首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   45篇
  免费   8篇
  国内免费   1篇
  2019年   1篇
  2018年   3篇
  2017年   2篇
  2016年   3篇
  2015年   1篇
  2014年   6篇
  2013年   15篇
  2012年   2篇
  2011年   5篇
  2010年   1篇
  2009年   2篇
  2008年   1篇
  2007年   2篇
  2006年   2篇
  2005年   3篇
  2004年   2篇
  2003年   1篇
  2001年   1篇
  1993年   1篇
排序方式: 共有54条查询结果,搜索用时 984 毫秒
41.
This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global.  相似文献   
42.
The anti-British rebellion of 1920 has become one of the most important foundational myths of Iraqi nationalism. It has been the subject of poetry, theatre, film and folklore and continues to be commemorated and evoked as a symbol of the Iraqi nation state and of Iraqi pride and independence. This popular reading of events ignores the realities of the rebellion: that it was a mid-Euphrates, rather than a national, affair and that the motivations, to begin with at least, were far more personal and economic than national. Nevertheless, the rebellion's memory has acquired a hallowed place in Iraqi nationalist discourse. This article will focus on two points: first, to place the rebellion of 1920 in its correct historical context; second, it will be argued that today's anti-American insurgency will make the same historiographical journey from being a tumultuous and localised event that had no shortage of detractors to becoming a defining symbol of Iraqi nationalism. As will be shown, there is already much evidence to suggest that the process has already begun. The foreign troop presence cannot remain indefinitely and when, sooner or later, Coalition forces withdraw we may well see the development of a narrative that credits the ‘resistance’ for gaining Iraqi independence; in other words, the ‘resistance’ today may well become the foundational nationalist myth of the new Iraq.  相似文献   
43.
分析了传统PKI(Public Key Infrastructure)身份认证模型存在的问题,基于OCSP(Online Certificate Status Protocol)协议的证书状态验证服务和密钥验证服务相分离,造成了传统PKI身份认证模型的信任度下降,增加了身份认证的风险,跨CA(Certificate Authority)认证复杂度高,CA机构提供的身份认证服务不完整等问题。提出了一种开放式PKI身份认证模型,由CA中心独立完成两个验证服务,将OCSP应答机制改进为提供身份证明文件的方式,可有效解决上述问题。通过云信任评估模型对两种认证模型进行了量化评估,证明了本文提出的开放式身份认证模型可有效提高信任度。对该模型进行了原型实现,重点对性能问题进行了优化,实验测试表明,该模型具有实用价值。  相似文献   
44.
云用户与云之间的双向认证是云计算中用户访问云中资源和数据的重要前提。为解决云计算环境下基于口令的身份认证方式存在的问题,并保证海量用户环境下认证的效率,对一个常数复杂性的判定口令相等的百万富翁协议进行了改进,提出了一个公平的安全双方判定相等协议,可以公平且秘密地比对认证方与被认证方所拥有口令的一致性。在上述协议的基础上,基于具有语义安全的加法同态算法――Bresson算法,实现了一个保护云用户和云服务提供者双方隐私的身份认证方案,最后,证明了该身份认证方案在判定相等方面的正确性,并给出了方案的安全性分析。  相似文献   
45.
Abstract

This paper offers a simple strategic framework to help governments identify various policy mechanisms to minimize public sector corruption. The paper offers a formal model that blends the economics of crime with identity economics and money laundering. It presents a partial equilibrium framework that focuses on a representative public official engaged in a mix of legal and illegal effort. The model introduces various levers a government might use to impact the costs and benefits of illegal effort. The ultimate goal is to help turn volatile vicious cycles of political instability, into steady virtuous cycles of stability, growth, and sustainable development.  相似文献   
46.
Analysis of the failures of African security forces generally focuses on structural issues such as corruption of senior leadership, insufficient equipment and training, and coup d’état fears driving mistrust of armies that are too strong or effective. However, less examined is the role that sub-state identity plays; using Libya, South Sudan, and Mali as case studies, this paper examines how ethnicity inhibits the development of national armies, divides them, and exposes a critical flaw that adversaries are able to exploit. Given the increasingly ethnic nature of conflict throughout the world, and the rising threat that ethnic conflicts in Africa pose to regional and Western partners, it may be prudent for researchers, policymakers and other stakeholders to examine the critical role that sub-state identity plays in undermining African security forces.  相似文献   
47.
大学生专业认同研究   总被引:1,自引:0,他引:1  
大学生的专业认同对大学生所学专业的兴趣和深入程度有重要影响。本文采用大学生专业认同调查问卷了解了学生当前专业认同的现状,并探讨了造成现状的原因。研究发现女生的专业发展认同显著高于男生;在年级上,专业身份认同存在差异,大一学生的专业身份认同得分高于大二学生;在地域差异上,专业身份认同和专业发展都存在显著差异。  相似文献   
48.
We prove a Chernoff‐type upper variance bound for the multinomial and the negative multinomial distribution. An application is also given.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 179–183, 2014  相似文献   
49.
基于智能卡的身份认证在军事领域中具有广泛的应用前景,由于军事信息具有高度的敏感性与机密性,传统的、静态的、单向的身份认证方案不能满足军事应用的需求,通过对几种认证方案的研究,提出了一种基于RSA密码体制的实时的、动态的、极小泄漏的双向身份认证方案,不仅证明了它的完备性,并对其安全性进行了分析,结果表明它具有比以上几种认证方案更高的安全性.  相似文献   
50.
Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号