Resource Type

Journal Article 72

Conference Videos 2

Year

2023 11

2022 7

2021 2

2020 5

2019 3

2018 8

2017 7

2016 4

2015 4

2014 1

2013 1

2011 3

2009 3

2008 4

2007 1

2006 1

2005 1

2004 3

2003 2

2002 1

open ︾

Keywords

Encryption 4

Attribute-based encryption 3

Cloud storage 3

Access control 2

Block cipher 2

Embedded security 2

Internet of Things (IoT) 2

Lightweight cryptography 2

encryption 2

Campylobacter 1

k-nearest neighbor algorithm (k-NN) 1

Abrasive waterjet 1

Adaptive watermarking 1

Adsorption 1

Adverse geology 1

Aggregation-induced emission 1

Algal bloom 1

Alteration 1

Anomaly threshold 1

open ︾

Search scope:

排序: Display mode:

Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2,   Pages 258-277 doi: 10.1631/FITEE.2000366

Abstract: (TPRE) can prevent collusion between a single proxy and a delegatee from converting arbitrary files againstwishes of the delegator through multiple proxies, and can also provide normal services even when certain proxywhich not only effectively hides the delegator‘s private key information, but also decentralizes the proxypower by splitting the re-encryption key., including a file-sharing system based on a blockchain network and a robust key escrow system with threshold

Keywords: Post-quantum cryptography     Threshold proxy re-encryption     Lattices     Robustness     Decentralization    

Utilization threshold of surface water and groundwater based on the system optimization of crop planting

Qiang FU,Jiahong LI,Tianxiao LI,Dong LIU,Song CUI

Frontiers of Agricultural Science and Engineering 2016, Volume 3, Issue 3,   Pages 231-240 doi: 10.15302/J-FASE-2016101

Abstract: system is suitable when surface water mining ratio is in 47.84%–48.04% and the groundwater exploitation threshold

Keywords: economic-social-ecological     uncertainty     harmonious entropy     surface water and groundwater     utilization threshold    

Approaching the commercial threshold of solar water splitting toward hydrogen by III-nitrides nanowires

Frontiers in Energy doi: 10.1007/s11708-023-0870-z

Abstract: Approaching the commercial threshold of solar water splitting toward hydrogen by III-nitrides nanowires

Keywords: threshold solar water     splitting hydrogen III    

Presence and Antimicrobial Susceptibility of RE-cmeABC-Positive Campylobacter Isolated Article

Dejun Liu, Weiwen Liu, Xing Li, Hong Yao, Zhangqi Shen, Yang Wang, Jianzhong Shen

Engineering 2020, Volume 6, Issue 1,   Pages 34-39 doi: 10.1016/j.eng.2019.10.013

Abstract: RE-CmeABC is a newly identified resistance-enhancing multidrug efflux pump of C.In this study, we analyzed the presence and antimicrobial susceptibility of RE-cmeABC-positiveCampylobacter isolates (931 C. coli and 157 C. jejuni) were recovered from the REWe detected 122 (11.2%) RE-cmeABC-positive isolates of chicken origin, including 111 (70.7%)The level of resistance was significantly different in 111 RE-cmeABC-positive C. jejuni<

Keywords: RE-cmeABC     Campylobacter     Ciprofloxacin     Florfenicol    

Development of small-molecule viral inhibitors targeting various stages of the life cycle of emerging and re-emerging

Xiaohuan Wang, Peng Zou, Fan Wu, Lu Lu, Shibo Jiang

Frontiers of Medicine 2017, Volume 11, Issue 4,   Pages 449-461 doi: 10.1007/s11684-017-0589-5

Abstract:

In recent years, unexpected outbreaks of infectious diseases caused by emerging and re-emerging virusesreplication and translation, thereby demonstrating potent therapeutic effect against various emerging and re-emerging

Keywords: emerging and re-emerging viruses     small-molecule inhibitor     coronavirus     Ebola virus     Zika virus     life cycle    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

Responses to emerging and re-emerging infectious diseases: One world, One health

Jianqing Xu, Jianguo Xu

Frontiers of Medicine 2018, Volume 12, Issue 1,   Pages 1-2 doi: 10.1007/s11684-018-0619-y

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypted

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Fracture model for the prediction of the electrical percolation threshold in CNTs/Polymer composites

Yang SHEN, Pengfei HE, Xiaoying ZHUANG

Frontiers of Structural and Civil Engineering 2018, Volume 12, Issue 1,   Pages 125-136 doi: 10.1007/s11709-017-0396-8

Abstract: In this paper, we propose a 3D stochastic model to predict the percolation threshold and the effective

Keywords: electrical percolation     CNTs/Polymer composites     fracture model     electric conductivity     tunnelling effects    

Re-electrification in China Under the Carbon Neutrality Goal

Shu Yinbiao , Xie Dian , Zhao Liang , Gao Yajing , Zhao Yong , Zhou Chaoyang

Strategic Study of CAE 2022, Volume 24, Issue 3,   Pages 195-204 doi: 10.15302/J-SSCAE-2022.03.020

Abstract: Implementing re-electrification to realize clean substitution at the energy production side and electricIn this article, we analyze the concept of re-electrification and propose to help China achieve low-carbondevelopment with re-electrification considering the basic national conditions and resource endowmentThe development prospect of re-electrification is also proposed.The research results show that re-electrification will significantly promote carbon neutrality.

Keywords: re-electrification     carbon neutrality     energy transition     electric energy substitution    

Influence of increasing numbers of RE-inverters on the power quality in the distribution grids: A PQ

Przemyslaw JANIK, Grzegorz KOSOBUDZKI, Harald SCHWARZ

Frontiers in Energy 2017, Volume 11, Issue 2,   Pages 155-167 doi: 10.1007/s11708-017-0469-3

Abstract: This paper presents the selected power quality (PQ) indicia of a wind generator and a photovoltaic installation considered to be the representative of medium voltage and low voltage distribution grids. The analysis of measured values suggests that the decrease in PQ is a case of specific combination of distributed generation, grid parameters and load behaviour. Modern generators have a limited impact on PQ. On the other hand, fluctuations in power generation are regarded as an emerging PQ indicator. The growing number of distributed renewable installations causes stochastic, variable, and hardly predictable power flows in the distribution grid. The nature of fluctuations in wind and solar generation is different. In both cases, new indexes for the quantification of fluctuations are needed and are yet not standardised. Proper assessment of these fluctuations enables definition of useful fluctuation limits and rules for optimal storage system integration.

Keywords: power quality     harmonics     sags     photovoltaic(PV) system     doubly feed induction generator (DFIG)     inverters    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data withoutMotivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

Blind identification of threshold auto-regressive model for machine fault diagnosis

LI Zhinong, HE Yongyong, CHU Fulei, WU Zhaotong

Frontiers of Mechanical Engineering 2007, Volume 2, Issue 1,   Pages 46-49 doi: 10.1007/s11465-007-0007-9

Abstract: A blind identification method was developed for the threshold auto-regressive (TAR) model.

Keywords: speed-up     classifier     practical     extraction     experiment    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryptionTo reduce the message-ciphertext expansion factor of the proposed scheme to log , the encryption algorithmof this scheme is built based on Gentry’s encryption scheme, by which m bits of plaintext are encryptedinto m log q bits of ciphertext by a one time encryption operation.

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

Landscape of emerging and re-emerging infectious diseases in China: impact of ecology, climate, and behavior

Qiyong Liu, Wenbo Xu, Shan Lu, Jiafu Jiang, Jieping Zhou, Zhujun Shao, Xiaobo Liu, Lei Xu, Yanwen Xiong, Han Zheng, Sun Jin, Hai Jiang, Wuchun Cao, Jianguo Xu

Frontiers of Medicine 2018, Volume 12, Issue 1,   Pages 3-22 doi: 10.1007/s11684-017-0605-9

Abstract: This review summarizes the current experiences and lessons from China in managing emerging and re-emerging

Keywords: infectious disease profile     emerging infectious diseases     influence factor    

Title Author Date Type Operation

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Journal Article

Utilization threshold of surface water and groundwater based on the system optimization of crop planting

Qiang FU,Jiahong LI,Tianxiao LI,Dong LIU,Song CUI

Journal Article

Approaching the commercial threshold of solar water splitting toward hydrogen by III-nitrides nanowires

Journal Article

Presence and Antimicrobial Susceptibility of RE-cmeABC-Positive Campylobacter Isolated

Dejun Liu, Weiwen Liu, Xing Li, Hong Yao, Zhangqi Shen, Yang Wang, Jianzhong Shen

Journal Article

Development of small-molecule viral inhibitors targeting various stages of the life cycle of emerging and re-emerging

Xiaohuan Wang, Peng Zou, Fan Wu, Lu Lu, Shibo Jiang

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

Responses to emerging and re-emerging infectious diseases: One world, One health

Jianqing Xu, Jianguo Xu

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Fracture model for the prediction of the electrical percolation threshold in CNTs/Polymer composites

Yang SHEN, Pengfei HE, Xiaoying ZHUANG

Journal Article

Re-electrification in China Under the Carbon Neutrality Goal

Shu Yinbiao , Xie Dian , Zhao Liang , Gao Yajing , Zhao Yong , Zhou Chaoyang

Journal Article

Influence of increasing numbers of RE-inverters on the power quality in the distribution grids: A PQ

Przemyslaw JANIK, Grzegorz KOSOBUDZKI, Harald SCHWARZ

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Blind identification of threshold auto-regressive model for machine fault diagnosis

LI Zhinong, HE Yongyong, CHU Fulei, WU Zhaotong

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

Landscape of emerging and re-emerging infectious diseases in China: impact of ecology, climate, and behavior

Qiyong Liu, Wenbo Xu, Shan Lu, Jiafu Jiang, Jieping Zhou, Zhujun Shao, Xiaobo Liu, Lei Xu, Yanwen Xiong, Han Zheng, Sun Jin, Hai Jiang, Wuchun Cao, Jianguo Xu

Journal Article