Resource Type

Journal Article 58

Conference Videos 2

Year

2023 14

2022 6

2021 5

2020 4

2019 6

2018 4

2017 2

2016 3

2015 2

2013 1

2012 1

2011 3

2010 1

2009 2

2007 2

2004 1

2002 2

2000 1

open ︾

Keywords

Encryption 4

Attribute-based encryption 3

Cloud storage 3

overall water splitting 3

Access control 2

Block cipher 2

Embedded security 2

Internet Plus 2

Internet of Things (IoT) 2

Lightweight cryptography 2

User privacy 2

development strategy 2

encryption 2

hydrogen 2

photocatalysis 2

Adaptive watermarking 1

Aggregation-induced emission 1

Anonymity 1

Anticounterfeiting 1

open ︾

Search scope:

排序: Display mode:

Research on overall encryption adjustment technology of offshore oil field

Zhang Fengjiu,Luo Xianbo,Liu Yingxian,Zhao Chunming

Strategic Study of CAE 2011, Volume 13, Issue 5,   Pages 34-40

Abstract:

Take SZ36-1 oilfield as an example, offshore fields of heavy oil have stepped into later stage in development life and revealed problems gradually for serious injection/production contradiction, big variation for producing reserves in interlayer and plane, much higher for well-controlled reserves, lower for both of oil production rate and oil recovery, changing fast for composite water cut rising and production decline. In view of the challenge for development of offshore fields of heavy oil in China, we put forward the study of comprehensive adjustment for offshore fields in large scale firstly. Because of the special development mode of offshore fields, the proven research thinking and technical route for comprehensive adjustment used by onshore oilfields could not be copied to offshore fields. The research technology of comprehensive adjustment for integral well pattern thickening faces many technical difficulties, so now this research makes a combination of self-characteristics and development mode of SZ36-1 oilfield to put forward a full suite of research thinking and research methods for integral potential tapping and adjustment, and the proposal of comprehensive adjustment for integral well pattern thickening in SZ36-1 oilfield phase I. A water injection well pattern of inverted nine spot is transformed into a well pattern of line drive after pattern adjustment to try a development modes of "direction well & horizontal well network" . The implementation effect of integral well pattern thickening makes a good effect for greatly improved state of water flooding, improved from 80.5 % before adjustment to 91.3 % after adjustment for producing degree of water flooding, forecasting greatly improved recovery for 10.4 %. The technique of adjustment for integral well pattern thickening is sure to be popularized and applied among the similar oilfields.

Keywords: heavy oil     overall encryption     well pattern adjustment     water flooding     simulation    

Recent advances of hydrogen production through particulate semiconductor photocatalytic overall water

Frontiers in Energy 2022, Volume 16, Issue 1,   Pages 49-63 doi: 10.1007/s11708-022-0817-9

Abstract: In this paper, the cutting-edge research within the overall water splitting system is summarized fromthe one-step photocatalytic overall water splitting (POWS) system to the two-step system and the cocatalystsThis mini-review provides a picture of survey of recent progress of relevant overall water splitting

Keywords: photocatalysis     overall water splitting     hydrogen    

Facile route to achieve MoSe-NiSe on nickel foam as efficient dual functional electrocatalysts for overall

Frontiers in Energy 2022, Volume 16, Issue 3,   Pages 483-491 doi: 10.1007/s11708-022-0813-0

Abstract: Since the catalytic activity of present nickel-based synthetic selenide is still to be improved, MoSe2-Ni3Se2 was synthesized on nickel foam (NF) (MoSe2-Ni3Se2/NF) by introducing a molybdenum source. After the molybdenum source was introduced, the surface of the catalyst changed from a single-phase structure to a multi-phase structure. The catalyst surface with enriched active sites and the synergistic effect of MoSe2 and Ni3Se2 together enhance the hydrogen evolution reactions (HER), the oxygen evolution reactions (OER), and electrocatalytic total water splitting activity of the catalyst. The overpotential of the MoSe2-Ni3Se2/NF electrocatalyst is only 259 mV and 395 mV at a current density of 100 mA/cm2 for HER and OER, respectively. MoSe2-Ni3Se2/NF with a two-electrode system attains a current density of 10 mA/cm2 at 1.60 V. In addition, the overpotential of HER and OER of MoSe2-Ni3Se2/NF within 80000 s and the decomposition voltage of electrocatalytic total water decomposition hardly changed, showing an extremely strong stability. The improvement of MoSe2-Ni3Se2/NF catalytic activity is attributed to the establishment of the multi-phase structure and the optimized inoculation of the multi-component and multi-interface.

Keywords: three-dimensional molybdenum nanomaterials     hydrogen evolution reaction     oxygen evolution reaction     overall    

State-of-the-art progress in overall water splitting of carbon nitride based photocatalysts

Bing LUO, Yuxin ZHAO, Dengwei JING

Frontiers in Energy 2021, Volume 15, Issue 1,   Pages 600-620 doi: 10.1007/s11708-021-0737-0

Abstract: Therefore, in this review, the state-of-the-art advances in g-C N based photocatalysts for overall water

Keywords: photocatalysis     overall water splitting     carbon nitride     hydrogen    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

NiFeRuOx nanosheets on Ni foam as an electrocatalyst for efficient overall

Frontiers of Chemical Science and Engineering 2023, Volume 17, Issue 11,   Pages 1698-1706 doi: 10.1007/s11705-023-2334-8

Abstract: NiFeRuOx/NF displays high electrocatalytic activity and stability for overall alkaline

Keywords: NiFeRuOx nanosheets     Ni foam     electrocatalysis     overall seawater splitting     solar-driven    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypted

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data withoutMotivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryptionTo reduce the message-ciphertext expansion factor of the proposed scheme to log , the encryption algorithmof this scheme is built based on Gentry’s encryption scheme, by which m bits of plaintext are encryptedinto m log q bits of ciphertext by a one time encryption operation.

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

The Mative Force for Drawing up the Land Use Overall Planand Its Validity Term and Characteristic

Li Boheng

Strategic Study of CAE 2007, Volume 9, Issue 3,   Pages 1-5

Abstract:

Drawing up the overall plan for land use is the guarantee to provideIn order to better serve the economic development, the author proposed to divide the overall plan into

Keywords: land use     overall plan     proposal     motive force     validity term    

BORON: an ultra-lightweight and low power encryption design for pervasive computing Article

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 317-331 doi: 10.1631/FITEE.1500415

Abstract: We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.

Keywords: Lightweight cryptography     SP network     Block cipher     Internet of Things (IoT)     Encryption     Embedded security    

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Engineering 2021, Volume 7, Issue 6,   Pages 787-797 doi: 10.1016/j.eng.2021.03.011

Abstract: This paper presents a novel attribute-based encryption (ABE) approach for computer-aided design (CAD)The proposed encryption scheme is demonstrated to be secure under the standard assumption.

Keywords: Information security     Cloud-based design and manufacture     Co-design     CAD assembly models     Attribute-based encryption    

AIE-Active Freeze-Tolerant Hydrogels Enable Multistage Information Encryption and Decryption at Subzero Article

Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang

Engineering 2023, Volume 23, Issue 4,   Pages 82-89 doi: 10.1016/j.eng.2022.03.021

Abstract: aggregation-induced emission (AIE)-active freeze-tolerant hydrogels are developed, which enable information encryptionluminogens presents turn-off/-on fluorescence, thereby enabling the use of these hydrogels for information encryption

Keywords: Freeze-tolerant hydrogels     Aggregation-induced emission     Encryption     Decryption     Anticounterfeiting    

Generic user revocation systems for attribute-based encryption in cloud storage None

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11,   Pages 1362-1384 doi: 10.1631/FITEE.1800405

Abstract: Attribute-based encryption (ABE) not only protects data secrecy, but also has ciphertexts or decryptiongeneric user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption

Keywords: Attribute-based encryption     Generic user revocation     User privacy     Cloud storage     Access control    

sub>S4 nanoparticles-anchored porous carbon nanofibers as bifunctional electrocatalyst for overall

Frontiers of Chemical Science and Engineering 2023, Volume 17, Issue 11,   Pages 1707-1717 doi: 10.1007/s11705-023-2308-x

Abstract: The assembled electrolyzer requires 1.64 V to achieve 10 mA·cm–2 for overall water-splitting

Keywords: nanoparticle     sulfur vacancy     porous carbon nanofiber     transition metal sulfides     electrolysis    

Title Author Date Type Operation

Research on overall encryption adjustment technology of offshore oil field

Zhang Fengjiu,Luo Xianbo,Liu Yingxian,Zhao Chunming

Journal Article

Recent advances of hydrogen production through particulate semiconductor photocatalytic overall water

Journal Article

Facile route to achieve MoSe-NiSe on nickel foam as efficient dual functional electrocatalysts for overall

Journal Article

State-of-the-art progress in overall water splitting of carbon nitride based photocatalysts

Bing LUO, Yuxin ZHAO, Dengwei JING

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

NiFeRuOx nanosheets on Ni foam as an electrocatalyst for efficient overall

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

The Mative Force for Drawing up the Land Use Overall Planand Its Validity Term and Characteristic

Li Boheng

Journal Article

BORON: an ultra-lightweight and low power encryption design for pervasive computing

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Journal Article

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Journal Article

AIE-Active Freeze-Tolerant Hydrogels Enable Multistage Information Encryption and Decryption at Subzero

Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang

Journal Article

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Journal Article

sub>S4 nanoparticles-anchored porous carbon nanofibers as bifunctional electrocatalyst for overall

Journal Article