排序方式: 共有107条查询结果,搜索用时 15 毫秒
31.
密钥分配协议安全性的证明是确保密钥分配绝对安全的要求 ,经典密码方案的安全性大多难以证明 ,而利用量子力学的基本原理 ,可以证明量子密码方案是无条件安全的。介绍了Shor Preskill对BB84量子密钥分配协议无条件安全性的证明方法 ,归纳了其技巧和特点 ,揭示了对称化方法和量子纠缠提纯技术在该方法中的作用。证明了Shor Preskill方法不能直接用来证明B92协议的无条件安全性。提出了利用Shor Preskill方法间接证明B92的可能途径。 相似文献
32.
33.
We consider a simple two‐stage supply chain with a single retailer facing i.i.d. demand and a single manufacturer with finite production capacity. We analyze the value of information sharing between the retailer and the manufacturer over a finite time horizon. In our model, the manufacturer receives demand information from the retailer even during time periods in which the retailer does not order. To analyze the impact of information sharing, we consider the following three strategies: (1) the retailer does not share demand information with the manufacturer; (2) the retailer does share demand information with the manufacturer and the manufacturer uses the optimal policy to schedule production; (3) the retailer shares demand information with the manufacturer and the manufacturer uses a greedy policy to schedule production. These strategies allow us to study the impact of information sharing on the manufacturer as a function of the production capacity, and the frequency and timing in which demand information is shared. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献
34.
This article studies a firm that procures a product from a supplier. The quality of each product unit is measured by a continuous variable that follows a normal distribution and is correlated within a batch. The firm conducts an inspection and pays the supplier only if the product batch passes the inspection. The inspection not only serves the purpose of preventing a bad batch from reaching customers but also offers the supplier an incentive to improve product quality. The firm determines the acceptance sampling plan, and the supplier determines the quality effort level in either a simultaneous game or a Stackelberg leadership game, in which both parties share inspection cost and recall loss caused by low product quality. In the simultaneous game, we identify the Nash equilibrium form, provide sufficient conditions that guarantee the existence of a pure strategy Nash equilibrium, and find parameter settings under which the decentralized and centralized supply chains achieve the same outcome. By numerical experiments, we show that the firm's acceptance sampling plan and the supplier's quality effort level are sensitive to both the recall loss sharing ratio and the game format (i.e., the precommitment assumption of the inspection policy). © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
35.
Thomas Overhage 《Defense & Security Analysis》2013,29(4):323-341
In a general and economical view, this article analyzes methods and mechanisms for the pooling and sharing of military forces and weapons inside the European Union (EU) in times of scarcity. Pooling and sharing could improve the EU military capabilities significantly if differences in location factors were taken into account and all states would focus on their respective strengths. More competition and less concentration are the keys to ensuring guaranteed access to military assets. Pooling and sharing are likely to be successful only if large states enhance their emphasis on collective defense by mutual aid and self-help, and reduce particularistic and parochial interests of local gain. The realm of personnel has the most potential for improvement but any change is likely to generate policy implications. 相似文献
36.
Offsets are a growing feature of international trade in defence equipment. This article assesses the economics of offsets and outlines UK offsets policy. There is a lack of empirical work in the field and the article presents the results of a survey of UK firms’ experience of their involvement in offsets against UK imports of defence equipment. There is also a case study of the AWACS offset programme and an evaluation of policy implications. 相似文献
37.
针对卫星网络组密钥管理的重要性,提出了一个可认证的基于门限秘密共享的组密钥管理方案.结合卫星网络的动态拓扑结构特点,将地面站作为组成员的身份注册中心,以实现对组成员的身份认证,确保节点的合法性.为了提高组密钥的生成效率,选取≠一1颗可见时间长的卫星构建组密钥份额分发中心,降低了组密钥联合生成过程中的通信量.组密钥协商无需安全信道,节省了系统资源.安全性及性能分析表明,该方案不仅具有较强的安全性,而且还具有计算和通信量小的优点.参数分析表明,门限值k与组密钥更新周期T是影响方案安全性的2个重要因子. 相似文献
38.
39.
A firm making quantity decision under uncertainty loses profit if its private information is leaked to competitors. Outsourcing increases this risk as a third party supplier may leak information for its own benefit. The firm may choose to conceal information from the competitors by entering in a confidentiality agreement with the supplier. This, however, diminishes the firm's ability to dampen competition by signaling a higher quantity commitment. We examine this trade‐off in a stylized supply chain in which two firms, endowed with private demand information, order sequentially from a common supplier, and engage in differentiated quantity competition. In our model, the supplier can set different wholesale prices for firms, and the second‐mover firm could be better informed. Contrary to what is expected, information concealment is not always beneficial to the first mover. We characterize conditions under which the first mover firm will not prefer concealing information. We show that this depends on the relative informativeness of the second mover and is moderated by competition intensity. We examine the supplier's incentive in participating in information concealment, and develop a contract that enables it for wider set of parameter values. We extend our analysis to examine firms' incentive to improve information. © 2014 Wiley Periodicals, Inc. 62:1–15, 2015 相似文献
40.
由于当前应急器材储备依然存在“多储”或“少储”风险,为提高储备效益,以企业经济效益与军队采购成本为优化目标,提出了应急器材柔性采购策略。通过建立企业储备策略与军队采购定价最优化模型,求解得到了在不同战争爆发概率及器材现货市场价格区间等外部环境因素下的军队最佳柔性定价及对应的企业最优储备策略,并通过实例分析验证了得出的决策结论。结果表明,最优策略的实施将有利于军队与企业共担应急器材数量储备风险。 相似文献