期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Technical Problems and Approval Standards for the Regional Trials of Soybean Varieties in Liaoning Province
1
作者 唐红丽 《Agricultural Science & Technology》 CAS 2014年第11期1847-1848,1882,共3页
The technical problems and approval standards for the regional test of soybean varieties in Liaoning Province were discussed. The technical key points for the soybean regional trials were the selection of trial fields... The technical problems and approval standards for the regional test of soybean varieties in Liaoning Province were discussed. The technical key points for the soybean regional trials were the selection of trial fields, preparations in lab be-fore sowing, preparations in regional trial field before sowing, sowing in suitable time and strict with sowing process, field management and survey record, harvest and sampling as wel as lab test and summary. In addition, the approval standards for common varieties and quality varieties for the soybean regional trials in Liaoning were introduced, with the aim to provide accurate and scientific theoretical basis for the approval of soybean varieties. 展开更多
关键词 Liaoning soybean Regional Test Technical problems Approval stan-dards
在线阅读 下载PDF
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model 被引量:1
2
作者 Lin CHENG Qiaoyan WEN Zhengping JIN Hua ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第1期163-173,共11页
Certificateless public key cryptography elimi- nates inherent key escrow problem in identity-based cryptog- raphy, and does not yet requires certificates as in the tradi- tional public key infrastructure. In this pape... Certificateless public key cryptography elimi- nates inherent key escrow problem in identity-based cryptog- raphy, and does not yet requires certificates as in the tradi- tional public key infrastructure. In this paper, we give crypt- analysis to Hwang et al.'s certificateless encryption scheme which is the first concrete certificateless encryption scheme that can be proved to be secure against "malicious-but- passive" key generation center (KGC) attack in the stan- dard model. Their scheme is proved to be insecure even in a weaker security model called "honest-but-curious" KGC at- tack model. We then propose an improved scheme which is really secure against "malicious-but-passive" KGC attack in the standard model. 展开更多
关键词 certificateless public key cryptography stan-dard model provable security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部