIOPANCREATOGRAPHY Privileges credentialING Gastroenterology FELLOWSHIP TRAINING Advanced gastrointestinal endoscopy TRAINING Certification Standards
暂未订购
基于Credential Provider的身份认证模型的研究与实现 被引量:3
3
作者 陈锐 蒋泽军 陈福 《航空计算技术》 2010年第3期131-134,共4页
身份认证是系统安全的第一道门户,采用强身份认证技术能极大的提高系统的安全性。通过对现有的强身份认证技术的分析,在对微软新推出的身份认证模型——凭据提供(Credential Pro-vider)模型进行研究的基础上,设计并实现了一个基于动态... 身份认证是系统安全的第一道门户,采用强身份认证技术能极大的提高系统的安全性。通过对现有的强身份认证技术的分析,在对微软新推出的身份认证模型——凭据提供(Credential Pro-vider)模型进行研究的基础上,设计并实现了一个基于动态口令的双因素身份认证系统,对操作系统用户身份进行强认证,有效地提高了系统的安全级别。 展开更多
关键词 身份认证 凭据提供 双因素 强认证 动态口令
在线阅读 下载PDF
One-time fertilization at first flowering improves lint yield and dry matter partitioning in late planted short-season cotton 被引量:9
4
作者 LUO Hong-hai WANG Qiang +3 位作者 ZHANG Jie-kun WANG Lei-shan LI Ya-bing YANG Guo-zheng 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2020年第2期509-517,共9页
Cotton producers have substantially reduced their inputs(labor,nutrients,and management)mainly by adopting a shortseason cropping management that is characterized by late sowing,high density,and reduced fertilization ... Cotton producers have substantially reduced their inputs(labor,nutrients,and management)mainly by adopting a shortseason cropping management that is characterized by late sowing,high density,and reduced fertilization with one-time application at the first bloom stage without lint yield reduction.However,it has been hypothesized that one-time fertilization at an earlier growth stage could be a more effective and economic management practice.A two-year field experiment was conducted by applying five fertilizer one-time fertilization at 0(FT1),5(FT2),10(FT3),15(FT4),and 20(FT5)days after the first flower appeared in the field and one three-split fertilizer application taken as the conventional control(FT6),making six treatments altogether.Cotton growth period,biomass accumulation,yield,and its formation were quantified.The results showed that the one-time fertilization did not affect the cotton growth progress as compared to FT6,however,the total crop cycles for FT3–FT5 were 3 days shorter.FT1 produced the highest cotton lint yield(1396 kg ha–1),which was similar to the FT6 but higher than the other treatments,and could be attributed to more bolls per unit area and higher lint percentage.Cotton yield was positively correlated with cotton plant biomass accumulated.FT1 had both the highest average(VT)(193.7 kg ha–1 d–1)and the highest maximum(VM)(220.9 kg ha–1 d–1)rates during the fast biomass accumulation period.These results suggest that one-time fertilizer application at the first flower stage might be an adjustment that is more effective than at first bloom,and allowed for easier decision making for application date due to non counting of plants with flowers is needed. 展开更多
关键词 one-time fertilization first flower cotton biomass accumulation yield
在线阅读 下载PDF
The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study 被引量:2
5
作者 SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1641-1644,共4页
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry... Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system. 展开更多
关键词 trusted computing trusted platform module (TPM) key management credential
在线阅读 下载PDF
One-Time Rational Secret Sharing Scheme Based on Bayesian Game 被引量:8
6
作者 TIAN Youliang MA Jianfeng +2 位作者 PENG Changgen CHEN Xi JI Wenjiang 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期430-434,共5页
The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-... The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-out-of-2 rational secret sharing based on Bayesian game and considering different classes of protocol parties, we propose a 2-out-of-2 secret sharing scheme to solve cooperative problem of a rational secret sharing scheme being played only once. Moreover, we prove that the strategy is a perfect Bayesian equilibrium, adopted only by the parties in their decision-making according to their belief system (denoted by the probability distribution) and Bayes rule, without requiring simultaneous channels. 展开更多
关键词 rational secret sharing one-time rational secret sharing Bayesian game perfect Bayesian equilibrium
原文传递
A Workflow Authorization Model Based on Credentials 被引量:1
7
作者 XING Guang-lin HONG Fan CAI Hui 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期198-202,共5页
A workflow authorization model based on credentials was proposesed. It can nicely satisfy the features that workflows in actual application should satisfying. This model uses access control list based on task state wh... A workflow authorization model based on credentials was proposesed. It can nicely satisfy the features that workflows in actual application should satisfying. This model uses access control list based on task state which nicely ensure synchronizing authorization flow with workflow; specifies authorization policy not only based on user identifiers but also based on user qualifications and characteristics; defines a set of constraint rules for a task and seek the eligible users to execute the task according to the type of each constraint rule which realize dynamic separation of duty; and realizes the access granularity of authorization ranging from objects to specific parts of objects which ensure the least privilege constraints much more better. 展开更多
关键词 credentialS WORKFLOW authorization model
在线阅读 下载PDF
One-time sintering process to modify xLi2MnO3(1-x)LiMO2 hollow architecture and studying their enhanced electrochemical performances 被引量:3
8
作者 Renheng Wang Yiling Sun +5 位作者 Kaishuai Yang Junchao Zheng Yan Li Zhengfang Qian Zhenjiang He Shengkui Zhong 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2020年第11期271-279,共9页
To solve the critical problems of lithium rich cathode materials, e.g., structure instability and short cycle life, we have successfully prepared a ZrO2-coated and Zr-doping xLi2MnO3·(1–x)LiMO2 hollow architectu... To solve the critical problems of lithium rich cathode materials, e.g., structure instability and short cycle life, we have successfully prepared a ZrO2-coated and Zr-doping xLi2MnO3·(1–x)LiMO2 hollow architecture via one-time sintering process. The modified structural materials as lithium-ion cathodes present good structural stability and superior cycle performance in LIBs. The discharge capacity of the ZrO2-coated and Zr-doped hollow pristine is 220 mAh g-1 at the 20th cycle at 0.2 C(discharge capacity loss, 2.7%)and 150 m Ah g-1 at the 100 th cycle at 1 C(discharge capacity loss, 17.7%), respectively. However, hollow pristine electrode only delivers 203 m Ah g-1 at the 20 th cycle at 0.2 C and 124 mAh g-1 at the 100 th cycle at 1 C, respectively, and the corresponding to capacity retention is 92.2% and 72.8%, respectively.Diffusion coefficients of modified hollow pristine electrode are much higher than that of hollow pristine electrode after 100 cycles(approach to 1.4 times). In addition, we simulate the adsorption reaction of HF on the surface of ZrO2-coated layer by the first-principles theory. The calculations prove that the adsorption energy of HF on the surface of ZrO2-coated layer is about-1.699 e V, and the ZrO2-coated layer could protect the hollow spherical xLi2MnO3·(1–x)LiMO2 from erosion by HF. Our results would be applicable for systematic amelioration of high-performance lithium rich material for anode with the respect of practical application. 展开更多
关键词 Lithium rich cathode materials one-time sintering process Coated and doped Electrochemical performances First-principles calculations
在线阅读 下载PDF
Cryptanalysis of the One-Time Proxy Signature Scheme Used in Mobile Agents 被引量:1
9
作者 FUXiao-tong XIAOHong XIAOGuo-zhen 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期183-185,共3页
We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy sig... We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy signature by impersonating the stiver Furthermore, he canrequest the server with responsibility for the forged bidding information. 展开更多
关键词 CRYPTANALYSIS proxy signature one-time proxy signature
在线阅读 下载PDF
Design of 32 kbit one-time programmable memory for microcontroller units 被引量:1
10
作者 JEON Hwang-gon CHOI In-hwa +1 位作者 HA Pan-bong KIM Young-hee 《Journal of Central South University》 SCIE EI CAS 2012年第12期3475-3483,共9页
A 32 kbit OTP(one-time programmable)memory for MCUs(micro-controller units)used in remote controllers was designed.This OTP memory is used for program and data storage.It is required to apply 5.5V to BL(bit-line)and 1... A 32 kbit OTP(one-time programmable)memory for MCUs(micro-controller units)used in remote controllers was designed.This OTP memory is used for program and data storage.It is required to apply 5.5V to BL(bit-line)and 11V to WL(word-line)for a OTP cell of 0.35μm ETOX(EEPROM tunnel oxide)type by MagnaChip.We use 5V transistors on column data paths to reduce the area of column data paths since they require small areas.In addition,we secure device reliability by using HV(high-voltage)transistors in the WL driver.Furthermore,we change from a static logic to a dynamic logic used for the WL driver in the core circuit.Also,we optimize the WD(write data)switch circuit.Thus,we can implement them with a small-area design.In addition,we implement the address predecoder with a small-area logic circuit.The area of the designed 32 kbit OTP with 5V and HV devices is 674.725μm×258.75μm(=0.1745mm2)and is 56.3% smaller than that using 3.3V devices. 展开更多
关键词 one-time programmable memory micro controller unit EEPROM tunnel oxide small-area
在线阅读 下载PDF
A One-Time Pad Encryption Scheme Based on Efficient Physical-Layer Secret Key Generation for Intelligent IoT System 被引量:1
11
作者 Liquan Chen Kailin Cao +2 位作者 Tianyu Lu Yi Lu Aiqun Hu 《China Communications》 SCIE CSCD 2022年第7期185-196,共12页
The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random k... The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random keys for OTP.In this paper,we propose a joint SKG and OTP encryption scheme with the aid of a reconfigurable intelligent surface(RIS)to boost secret key rate.To maximize the efficiency of secure communication,we divide the process of secure transmission into two stages:SKG and then encrypted packet transmission.Meanwhile,we design an optimal algorithm for allocating time slots for SKG to maximize SKG efficiency without security risk.Furthermore,we design a key updating protocol based on our SKG scheme for OTP encryption.Simulation results verify that our scheme can generate keys securely and efficiently,and significantly improve the secure communication performance in an intelligent IoT system. 展开更多
关键词 physical layer security intelligent internet of things one-time pad reconfigurable intelligent surface
在线阅读 下载PDF
One-time Shaping Technological System of Lightweight Roof Greening 被引量:1
12
作者 殷金岩 许建新 +5 位作者 罗旭荣 骆华容 黎修东 唐巧玲 王玲玲 何新杰 《Agricultural Science & Technology》 CAS 2016年第6期1471-1474,共4页
Lightweight roof greening is an important way for improving urban ecological environment and has good ecological and social benefits, but the investment is- too-high for the investors. Therefore, it is necessary to im... Lightweight roof greening is an important way for improving urban ecological environment and has good ecological and social benefits, but the investment is- too-high for the investors. Therefore, it is necessary to improve the system of lightweight roof greening. This study introduced a lightweight roof greening mode with low cost, simple construction, rapid formation, good economic benefit and convenient curing. 展开更多
关键词 Lightweight roof greening one-time shaping technology Plant mat
在线阅读 下载PDF
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain 被引量:1
13
作者 Zhiji Li 《Journal of Information Security》 2022年第2期43-65,共23页
Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the informatio... Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the information of the entire credential to the verifier, resulting in unnecessary overexposure of personal information. From the perspective of user privacy, this paper proposed a verifiable credential scheme with selective disclosure based on BLS (Bohen- Lynn-Shacham) aggregate signature. Instead of signing the credentials, we sign the claims in the credentials. When the user needs to present the credential to verifier, the user can select a part of but not all claims to be presented. To reduce the number of signatures of claims after selective disclosure, BLS aggregate signature is achieved to aggregate signatures of claims into one signature. In addition, our scheme also supports the aggregation of credentials from different users. As a result, verifier only needs to verify one signature in the credential to achieve the purpose of batch verification of credentials. We analyze the security of our aggregate signature scheme, which can effectively resist aggregate signature forgery attack and credential theft attack. The simulation results show that our selective disclosure scheme based on BLS aggregate signature is acceptable in terms of verification efficiency, and can reduce the storage cost and communication overhead. As a result, our scheme is suitable for blockchain, which is strict on bandwidth and storage overhead. 展开更多
关键词 Verifiable credential Aggregate Signatures Privacy Protection Selective Disclosure Blockchain
在线阅读 下载PDF
Credentialing in radiology:Current practice and future challenges
14
作者 Adam Youssef Paul Mc Coubrie 《World Journal of Radiology》 CAS 2016年第5期506-512,共7页
Radiology has changed significantly in recent years. The volume of work has increased dramatically as has its complexity. Future radiologists need an adequate training and expertise in conventional practice as well as... Radiology has changed significantly in recent years. The volume of work has increased dramatically as has its complexity. Future radiologists need an adequate training and expertise in conventional practice as well as new techniques. This comes at a time when other stakeholders outside of radiology are voicing their own concerns. The rightly justified increasing focus on patient safety has placed even more emphasis on the demonstration of competent practice by all health care professionals. Credentialing has been put forward as a way to ensure a doctor is competent in specific areas. Credentialing may be an alien concept to many radiology trainees but moves are afoot in the United Kingdom to bring it to the forefront of its postgraduate medical training. Credentialing began in 20 th century North America where it was linked to the process of privileging. It subsequently garnered a strong patient safety focus and has become a part of the international healthcare agenda. Not everyone agrees with credentialing, it has many criticisms including the risk of speciality "turf wars" and the stifling of medical excellence to name just a couple. Is credentialing in radiology here to stay or will it pass by quietly? This paper reviews the global credentialing movement and discusses how this may impact on future radiology training, using the United Kingdom as its case example. 展开更多
关键词 credentialING MEDICAL EDUCATION PATIENT safety RADIOLOGY ACCREDITATION
暂未订购
Privacy-Preserving Trust Negotiation with Hidden Credentials and Hidden Policies in a Multi-Party Environment
15
作者 GUO Shanqing WEI Juan +1 位作者 ZHANG Chunhua XU Qiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期553-556,共4页
Until now,there are numerous protocols that can achieve privacy-preserving trust negotiation between two parties involved,but there is no effective privacy-preserving trust negotiation schemes proposed between multi-u... Until now,there are numerous protocols that can achieve privacy-preserving trust negotiation between two parties involved,but there is no effective privacy-preserving trust negotiation schemes proposed between multi-users.In this paper,a privacy-preserving trust negotiation scheme with multi-parties is proposed,which can protect their credentials and access control policies during the procedure for establishing the trust between multi-strangers,and its privacy-preserving ability also is proved.These works extend the trust negotiation mechanism to multi-users,which can be thought as a substantial extension of the state-of-the-art in privacy-preserving trust negotiations between two parties involved. 展开更多
关键词 trust negotiation credential POLICY PRIVACY-PRESERVING
在线阅读 下载PDF
Effect of Nucleating Agent on the Crystallization of Tailings Glass Ceramics Prepared by One-time Sintering
16
作者 刘军 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2009年第4期658-662,共5页
Glass ceramics was made by the one-time sintering method using the main raw material of iron tailings. On the basis of quaternary system of CaO-MgO-Al2O3-SiO2, using DTA, XRD and SEM, the effects of different nucleati... Glass ceramics was made by the one-time sintering method using the main raw material of iron tailings. On the basis of quaternary system of CaO-MgO-Al2O3-SiO2, using DTA, XRD and SEM, the effects of different nucleating agents and mixing amounts as well as heat treatment on the crystallization of railings glass ceramics were studied. The experimental results show that, nucleating agent and heat treatment are two necessary conditions for one-time sintering preparation of tailings glass ceramics namely, only adding nucleating agent or experiencing heat treatment, the quaternary system can not crystallize. The composite nucleating agent consisting of Cr2O3 and TiO2 can further lead to the crystallization of the CaO-MgO-A1203-SiO2 quaternary system at the lower temperature, with the major phase of diopside. In the range of mass content, 0%-4%, crystal intensity and crystal content grow. But when mass content is more than 4%, the crystal size will become coarser and the crystal distribution will be less regular. Different heat treatment regimes do not change the composition of the crystalline major phase in the glass ceramics crystallization of CaO-MgO-Al2O3-SiO2 system. In the range of 30-60 minutes, with the extension of nucleation and crystallization, crystallization degree enhanced, but if the holding time surpasses 60 minutes, the crystallization is worse. 展开更多
关键词 nucleating agent one-time sintering TAILINGS glass ceramics CRYSTALLIZATION
原文传递
A novel one-time-programmable memory unit based on Schottky-type p-GaN diode
17
作者 Chao Feng Xinyue Dai +4 位作者 Qimeng Jiang Sen Huang Jie Fan Xinhua Wang Xinyu Liu 《Journal of Semiconductors》 EI CAS CSCD 2024年第3期53-57,共5页
In this work,a novel one-time-programmable memory unit based on a Schottky-type p-GaN diode is proposed.During the programming process,the junction switches from a high-resistance state to a low-resistance state throu... In this work,a novel one-time-programmable memory unit based on a Schottky-type p-GaN diode is proposed.During the programming process,the junction switches from a high-resistance state to a low-resistance state through Schottky junction breakdown,and the state is permanently preserved.The memory unit features a current ratio of more than 10^(3),a read voltage window of 6 V,a programming time of less than 10^(−4)s,a stability of more than 108 read cycles,and a lifetime of far more than 10 years.Besides,the fabrication of the device is fully compatible with commercial Si-based GaN process platforms,which is of great significance for the realization of low-cost read-only memory in all-GaN integration. 展开更多
关键词 wide-bandgap semiconductor one-time programmable Schottky-type p-GaN diode read-only memory device
在线阅读 下载PDF
Evaluation of the Effectiveness and Safety of One-Time Endodontics in the Treatment of Chronic Apical Periodontitis with Sinus Tract in Pediatric Deciduous Teeth
18
作者 Yi Liu 《Journal of Clinical and Nursing Research》 2024年第6期111-116,共6页
Objective:To observe the effectiveness and safety of one-time endodontics in the treatment of chronic apical periodontitis with sinus tract in pediatric deciduous teeth.Methods:109 cases of children with chronic apica... Objective:To observe the effectiveness and safety of one-time endodontics in the treatment of chronic apical periodontitis with sinus tract in pediatric deciduous teeth.Methods:109 cases of children with chronic apical periodontitis with sinus tract in the deciduous teeth treated in our hospital from January 2022 to December 2023 were selected and grouped by the randomized numerical table method,with 54 cases in the experimental group and 55 cases in the control group.The experimental group was treated with one-time endodontics and the control group was treated with conventional endodontics.Results:After the treatment,the total effective rate of treatment was higher in the experimental group than in the control group(P<0.05);the incidence of adverse events was lower in the experimental group than in the control group(P<0.05);the satisfaction of the children's family members was higher in the experimental group than in the control group(P<0.05);the pain duration was lower in the experimental group than in the control group(P<0.05).Conclusion:In the experimental group,children with chronic apical periodontitis with sinus tract of the deciduous teeth were given one-time endodontic treatment,and the results of its implementation were relatively good. 展开更多
关键词 one-time endodontics Chronic apical periodontitis with sinus tract Pediatric deciduous teeth Therapeutic effectiveness SAFETY
暂未订购
微证书的价值要义与实践应用:美国纽约州立大学的经验 被引量:1
19
作者 国兆亮 杜贤 《成人教育》 北大核心 2026年第1期78-84,共7页
全球越来越多的教育机构把微证书作为提升学习者职业技能与促进就业竞争力的有效路径。美国作为微认证领域的先驱国家,其发展实践一直处于全球引领地位。纽约州立大学构建了完整的微证书体系,尤其是在微证书的内涵界定、设计开发、质量... 全球越来越多的教育机构把微证书作为提升学习者职业技能与促进就业竞争力的有效路径。美国作为微认证领域的先驱国家,其发展实践一直处于全球引领地位。纽约州立大学构建了完整的微证书体系,尤其是在微证书的内涵界定、设计开发、质量保证、宣传推广等方面积累了丰富经验并取得显著成效,成为其他国家和高校学习的典范。深入探究纽约州立大学的微证书实践经验,不仅有助于我们深化对微证书价值功能的学理认知,更能从实践层面有效整合微证书的优势,主动谋求我国教育领域的改革创新,推动高等教育、职业教育与继续教育协同发展。 展开更多
关键词 微证书 纽约州立大学 价值功能 框架结构 开发运行
在线阅读 下载PDF
零信任与零知识融合的匿名身份认证
20
作者 路直 沈任飞 +2 位作者 聂何望 骆婷 路松峰 《计算机学报》 北大核心 2026年第3期661-678,共18页
在零信任安全架构中,身份认证必须遵循“持续验证”的原则,即每一次访问请求均需独立完成身份验证,并通常结合多因素认证以增强安全性。然而,传统的多因素认证模式要求认证方频繁暴露敏感身份信息,如身份证号和生物特征,不仅增加了隐私... 在零信任安全架构中,身份认证必须遵循“持续验证”的原则,即每一次访问请求均需独立完成身份验证,并通常结合多因素认证以增强安全性。然而,传统的多因素认证模式要求认证方频繁暴露敏感身份信息,如身份证号和生物特征,不仅增加了隐私泄露的风险,也为关联攻击提供了条件。为解决这一问题,本文提出一种融合零知识证明与零信任架构的匿名身份认证协议,创新性地引入“认证方与验证方互不信任”的安全模型:验证方不信任认证方,要求其证明身份的有效性;认证方亦不信任验证方,拒绝以明文方式泄露身份,仅通过密文零知识证明完成认证。本文针对身份证号与面部特征两个常见身份因子,分别构造满足Sigma协议结构的专用零知识证明过程,并通过密钥动态更新机制实现每轮匿名凭证的独立性,从而在保障认证完整性的同时,提供跨轮次不可关联性,防止身份溯源与隐私泄露。理论分析与实验结果表明,该协议在计算与通信成本方面具备良好的可扩展性。尤其在面向高维面部特征的认证任务中,本文设计的结构化零知识协议大幅提升了认证效率。与采用通用零知识框架的面部特征方法相比,本文方案在向量维度为1000,密钥参数为2048位的典型配置下,将证明生成与验证时间分别从数十秒与百秒级降至毫秒级,通信成本从百兆字节级压缩至小于0.5 MB,分别降低约98%与99.75%,大幅增强了协议在真实系统中的可部署性。本协议的完整认证过程延迟控制在500 ms以内,通信开销小于0.5 MB,能够广泛适用于面向高频认证与隐私保护要求较高的零信任场景,特别是基于生物特征识别的身份认证系统中。 展开更多
关键词 零信任 零知识证明 身份认证 匿名凭证 隐私计算
在线阅读 下载PDF
上一页 1 2 27 下一页 到第
使用帮助 返回顶部