In architecture of cloud storage, the deduplication technology encrypted with theconvergent key is one of the important data compression technologies, which effectively improvesthe utilization of space and bandwidth. ...In architecture of cloud storage, the deduplication technology encrypted with theconvergent key is one of the important data compression technologies, which effectively improvesthe utilization of space and bandwidth. To further refine the usage scenarios for varioususer permissions and enhance user’s data security, we propose a blockchain-based differentialauthorized deduplication system. The proposed system optimizes the traditionalProof of Vote (PoV) consensus algorithm and simplifies the existing differential authorizationprocess to realize credible management and dynamic update of authority. Based on thedecentralized property of blockchain, we overcome the centralized single point fault problemof traditional differentially authorized deduplication system. Besides, the operations oflegitimate users are recorded in blocks to ensure the traceability of behaviors.展开更多
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat...General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.
Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in...Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 as the flagship journal of CPS,CPL has become one of the most prestigious periodicals published in China,and been among the good choices for worldwide physicists to disseminate their most important breakthroughs.展开更多
Purpose:In this paper,we use author clustering based on journal coupling(i.e.,shared academic journals)to determine researchers who have the same scientific interests and similar conceptual frameworks.The basic assump...Purpose:In this paper,we use author clustering based on journal coupling(i.e.,shared academic journals)to determine researchers who have the same scientific interests and similar conceptual frameworks.The basic assumption is that authors who publish in the same academic journals are more likely to share similar conceptual frameworks and interests than those who never publish in the same venues.Therefore,they are more likely to be part of the same invisible college(i.e.,authors in this subgroup contribute materially to research on the same topic and often publish their work in similar publication venues).Design/methodology/approach:Test in a controlled exercise the grouping of authors based on journal coupling to determine invisible colleges in a research field using a case study of 302 authors who had published in the Information Science and Library Science(IS&LS)category of the Web of Science Core Collection.For each author,we retrieved all the scientific journals in which this author had published his/her articles.We then used the cosine measure to calculate the similarity between authors(both first and second order).Findings:In this paper,using journal coupling of IS&LS authors,we found four main invisible colleges:“Information Systems”,“Business and Information Management”,“Quantitative Information Science”and“Library Science.”The main journals that determine the existence of these invisible colleges were Inform Syst Res,Inform Syst J,J Bus Res,J Knowl Manage,J Informetr,Pro Int Conf Sci Inf,Int J Geogr Inf Sci,J Am Med Inform Assn,and Learn Publ.However,the main journals that demonstrate that IS&LS determine a field were J Am Soc Inf Sci Tec/J Assoc Inf Sci Tech,Scientometrics,Inform Process Manag,and J Inf Sci.Research limitations:The results shown in this article are from a controlled exercise.The analysis performed using journal coupling excludes books,book chapters,and conference papers.In this article,only academic journals were used for the representation of research results.Practical implications:Our results may be of interest to IS&LS scholars.This is because these results provide a new lens for grouping authors,making use of the authors’journal publication profile and journal coupling.Furthermore,extending our approach to the study of the structure of other disciplines would possibly be of interest to historians of science as well as scientometricians.Originality/value:This is a novel approach based on journal coupling to determine authors who are most likely to be part of the same invisible college.展开更多
Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approa...Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing.展开更多
Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launche...Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs.展开更多
Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in...Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 as the flagship journal of CPS,CPL has become one of the most prestigious periodicals published in China.展开更多
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat...General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information...General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat...General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information...General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.展开更多
The Chinese Journal of Multiple Organ Diseases in the Elderly(Zhonghua Laonian Duoqiguan Jibing Zazhi)(ISSN 1671-5403)is launched in 2002 and published monthly by Chinese PLA General Hospital in Beijing,China.
Types of paper Contributions falling into the following categories will be considered for publication:Original research papers,reviews,etc.Please ensure that you select the appropriate article type from the list of op...Types of paper Contributions falling into the following categories will be considered for publication:Original research papers,reviews,etc.Please ensure that you select the appropriate article type from the list of options when making your submission.Authors contributing to special issues should ensure that they select the special issue article type from this list.展开更多
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the...An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.展开更多
The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the...The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the same importance in the application of grid technology. As a critical component of grid security, the secure authen- tication needs to be well studied. In this paper, a two-step mobile agent based(TSMAB) authentication architecture is proposed based on Globus security infrastructure (GSI). By using mobile agent (MA) technology, the TSMAB authentication architecture is composed of the junior-authentication and the senior-authentication. Based on the design and the analysis of TSMAB model, the result shows that the efficiency of grid authentication is improved compared with the GSI authentication.展开更多
基金This work was supported by ZTE Industry-University-Institute Cooperation Funds under Grant No.2019ZTE03-01National Keystone R&D Program of China under Grant No.2017YFB0803204+3 种基金National Natural Science Foundation of China(NSFC)under Grant No.61671001Guangdong Provincial R&D Key Program under Grant No.2019B010137001Shenzhen Research Programs under Grant Nos.JCYJ20190808155607340,JSGG20170406144032901,JSGG20170824095858416 and JCYJ20170306092030521PCL Future Regional Network Facilities for Large-scale Experiments and Applications under Grant No.PCL2018KP001.
文摘In architecture of cloud storage, the deduplication technology encrypted with theconvergent key is one of the important data compression technologies, which effectively improvesthe utilization of space and bandwidth. To further refine the usage scenarios for varioususer permissions and enhance user’s data security, we propose a blockchain-based differentialauthorized deduplication system. The proposed system optimizes the traditionalProof of Vote (PoV) consensus algorithm and simplifies the existing differential authorizationprocess to realize credible management and dynamic update of authority. Based on thedecentralized property of blockchain, we overcome the centralized single point fault problemof traditional differentially authorized deduplication system. Besides, the operations oflegitimate users are recorded in blocks to ensure the traceability of behaviors.
文摘General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
文摘Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.
文摘Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 as the flagship journal of CPS,CPL has become one of the most prestigious periodicals published in China,and been among the good choices for worldwide physicists to disseminate their most important breakthroughs.
文摘Purpose:In this paper,we use author clustering based on journal coupling(i.e.,shared academic journals)to determine researchers who have the same scientific interests and similar conceptual frameworks.The basic assumption is that authors who publish in the same academic journals are more likely to share similar conceptual frameworks and interests than those who never publish in the same venues.Therefore,they are more likely to be part of the same invisible college(i.e.,authors in this subgroup contribute materially to research on the same topic and often publish their work in similar publication venues).Design/methodology/approach:Test in a controlled exercise the grouping of authors based on journal coupling to determine invisible colleges in a research field using a case study of 302 authors who had published in the Information Science and Library Science(IS&LS)category of the Web of Science Core Collection.For each author,we retrieved all the scientific journals in which this author had published his/her articles.We then used the cosine measure to calculate the similarity between authors(both first and second order).Findings:In this paper,using journal coupling of IS&LS authors,we found four main invisible colleges:“Information Systems”,“Business and Information Management”,“Quantitative Information Science”and“Library Science.”The main journals that determine the existence of these invisible colleges were Inform Syst Res,Inform Syst J,J Bus Res,J Knowl Manage,J Informetr,Pro Int Conf Sci Inf,Int J Geogr Inf Sci,J Am Med Inform Assn,and Learn Publ.However,the main journals that demonstrate that IS&LS determine a field were J Am Soc Inf Sci Tec/J Assoc Inf Sci Tech,Scientometrics,Inform Process Manag,and J Inf Sci.Research limitations:The results shown in this article are from a controlled exercise.The analysis performed using journal coupling excludes books,book chapters,and conference papers.In this article,only academic journals were used for the representation of research results.Practical implications:Our results may be of interest to IS&LS scholars.This is because these results provide a new lens for grouping authors,making use of the authors’journal publication profile and journal coupling.Furthermore,extending our approach to the study of the structure of other disciplines would possibly be of interest to historians of science as well as scientometricians.Originality/value:This is a novel approach based on journal coupling to determine authors who are most likely to be part of the same invisible college.
文摘Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing.
文摘Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs.
文摘Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 as the flagship journal of CPS,CPL has become one of the most prestigious periodicals published in China.
文摘General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
文摘General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
文摘General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
文摘General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992.
文摘The Chinese Journal of Multiple Organ Diseases in the Elderly(Zhonghua Laonian Duoqiguan Jibing Zazhi)(ISSN 1671-5403)is launched in 2002 and published monthly by Chinese PLA General Hospital in Beijing,China.
文摘Types of paper Contributions falling into the following categories will be considered for publication:Original research papers,reviews,etc.Please ensure that you select the appropriate article type from the list of options when making your submission.Authors contributing to special issues should ensure that they select the special issue article type from this list.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61475075 and 61271238)the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,China(Grant No.NYKL2015011)
文摘An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
文摘The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the same importance in the application of grid technology. As a critical component of grid security, the secure authen- tication needs to be well studied. In this paper, a two-step mobile agent based(TSMAB) authentication architecture is proposed based on Globus security infrastructure (GSI). By using mobile agent (MA) technology, the TSMAB authentication architecture is composed of the junior-authentication and the senior-authentication. Based on the design and the analysis of TSMAB model, the result shows that the efficiency of grid authentication is improved compared with the GSI authentication.