期刊文献+
共找到3,324篇文章
< 1 2 167 >
每页显示 20 50 100
Special secret sharing scheme with the function of assignment 被引量:3
1
作者 叶振军 孟繁桢 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第3期651-653,共3页
A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one parti... A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one participant to get the secret at any time, but these participants can get nothing about the secret before that moment. At the same time, the other participants cannot get anything about the secret by stealing the secret value when it is transferred. However, if the dealer is lost, a certain number or more partidtmnts of them can reoonstruct the secret by ccoperating. In order to clear this concept, an illustrating scheme with geometry method and a practical scheme with algebra method is given. 展开更多
关键词 secret sharing THRESHOLD assignment scheme dynamtic assignment scheme.
在线阅读 下载PDF
Optimistic fair exchange E-commerce protocol based on secret sharing 被引量:3
2
作者 Ma Changshe Lei Feiyu Chen Kefei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期858-863,共6页
A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none d... A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none do. A non-interactive optimistic fair exchange e-commerce protocol model based on the publicly verifiable secret sharing is presented. The main idea of our exchange protocol is to interchange verifiable and recoverable keys of the symmetric encryption for participants' items. So it is especially suitable for exchange of large-size items. Furthermore, our protocol is efficient and simple as it does not need interactive proof system which has been adopted by a large quantity of previously proposed fair exchange protocols. Based on a modified (2,2) secret sharing scheme, a concrete non-interactive fair exchange e-commerce protocol is designed. 展开更多
关键词 E-COMMERCE optimistic fair-exchange publicly verfiable secret sharing.
在线阅读 下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
3
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc network(MANET).
在线阅读 下载PDF
Secret sharing scheme with inherited characteristic 被引量:1
4
作者 Ye Zhenjun Meng Fanzhen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期916-918,共3页
To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this schem... To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security. 展开更多
关键词 CRYPTOGRAPHY secret sharing scheme INHERITED equivalent class.
在线阅读 下载PDF
Cheater identifiable visual secret sharing scheme 被引量:1
5
作者 GanZhi ChenKefei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第1期233-236,共4页
The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptog... The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced. 展开更多
关键词 visual cryptography secret sharing VSS.
在线阅读 下载PDF
Empathetic Personification of William Thornhill in The Secret River
6
作者 Ma Lu Peng Qinglong 《学术界》 CSSCI 北大核心 2018年第10期225-236,共12页
Through a detailed text examination,this paper contends that albeit Kate Grenville'sThe Secret River is dedicated to interrogate white actions in the colonial past and expects to contribute to the process of recon... Through a detailed text examination,this paper contends that albeit Kate Grenville'sThe Secret River is dedicated to interrogate white actions in the colonial past and expects to contribute to the process of reconciliation in Australia, it engages sympathy of readers through the empathetic personification of the protagonist William Thornhill,who is subtly positioned as a victim forced into morally dubious actions by extraordinary circumstances. The wrongdoing of the white settlers is normalized in a western conception of possessive logic,the plight of the Aborigines authentically diluted and minimized. This paper thus concludes that The Secret River is another white attempt to legitimize dispossession of the Indigenous and a failure of engagement in the national reconciliation process. This paper further points out that repressing the true history will never set Australia free; acknowledging collective guilt is the only way forward. 展开更多
关键词 Empathetic PERSONIFICATION The secret RIVER SYMPATHY Kate GRENVILLE colonization DISPOSSESSION
在线阅读 下载PDF
On Grillet's Short Story “The Secret Room”——in a Phenomenological Reading Approach
7
作者 He Jian (Lanzhou Municipal Party School, Lanzhou, 730000, China) 《兰州大学学报(社会科学版)》 CSSCI 北大核心 2000年第S1期144-147,共4页
In this paper, the authortries to make a tentative analysis on the short story “The Secret Room” by Alain Robbe Grillet, a French novelist and a contemporary world famous experimentalist of “new novel” form, throu... In this paper, the authortries to make a tentative analysis on the short story “The Secret Room” by Alain Robbe Grillet, a French novelist and a contemporary world famous experimentalist of “new novel” form, through reading in phenomenological approach so as to appreciate his novel style, realize the readers esthetic imagination, meanwhile, to deepen the understanding of the process of phenomenological reading. 展开更多
关键词 The secret Room point-of-view PHENOMENOLOGICAL READING ESTHETIC IMAGINATION
在线阅读 下载PDF
Effects of Dietary Energy Level and Source on Blood Metabolites,Hormone Secretion and Follicular Fluid Composition in Gilts
8
作者 ZHOU Dong-sheng ZHUO Yong +3 位作者 WU De WANG Yan-zhong TAN Xian-yi ZHOU Ping 《畜牧兽医学报》 CAS CSCD 北大核心 2010年第S1期43-50,共8页
The objective of the study was to investigate the effects of dietary energy levels and sources on the blood metabolites,hormone secretion and the composition of follicular fluid in gilts.Fifty-four gilts with initial ... The objective of the study was to investigate the effects of dietary energy levels and sources on the blood metabolites,hormone secretion and the composition of follicular fluid in gilts.Fifty-four gilts with initial body weight of(59±4.2) kg were randomly allotted to six treatments.Treatments were low, normal,and high energy feeding levels,which were 87.5%,100%and 112.5%of recommendatory energy requirements by NRC(1998),respectively,and dietary energy sources(starch or fat).Blood samples and follicular fluids were collected on D18 and D19 of the second estrous cycle.The results showed that plasma concentrations of triglycerides and total cholesterol were higher in the fat group than that in the starch group(P【0.05),but those of glucose were similar between the two energy sources(P】0.05);dietary energy level exerted no effect on blood metabolites concentration(P】0.05).Gilts fed the high energy diet had a higher area under curve of plasma insulin(Insulin AUC),insulin-like growth factor-Ⅰ(IGF-Ⅰ) and leptin than did gilts fed the lower energy diet(P【0.05),but there was no significant difference between fat versus starch(P】0.05).Luteinizing hormone(LH) pulses were higher in gilts fed high energy rather than that in low energy diets(P】0.05),plasma concentration of estradiol(E<sub>2</sub>) was higher in the fat group than that in the starch group(P【0.05).The number of large follicles(diameter≥4 mm) and concentrations of IGF-Ⅰand E<sub>2</sub> in follicular fluid were increasing significant as the level of energy increased(P【0.05),but the numbers of large follicles and follicular fluid composition were not affected by the source of dietary energy(P】0.05).The results indicate that gilts fed high energy diets had elevated plasma concentrations of metabolic hormones,IGF-Ⅰand LH secretion,and increased follicular fluid concentrations of IGF-Ⅰ,E<sub>2</sub> and numbers of large follicles;gilts fed the dietary fat had a higher plasma concentration of cholesterol and E<sub>2</sub>. 展开更多
关键词 dietary energy levels and sources GILTS METABOLITES hormone secretion follicle fluid composition
在线阅读 下载PDF
Design and realization of threshold secret sharing scheme with random weights
9
作者 Ye Zhenjun Fang Zhenming +1 位作者 Wang Chunfeng Meng Fanzhen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期1091-1095,共5页
A new threshold secret sharing scheme is constructed by introducing the concept of share vector, in which the number of shareholders can be adjusted by randomly changing the weights of them. This kind of scheme overco... A new threshold secret sharing scheme is constructed by introducing the concept of share vector, in which the number of shareholders can be adjusted by randomly changing the weights of them. This kind of scheme overcomes the limitation of the static weighted secret sharing schemes that cannot change the weights in the process of carrying out and the deficiency of low efficiency of the ordinary dynamic weighted sharing schemes for its resending process. Thus, this scheme is more suitable to the case that the number of shareholders needs to be changed randomly during the scheme is carrying out. 展开更多
关键词 random weight secret sharing share vector.
在线阅读 下载PDF
Effect of gastric acid secretion for L-pantoprazole sodium in rats
10
《中国药理学通报》 CAS CSCD 北大核心 2015年第B11期247-248,共2页
Aim To observe the effect of L-pantoprazole sodium on gastric acid secretion in rats. Methods The rats single injection to the drug on tail after fasting but help water 48h, then threading the pyloric ligation at the ... Aim To observe the effect of L-pantoprazole sodium on gastric acid secretion in rats. Methods The rats single injection to the drug on tail after fasting but help water 48h, then threading the pyloric ligation at the junction of the pylorus and duodenum, and the animals were fasted and ban water 5h. We remove the total gastrec- tomy, gastric juice was collected and the amount of the volume, and the determination of total acidity、total acidity secretion^pH value. Results L-pantoprazole sodium and pan pantoprazole sodium can significantly reduce the to- tal acidity secretion volume (P 〈 0.05), increased gastric pH (P 〈 0.01 ). D-pantoprazole sodium on gastric acid secretion of gastric juice and total PH had no significant effect ( P 〉 0. 05 ). Conclusion L-pantoprazole sodiumhas significant inhibition of gastric acid secretion, the mechanism of the treatment of peptic ulcer may be through inhibition of proton pump discharge acid effect, to play a role in the protection of gastric mucosa. 展开更多
关键词 TOTAL GASTRIC ACID secretION PH L-pantoprazole SODIUM
在线阅读 下载PDF
Relationship Between Effect of Electro-Acupuncture on Prolactin Secretion and Several Central Neurotransmitters
11
作者 盛培林 谢启文 《中国医科大学学报》 CAS CSCD 1989年第S2期8-13,共6页
We have reported that the central mechanism of acupuncture-induced PRL secretion in non-lactating rats are related to antagonizing hypothalamic dopamine activity; noradrenaline system played little significant role in... We have reported that the central mechanism of acupuncture-induced PRL secretion in non-lactating rats are related to antagonizing hypothalamic dopamine activity; noradrenaline system played little significant role in the acupuncture effect; Υ-aminobutyric-acid system perhaps participated in this effect.This paper further provided evidence that central serotonin and EOP play a stimulatory role in the acupuncture induced secretion of prolactin; acupuncture may antagonize inhibitory effect of H<sub>2</sub> histamine receptor activation on prolactin secretion; the possible role of H<sub>1</sub>-receptor needs further investigation. 展开更多
关键词 ACUPUNCTURE ACUPUNCTURE secretion dopamine PROLACTIN PROLACTIN SEROTONIN HYPOTHALAMIC NALOXONE homeostasis
在线阅读 下载PDF
Proteomic mapping of secreted proteins of Trichoderma spp.
12
作者 Li S Bramley P M +1 位作者 Smith J Cannon P F 《浙江大学学报(农业与生命科学版)》 CAS CSCD 北大核心 2004年第4期455-455,共1页
A series of highly taxonomically diverse Trichoderma strains were investigated using proteomic approaches, to investigate the utility of protein profiles as taxonomic markers and to identify proteins of potential econ... A series of highly taxonomically diverse Trichoderma strains were investigated using proteomic approaches, to investigate the utility of protein profiles as taxonomic markers and to identify proteins of potential economic importance. Initial studies have focused on a comparison of single strains of T. aureoviride, T. saturnisporum, T. polysporum, T. longbrachiatum and T. spirale, along with two strains of T. harzianum. All seven strains were grown in synthetic medium supplemented with 2%(w/v) glycerol, to maximize the diversity of extracellular protein production. Samples of secreted protein were separated by 2D gel electrophoresis and will be characterized by MALDI-TOF peptide fingerprinting. 展开更多
关键词 蛋白质组学 木霉属 真菌 多肽 指纹识别
在线阅读 下载PDF
Whole Genome RNAi Screen in C. elegans Identifies CAB-1 as a Novel Regulator of DCV Secretion
13
作者 Xia Zhi-Ping Chen Yan +3 位作者 Sheng Yi Yi Ya-Lan Song E-Li Xu Tao 《生物化学与生物物理进展》 SCIE CAS CSCD 北大核心 2014年第8期787-795,共9页
关键词 摘要 编辑部 编辑工作 读者
在线阅读 下载PDF
原发性双侧肾上腺大结节增生与肾上腺皮质醇分泌腺瘤的临床特征比较 被引量:1
14
作者 李冰 杨明秀 +15 位作者 许怀瑾 王竞萱 吴清正 王雅静 李一君 陈康 程愈 倪奇 尹雅琪 臧丽 郭清华 巴建明 谷伟军 窦京涛 吕朝晖 母义明 《解放军医学杂志》 北大核心 2025年第7期779-785,共7页
目的比较分析原发性双侧肾上腺大结节增生(PBMAH)与肾上腺皮质醇分泌腺瘤(CPA)的临床特征,提高对两种疾病的认识。方法回顾性分析2014年9月-2024年8月解放军总医院第一医学中心内分泌科诊断的85例PBMAH患者(PBMAH组)和195例CPA患者(CPA... 目的比较分析原发性双侧肾上腺大结节增生(PBMAH)与肾上腺皮质醇分泌腺瘤(CPA)的临床特征,提高对两种疾病的认识。方法回顾性分析2014年9月-2024年8月解放军总医院第一医学中心内分泌科诊断的85例PBMAH患者(PBMAH组)和195例CPA患者(CPA组)的临床资料。比较两组患者的人口学特征、合并症、生化指标、血促肾上腺皮质激素-皮质醇(ACTH-F)水平、肾上腺影像学特征及治疗情况。结果(1)一般特征:与CPA组比较,PBMAH组患者诊断时年龄较大,男性占比较高。(2)临床特征:与CPA组比较,PBMAH组病程较长,亚临床库欣综合征(CS)的比例较高,合并高血压、糖耐量减低或糖尿病、骨量减少或骨质疏松的比例更高,且血钾水平更高,差异均有统计学意义(P<0.01)。(3)激素水平:PBMAH组与CPA组均表现为促肾上腺皮质激素-皮质醇(ACTH-F)节律紊乱,皮质醇水平升高、ACTH被抑制。与PBMAH组比较,CPA组患者皮质醇自主分泌能力较强,表现为血清F_(0:00)、F_(16:00)及24h尿游离皮质醇(24h UFC)水平升高,血清ACTH_(8:00)及ACTH_(16:00)水平较低;小剂量地塞米松抑制试验(LDDST)后,CPA组的ACTH和血皮质醇的抑制率较低,血皮质醇和24h UFC反常升高的比例较高,差异均有统计学意义(P<0.01)。结论PBMAH较CPA病程长,且合并代谢紊乱的比例高,大多表现为亚临床CS;CPA的皮质醇自主分泌能力较强,LDDST后皮质醇不易被抑制,皮质醇及24h UFC反常升高的现象更明显。 展开更多
关键词 库欣综合征 原发性双侧肾上腺大结节增生 肾上腺皮质醇分泌腺瘤
在线阅读 下载PDF
智能物联网中高效安全的自适应量化联邦学习 被引量:2
15
作者 马海英 沈金宇 +2 位作者 杨天玲 仇健 王占君 《计算机应用研究》 北大核心 2025年第8期2503-2510,共8页
针对现有自适应量化联邦学习存在参与者本地模型参数隐私泄露的问题,提出一种适合智能物联网的高效安全的自适应量化联邦学习方案。该方案利用自适应量化技术减少参与者的通信开销,设置两个聚合服务器,将Diffie-Hellman密钥交换协议、... 针对现有自适应量化联邦学习存在参与者本地模型参数隐私泄露的问题,提出一种适合智能物联网的高效安全的自适应量化联邦学习方案。该方案利用自适应量化技术减少参与者的通信开销,设置两个聚合服务器,将Diffie-Hellman密钥交换协议、秘密共享方案和不经意传输协议相结合,构造一种保护本地模型参数隐私的安全聚合协议,并在合理假设下证明所提方案的安全性。实验结果表明该方案能够获得较高准确率的全局模型,极大减少了参与者的通信开销和隐私保护计算开销,非常适用于智能物联网中资源受限的轻量级物联网设备。 展开更多
关键词 联邦学习 隐私保护 自适应量化 秘密共享 不经意传输协议
在线阅读 下载PDF
基于可验证秘密共享与智能合约的隐私保护算法 被引量:1
16
作者 张磊 曹明增 +2 位作者 张成林 何丽丽 纪莉莉 《计算机应用研究》 北大核心 2025年第4期1223-1229,共7页
针对现有用户协作算法存在共谋攻击、背景知识攻击以及用户协作意愿等问题,基于可验证秘密共享与智能合约提出了一种用户协作隐私保护算法(privacy protection algorithm based on verifiable secret sharing and smart contracts,VSS-S... 针对现有用户协作算法存在共谋攻击、背景知识攻击以及用户协作意愿等问题,基于可验证秘密共享与智能合约提出了一种用户协作隐私保护算法(privacy protection algorithm based on verifiable secret sharing and smart contracts,VSS-SCPPA)。该算法首先利用可验证秘密共享算法对用户查询信息进行加密和分裂,并提供系数承诺以验证子秘密数据的完整性。其次,结合智能合约与差分隐私技术设计了一种用户选择算法,构建匿名集。对该算法在抵御串通攻击方面的有效性进行了分析。通过在Geolife与BerlinMOD数据集上的实验,结果显示VSS-SCPPA的隐私保护性更高。与Tr-privacy、Ik-anonymity和GCS相比,VSS-SCPPA的效率分别提高了约86.34%、99.27%和99.19%。VSS-SCPPA在提高隐私保护性的同时显著提升了算法效率,证明了其在用户协作隐私保护中的有效性。 展开更多
关键词 用户协作 可验证秘密共享 智能合约 差分隐私 用户激励
在线阅读 下载PDF
人工智能时代商业秘密保护规则重塑 被引量:2
17
作者 冯晓青 李可 《知识产权》 北大核心 2025年第5期21-38,共18页
人工智能凭借其强大的数据处理与自主学习能力,极大提升了信息的生成与利用效率,同时也对商业秘密保护提出了新挑战。激励理论在人工智能环境下并未失效,商业秘密的开发、使用和后续优化仍需被激励。从法政策学的视角看,人工智能生成的... 人工智能凭借其强大的数据处理与自主学习能力,极大提升了信息的生成与利用效率,同时也对商业秘密保护提出了新挑战。激励理论在人工智能环境下并未失效,商业秘密的开发、使用和后续优化仍需被激励。从法政策学的视角看,人工智能生成的信息在符合商业秘密法律要件的情况下,理应受到商业秘密制度的保护。在权益归属方面,将用户确认为人工智能生成商业秘密的权益人,契合商业秘密保护立法宗旨与政策目标。在此基础上,现行法律制度应当结合人工智能的认知水平,优化对商业秘密可知悉性的界定,强化对商业秘密保护措施的要求,并明确人工智能手段在商业竞争中的合法应用边界,以确保商业秘密保护制度在人工智能时代的有效性。 展开更多
关键词 人工智能 商业秘密 不正当竞争 知识产权
在线阅读 下载PDF
替代成本视角下商业秘密法的理论解构 被引量:1
18
作者 崔国斌 《政治与法律》 北大核心 2025年第7期20-44,共25页
在商业秘密侵权诉讼中,相关人员通过替代信息源、反向工程或独立研发等渠道合法获取诉争商业秘密的可能性及相应的替代成本,对于权利人的侵权主张有重要的影响。从替代成本视角解构商业秘密法,能够在客体要件、许可规则、损害赔偿、禁... 在商业秘密侵权诉讼中,相关人员通过替代信息源、反向工程或独立研发等渠道合法获取诉争商业秘密的可能性及相应的替代成本,对于权利人的侵权主张有重要的影响。从替代成本视角解构商业秘密法,能够在客体要件、许可规则、损害赔偿、禁令期限等方面获得有益的理论启示。商业秘密具有秘密性,处在“不容易获取”状态,通常意味着非经商业秘密权利人许可,相关人员无法通过合法渠道获得该商业秘密或者需要耗费实质性替代成本才能获得。权利人的保密措施应实质增加相关人员通过反向工程获取商业秘密的替代成本,否则未达到商业秘密法所要求的合理程度。创造性只是帮助证明相关人员需要付出实质性替代成本的信息中介,而非秘密性要件的内在要求。这正是法律要求要素组合类技术秘密具有创造性的原因所在。替代成本的大小具有一定区间,这意味着商业秘密的秘密性注定只是相对的,即便商业信息可以通过替代渠道获得,只要替代成本是实质性的,商业信息也依然具有秘密性。公众获取商业秘密的替代成本会动态变化,法院在处理许可协议效力争议、确定损害赔偿数额和禁令救济期限时,均应考虑这一变化因素。 展开更多
关键词 商业秘密 秘密性 替代成本 反向工程 创造性 损害赔偿
在线阅读 下载PDF
生成式人工智能驱动下企业数据商业秘密保护制度调适 被引量:1
19
作者 马一德 汪婷 《山东师范大学学报(社会科学版)》 北大核心 2025年第4期107-120,F0002,共15页
生成式人工智能技术的应用对企业数据商业秘密保护构成结构性挑战。企业数据在训练数据中隐性扩散、在模型应用中失控流转,引发商业秘密流动失控风险,并导致商业秘密构成要件面临双重制度困境:保密性因保密意愿否定与技术不可控性遭遇... 生成式人工智能技术的应用对企业数据商业秘密保护构成结构性挑战。企业数据在训练数据中隐性扩散、在模型应用中失控流转,引发商业秘密流动失控风险,并导致商业秘密构成要件面临双重制度困境:保密性因保密意愿否定与技术不可控性遭遇主客观解构,秘密性因输出结果相似性与数据可及性而趋于形式化。由此引发的传统法律规则与技术特性之间的适配性危机亟待破解。与此同时,数字时代催生了商业秘密保护理论的三重范式转型,即数据控制权理论突破绝对保密传统,合作保密机制重构保密与共享的二元对立,以及动态价值评估体系承认数据训练贡献与组合秘密独立价值。基于此,需构建多维协同治理方案:规则层面建立动态化构成要件认定标准;技术层面依托区块链存证、隐私计算与算法透明度监管工具实现数据流通风险管控;实施保障层面则形成政企协同、行业自律与司法规则统一的三重机制。该方案旨在为平衡技术创新激励与数据安全维护提供法治解方,并为数据要素市场化配置中的产权保护提供范式参考。 展开更多
关键词 生成式人工智能 企业数据 商业秘密保护 数据控制权 制度调适 协同治理
在线阅读 下载PDF
侵犯商业秘密罪“获取型”行为研究 被引量:1
20
作者 刘宪权 肖宸彰 《法治研究》 北大核心 2025年第3期103-115,共13页
侵犯商业秘密罪侵犯的主要法益为商业竞争秩序,次要法益为商业秘密权。侵犯商业秘密罪中的“获取型”行为不属于预备行为实行化,其具有独立的可罚性。“获取型”行为并非一概构成本罪,需要以法益为指引对本罪的规制范围进行限缩。对于... 侵犯商业秘密罪侵犯的主要法益为商业竞争秩序,次要法益为商业秘密权。侵犯商业秘密罪中的“获取型”行为不属于预备行为实行化,其具有独立的可罚性。“获取型”行为并非一概构成本罪,需要以法益为指引对本罪的规制范围进行限缩。对于非法获取技术信息的行为,应当以实际许可使用费中的普通许可使用费作为“重大损失”数额的认定标准。没有实际许可使用费的,应该以虚拟许可使用费作为计算“重大损失”的数额。对经营信息的“获取型”行为,或者以经营信息的形成成本作为“重大损失”数额的认定标准,或者以补救费用作为“重大损失”数额的认定标准。若同时存在对技术信息的“获取型”行为与“使用型”行为,应当采用销售利润损失与合理许可费中数额较大的一方作为“重大损失”数额的认定标准。 展开更多
关键词 侵犯商业秘密罪“获取型”行为 预备行为实行化 虚拟许可使用费 重大损失
在线阅读 下载PDF
上一页 1 2 167 下一页 到第
使用帮助 返回顶部