Resource Type

Journal Article 23

Year

2023 2

2022 1

2021 3

2020 1

2019 2

2017 1

2015 2

2010 1

2009 1

2008 3

2007 2

2006 1

2005 2

2004 1

open ︾

Keywords

administration 3

802.11i 1

Eospalax baileyi 1

Panthera pardus 1

Bushenkangshuai Tang 1

Caenorhabditis elegans 1

Authentication 1

Authority trust level 1

Bellare-Rogaway model 1

Bit-wise chosen-plaintext 1

CBC - MAC mode 1

CCM mode 1

CTR mode 1

Chameleon hash function 1

Correlation power attack 1

Digital signature 1

Double-authentication-preventing signatures 1

HMAC-SM3 1

IEEE 802.16 1

open ︾

Search scope:

排序: Display mode:

Developing Medical Examiner Offices in China: Necessity and Administration Mode

Song Suimin, Ma Chunling, Li Shujin, Cong Bin

Strategic Study of CAE 2020, Volume 22, Issue 4,   Pages 154-160 doi: 10.15302/J-SSCAE-2020.04.022

Abstract:

Deepening the reform of the judicial system in China and improving theunified management system for judicial authentication are important in promoting the overall law-basedauthentication.Based on this, the feasibility and necessity of establishing an administration mode of medical examinerThe medical examiner offices should be responsible for judicial authentication, scientific research,

Keywords: the administration of judicial authentication     bureau of medical examiner     administration mode     social governance    

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 4,   Pages 259-271 doi: 10.1631/FITEE.1400232

Abstract: To guarantee robust security and computational efficiency for service retrieval, a variety of authenticationRecently, Chang (2014) introduced a formally provable secure authentication protocol with the propertyA security enhanced authentication scheme is proposed to eliminate all identified weaknesses.

Keywords: Authentication     Privacy     Security     Smart card     Untraceability    

Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

JIANG Limin, JIANG Du

Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2,   Pages 234-239 doi: 10.1007/s11709-007-0029-8

Abstract: In retrospect of the architecture design of Exit-Entry Administration Building of Shanghai Municipal

Keywords: commonness     retrospect     sequence     architecture individuality     architect    

Administration with

Qi RUI, Qin LU, Dayong WANG

Frontiers of Medicine 2009, Volume 3, Issue 1,   Pages 76-90 doi: 10.1007/s11684-009-0002-0

Abstract: In the present study, administration at high concentrations significantly increased lifespan, slowedadministration could further largely alleviate the aging defects induced by UV and oxidative stresses, and administration at different concentrations could largely rescue the aging defects in mutantThe protective effects of administration on aging process were at least partially dependent on theTherefore, administration could effectively retrieve the aging defects induced by UV irradiation and

Keywords: Bushenkangshuai Tang     UV irradiation     oxidative stress     tissue senescence     lifespan     Caenorhabditis elegans    

Alleviation of cell damage in experimental ANP in rats by administration of chondroitin-sulfate reduces

HE Zhongye, GUO Renxuan, LI Yang, XIE Chengyao, LIU Nan, SONG Wen

Frontiers of Medicine 2007, Volume 1, Issue 1,   Pages 36-40 doi: 10.1007/s11684-007-0007-5

Abstract: In order to explore the effects of retrograde infusion of chondroitin-sulfate via the pancreatic duct on cytoprotection and attenuation of oxidative damage during acute necrotic pancreatitis (ANP), male Wistar rats were randomly divided into three groups: A, B (experimental groups) and C (sham operation, control group). The rats in group A was subjected to retrograde injection of 5% sodium taurocholate via the pancreatic duct, and those in group B received chondroitin-sulfate therapy after ANP induction. All rats in three groups were killed at 6 h. The levels of malondialdehyde (MAD), total superoxide dismutase (SOD), glutathione (GSH), adenosine triphosphate (ATP) and serum amylase (SAM) were measured. The morphologic changes in pancreatic tissues were observed. It was found that the level of SAM was increased in group A and group B, with corresponding pathological changes of ANP. The levels of ATP, GSH and SOD in group A were decreased markedly and MDN increased significantly as compared with those in group B (P<0.01). In group B, the histopathologic damage was attenuated to a certain extent in comparison to that in group A. It was concluded that endogenous antioxidants were significantly reduced and lipid peroxidation increased during ANP. Retrograde infusion of chondroitin-sulfate via pancreatic duct could alleviate the pancreatic cell damage as a sort of scavengers of oxygen free radicals.

Keywords: control     Wistar     taurocholate     superoxide dismutase     chondroitin-sulfate therapy    

Oral administration of

Sufen ZHAO,Yuanyuan JIA,Weiwei ZHANG,Lili WANG,Yunfei MA,Kedao TENG

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 4,   Pages 318-326 doi: 10.15302/J-FASE-2015080

Abstract: The effects of oral administration of garlic mixture (GM, water-soluble extract) on infectious bursalThe results confirmed the protective effects of oral administration of 5 mg·kg BW GM (Group GM1) onIn particular, protein expression of IBDV in the bursa decreased in Group GM1, indicating that GM administrationsignificantly increased 7 days post infection in bursae in Group GM1 ( <0.01), suggesting that the oral administrationIFN-g) increased and peaked in Group GM1 earlier than in Group T (IBDV-exposed), demonstrating that GM administration

Keywords: garlic     infectious bursal disease virus (IBDV)     antiviral effect     IgM-bearing B lymphocyte    

Parallel Authentication Modes Based on Double Blocks or Key Counter

Huang Yuhua,Huai Aiqun,Song Yubo

Strategic Study of CAE 2004, Volume 6, Issue 7,   Pages 70-74

Abstract: A parallel authentication mode (PKCB) based on double blocks was put forward in this paper.The PKCB mode had a marked improvement on security & speed over parallel authentication mode, PMACOn this ground, another parallel authentication mode (KCTR - MAC) based on key counter was advanced.The KCTR - MAC authentication mode may be combined with the CTR (counter) encryption mode to form a full

Keywords: authentication mode     CBC - MAC mode     PMAC mode     CTR mode     CCM mode    

Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative

Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO

Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 3,   Pages 353-357 doi: 10.15302/J-FASE-2017157

Abstract: For the patent medicine authentication, we set up a molecular diagnostic assay to resolve the difficultiesWe recommend a common technical strategy for authentication of species origins in traditional Chinese

Keywords: Tongren Dahuoluo Wan     molecular diagnostic assay     Eospalax baileyi     Panthera pardus     species-specific primers    

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Strategic Study of CAE 2006, Volume 8, Issue 9,   Pages 69-73

Abstract: Aimed at the weakness both in security and efficiency of one-hop one-way authentication SA (securityassociation) mechanism employed by Mesh network, an multi-hops mutual authentication SA mechanism associated

Keywords: IEEE 802.16     mesh     node     multi-hops mutual authentication     self-modified routing    

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1,   Pages 88-103 doi: 10.1631/FITEE.2200118

Abstract: information, authenticate the shadow image mainly during the decoding phase, also known as unidirectional authenticationThe authentication of the shadow image in the distributing (encoding) phase is also important for the

Keywords: Image secret sharing     Shadow image authentication     Public key     Pixel expansion     Lossless decoding    

Strategic analysis of China’s geothermal energy industry

Hao GONG, Baicun WANG, Haijun LIANG, Zuoxian LUO, Yaofeng CAO

Frontiers of Engineering Management 2021, Volume 8, Issue 3,   Pages 390-401 doi: 10.1007/s42524-020-0106-4

Abstract: ensure its healthy and sustainable development include improving resource exploration, rationalizing administration

Keywords: geothermal energy     strategic analysis     SWOT–PEST     policy     administration    

The Research and Implementation of WAPI Authentication on WLAN Access Point

Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili

Strategic Study of CAE 2005, Volume 7, Issue 9,   Pages 65-69

Abstract: characteristic and the basic framework of the WAPI standard, the detail of the application of the WAPI authenticationFurthermore, the performance of the authentication procedure was discussed.

Keywords: WLAN     WAPI     test analysis    

Double-authentication-preventing signatures revisited: new definition and construction from chameleon None

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 176-186 doi: 10.1631/FITEE.1700005

Abstract:

Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSThe double-authentication-preventing property means that any pair of signatures on two different messages

Keywords: Double-authentication-preventing signatures     Chameleon hash function     Digital signature     Provable security    

Effects of RNA interference targeting angiotensin 1a receptor on blood pressure and cardiac hypertrophy of rats with renovascular hypertension

ZHANG Jingqun, SUN Honglei, MA Yexin, WANG Daowen

Frontiers of Medicine 2008, Volume 2, Issue 1,   Pages 19-24 doi: 10.1007/s11684-008-0005-2

Abstract: Three weeks after drug administration, pAT1a-shRNA1, pAT1a-shRNA2 and valsartan respectively resulted

Keywords: therapy     Sprague     administration     cardiac hypertrophy     valsartan    

Foundations and Applications of Information Systems Dynamics Article

Jianfeng Xu, Zhenyu Liu, Shuliang Wang, Tao Zheng, Yashi Wang, Yingfei Wang, Yingxu Dang

Engineering 2023, Volume 27, Issue 8,   Pages 254-265 doi: 10.1016/j.eng.2022.04.018

Abstract:

Although numerous advances have been made in information technology in the past decades, there is still a lack of progress in information systems dynamics (ISD), owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems. The value of ISD lies in its ability to guide the design, development, application, and evaluation of large-scale information system-of-systems (SoSs), just as mechanical dynamics theories guide mechanical systems engineering. This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space, improving a mathematical theory for information measurement, and proposing a dynamic configuration model for information systems. In this way, it establishes a basic theoretical framework for ISD. The proposed theoretical methodologies have been successfully applied and verified in the Smart Court SoSs Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization. The proposed ISD provides an innovative paradigm for the analysis, design, development, and evaluation of large-scale complex information systems, such as electronic government and smart cities.

Keywords: System-of-systems engineering     Information theory     Information measurement     Information systems dynamics     Judicial    

Title Author Date Type Operation

Developing Medical Examiner Offices in China: Necessity and Administration Mode

Song Suimin, Ma Chunling, Li Shujin, Cong Bin

Journal Article

A lightweight authentication scheme with user untraceability

Kuo-Hui YEH

Journal Article

Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

JIANG Limin, JIANG Du

Journal Article

Administration with

Qi RUI, Qin LU, Dayong WANG

Journal Article

Alleviation of cell damage in experimental ANP in rats by administration of chondroitin-sulfate reduces

HE Zhongye, GUO Renxuan, LI Yang, XIE Chengyao, LIU Nan, SONG Wen

Journal Article

Oral administration of

Sufen ZHAO,Yuanyuan JIA,Weiwei ZHANG,Lili WANG,Yunfei MA,Kedao TENG

Journal Article

Parallel Authentication Modes Based on Double Blocks or Key Counter

Huang Yuhua,Huai Aiqun,Song Yubo

Journal Article

Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative

Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO

Journal Article

IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication

Wang Xingjian,Hu Aiqun,Huang Yuhua

Journal Article

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Journal Article

Strategic analysis of China’s geothermal energy industry

Hao GONG, Baicun WANG, Haijun LIANG, Zuoxian LUO, Yaofeng CAO

Journal Article

The Research and Implementation of WAPI Authentication on WLAN Access Point

Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili

Journal Article

Double-authentication-preventing signatures revisited: new definition and construction from chameleon

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Journal Article

Effects of RNA interference targeting angiotensin 1a receptor on blood pressure and cardiac hypertrophy of rats with renovascular hypertension

ZHANG Jingqun, SUN Honglei, MA Yexin, WANG Daowen

Journal Article

Foundations and Applications of Information Systems Dynamics

Jianfeng Xu, Zhenyu Liu, Shuliang Wang, Tao Zheng, Yashi Wang, Yingfei Wang, Yingxu Dang

Journal Article