Search scope:
排序: Display mode:
Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2, Pages 258-277 doi: 10.1631/FITEE.2000366
Keywords: Post-quantum cryptography Threshold proxy re-encryption Lattices Robustness Decentralization
Qiang FU,Jiahong LI,Tianxiao LI,Dong LIU,Song CUI
Frontiers of Agricultural Science and Engineering 2016, Volume 3, Issue 3, Pages 231-240 doi: 10.15302/J-FASE-2016101
Keywords: economic-social-ecological uncertainty harmonious entropy surface water and groundwater utilization threshold
Frontiers in Energy doi: 10.1007/s11708-023-0870-z
Keywords: threshold solar water splitting hydrogen III
Presence and Antimicrobial Susceptibility of RE-cmeABC-Positive Campylobacter Isolated Article
Dejun Liu, Weiwen Liu, Xing Li, Hong Yao, Zhangqi Shen, Yang Wang, Jianzhong Shen
Engineering 2020, Volume 6, Issue 1, Pages 34-39 doi: 10.1016/j.eng.2019.10.013
Keywords: RE-cmeABC Campylobacter Ciprofloxacin Florfenicol
Xiaohuan Wang, Peng Zou, Fan Wu, Lu Lu, Shibo Jiang
Frontiers of Medicine 2017, Volume 11, Issue 4, Pages 449-461 doi: 10.1007/s11684-017-0589-5
In recent years, unexpected outbreaks of infectious diseases caused by emerging and re-emerging virusesreplication and translation, thereby demonstrating potent therapeutic effect against various emerging and re-emerging
Keywords: emerging and re-emerging viruses small-molecule inhibitor coronavirus Ebola virus Zika virus life cycle
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
Keywords: WLAN encryption WEP rekey
Responses to emerging and re-emerging infectious diseases: One world, One health
Jianqing Xu, Jianguo Xu
Frontiers of Medicine 2018, Volume 12, Issue 1, Pages 1-2 doi: 10.1007/s11684-018-0619-y
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
Fracture model for the prediction of the electrical percolation threshold in CNTs/Polymer composites
Yang SHEN, Pengfei HE, Xiaoying ZHUANG
Frontiers of Structural and Civil Engineering 2018, Volume 12, Issue 1, Pages 125-136 doi: 10.1007/s11709-017-0396-8
Keywords: electrical percolation CNTs/Polymer composites fracture model electric conductivity tunnelling effects
Re-electrification in China Under the Carbon Neutrality Goal
Shu Yinbiao , Xie Dian , Zhao Liang , Gao Yajing , Zhao Yong , Zhou Chaoyang
Strategic Study of CAE 2022, Volume 24, Issue 3, Pages 195-204 doi: 10.15302/J-SSCAE-2022.03.020
Keywords: re-electrification carbon neutrality energy transition electric energy substitution
Influence of increasing numbers of RE-inverters on the power quality in the distribution grids: A PQ
Przemyslaw JANIK, Grzegorz KOSOBUDZKI, Harald SCHWARZ
Frontiers in Energy 2017, Volume 11, Issue 2, Pages 155-167 doi: 10.1007/s11708-017-0469-3
Keywords: power quality harmonics sags photovoltaic(PV) system doubly feed induction generator (DFIG) inverters
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing
Blind identification of threshold auto-regressive model for machine fault diagnosis
LI Zhinong, HE Yongyong, CHU Fulei, WU Zhaotong
Frontiers of Mechanical Engineering 2007, Volume 2, Issue 1, Pages 46-49 doi: 10.1007/s11465-007-0007-9
Keywords: speed-up classifier practical extraction experiment
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
Qiyong Liu, Wenbo Xu, Shan Lu, Jiafu Jiang, Jieping Zhou, Zhujun Shao, Xiaobo Liu, Lei Xu, Yanwen Xiong, Han Zheng, Sun Jin, Hai Jiang, Wuchun Cao, Jianguo Xu
Frontiers of Medicine 2018, Volume 12, Issue 1, Pages 3-22 doi: 10.1007/s11684-017-0605-9
Keywords: infectious disease profile emerging infectious diseases influence factor
Title Author Date Type Operation
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Journal Article
Utilization threshold of surface water and groundwater based on the system optimization of crop planting
Qiang FU,Jiahong LI,Tianxiao LI,Dong LIU,Song CUI
Journal Article
Approaching the commercial threshold of solar water splitting toward hydrogen by III-nitrides nanowires
Journal Article
Presence and Antimicrobial Susceptibility of RE-cmeABC-Positive Campylobacter Isolated
Dejun Liu, Weiwen Liu, Xing Li, Hong Yao, Zhangqi Shen, Yang Wang, Jianzhong Shen
Journal Article
Development of small-molecule viral inhibitors targeting various stages of the life cycle of emerging and re-emerging
Xiaohuan Wang, Peng Zou, Fan Wu, Lu Lu, Shibo Jiang
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
Responses to emerging and re-emerging infectious diseases: One world, One health
Jianqing Xu, Jianguo Xu
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
Fracture model for the prediction of the electrical percolation threshold in CNTs/Polymer composites
Yang SHEN, Pengfei HE, Xiaoying ZHUANG
Journal Article
Re-electrification in China Under the Carbon Neutrality Goal
Shu Yinbiao , Xie Dian , Zhao Liang , Gao Yajing , Zhao Yong , Zhou Chaoyang
Journal Article
Influence of increasing numbers of RE-inverters on the power quality in the distribution grids: A PQ
Przemyslaw JANIK, Grzegorz KOSOBUDZKI, Harald SCHWARZ
Journal Article
Constructing pairing-free certificateless public key encryption with keyword search
Yang LU, Ji-guo LI
Journal Article
Blind identification of threshold auto-regressive model for machine fault diagnosis
LI Zhinong, HE Yongyong, CHU Fulei, WU Zhaotong
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article