Resource Type

Journal Article 17

Year

2022 1

2021 1

2020 1

2019 2

2018 1

2017 1

2016 1

2015 2

2014 1

2013 1

2010 1

2008 2

2001 1

2000 1

open ︾

Keywords

Block cipher 2

Concept drift 2

Data stream 2

Embedded security 2

Encryption 2

Internet of Things (IoT) 2

Lightweight cryptography 2

chaos sequence 2

Staphylococcus aureus 1

Anomaly detection 1

Authenticated cipher 1

Bacterial toxins 1

Bank collapse 1

Bank erosion 1

Bank scarp 1

Bioenergy 1

CAESAR competition 1

Classificaion 1

Datapath design 1

Ensemble classifiers 1

open ︾

Search scope:

排序: Display mode:

Survey of design and security evaluation of authenticated encryption algorithms in theCAESARcompetition None

Fan ZHANG, Zi-yuan LIANG, Bo-lin YANG, Xin-jie ZHAO, Shi-ze GUO, Kui REN

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1475-1499 doi: 10.1631/FITEE.1800576

Abstract:

The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and Technology (NIST) is an ongoing project calling for submissions of authenticated encryption (AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis. The design goal is to pursue new AE schemes that are more secure than advanced encryption standard with Galois/counter mode (AES-GCM) and can simultaneously achieve three design aspects: security, applicability, and robustness. The competition has a total of three rounds and the last round is approaching the end in 2018. In this survey paper, we first introduce the requirements of the proposed design and the progress of candidate screening in the CAESAR competition. Second, the candidate AE schemes in the final round are classified according to their design structures and encryption modes. Third, comprehensive performance and security evaluations are conducted on these candidates. Finally, the research trends of design and analysis of AE for the future are discussed.

Keywords: CAESAR competition     Authenticated cipher     Block cipher     Stream cipher     Hash function     Security evaluation    

Anensemble method for data stream classification in the presence of concept drift

Omid ABBASZADEH,Ali AMIRI,Ali Reza KHANTEYMOORI

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 12,   Pages 1059-1068 doi: 10.1631/FITEE.1400398

Abstract: One recent area of interest in computer science is data stream management and processing.By ‘data stream’, we refer to continuous and rapidly generated packages of data.production rate, limited data processing time, and data concept drift; these features differentiate the data streamAn issue for the data stream is classification of input data.

Keywords: Data stream     Classificaion     Ensemble classifiers     Concept drift    

Effects of riparian land use on water quality and fish communities in the headwater stream of the Taizi

Sen DING, Yuan ZHANG, Bin LIU, Weijing KONG, Wei MENG

Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5,   Pages 699-708 doi: 10.1007/s11783-013-0528-x

Abstract: Riparian land use remains one of the most significant impacts on stream ecosystems.This study focuses on the relationship between stream ecosystems and riparian land use in headwater regionsincluding forest, grassland, farmland, and residential land were examined to reveal the correlation between streamGenerally, the results found a significant relationship between riparian land uses and stream water quality

Keywords: fish     water quality     land use     riparian buffer     headwater stream    

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Strategic Study of CAE 2001, Volume 3, Issue 6,   Pages 75-80

Abstract:

In this paper, it is pointed out that the block cipher proposed in “Design of Block Cipher substitution; can be broken by attack with known plaintext and attack with ciphertext only, and the key of this cipher

Keywords: chaos sequence     block cipher     transposition cipher     attack with known plaintext     attack with ciphertext only    

Residence time distribution and modeling of the liquid phase in an impinging stream reactor

Xingjun WANG, Xianhui HU, Lishun HU, Guangsuo YU, Fuchen WANG,

Frontiers of Chemical Science and Engineering 2010, Volume 4, Issue 3,   Pages 353-359 doi: 10.1007/s11705-009-0262-x

Abstract: some experimental investigations of liquid phase residence time distribution (RTD) in an impinging streamwhich indicates that the liquid RTD is dominated mainly by axial liquid dispersion in the impinging stream

Keywords: RTD     liquid dispersion     reactor     liquid     independent    

Chaotic behavior of LNG after stratification in main stream region of storage tank

WANG Jingjing, MA Xiaoqian

Frontiers in Energy 2008, Volume 2, Issue 4,   Pages 514-518 doi: 10.1007/s11708-008-0076-4

Abstract: A study of the chaotic behavior of liquefied natural gas (LNG) after stratification in the main streamof heat impacting the storage tank would lead to a strong and unstable convection of LNG in the main stream

Keywords: Runge-Kutta     non-linear     corresponding     temperature     addition    

The Contributions Evaluation of Truck Ro-Ro Shipments in the Upper-stream Yangtze River and Its Developing

Xu Maozeng,Wu Min

Strategic Study of CAE 2008, Volume 10, Issue 2,   Pages 31-34

Abstract: justify;">An introduction will be made to the transportation env ironment characteristics of the upper-streamThen five indicators are proposed to evaluate the contributions of Ro-Ro shipments in the upper-stream

Keywords: upper-stream Yangtze River     Ro-Ro shipment     evaluation indicator     model developing policy    

Engineered Biomimetic Platelet Membrane-Coated Nanoparticles Block Staphylococcus aureus Cytotoxicity and Protect Against Lethal Systemic Infection Article

Jwa-Kyung Kim, Satoshi Uchiyama, Hua Gong, Alexandra Stream, Liangfang Zhang, Victor Nizet

Engineering 2021, Volume 7, Issue 8,   Pages 1149-1156 doi: 10.1016/j.eng.2020.09.013

Abstract:

Staphylococcus (S.) aureus is a leading human pathogen capable of producing severe invasive infections such as bacteremia, sepsis, and endocarditis with high morbidity and mortality, exacerbated by the increasingly widespread antibiotic resistance exemplified by methicillin-resistant strains (MRSA). S. aureus pathogenesis is fueled by the secretion of toxins—such as the membrane-damaging pore-forming atoxin,
which have diverse cellular targets including the epithelium, endothelium, leukocytes, and platelets. Here, we examine the use of human platelet membrane-coated nanoparticles (PNPs) as a biomimetic decoy strategy to neutralize S. aureus toxins and preserve host cell defense functions. The PNPs blocked platelet damage induced by S. aureus secreted toxins, thereby supporting platelet activation and bactericidal
activity. Likewise, the PNPs blocked macrophage damage induced by S. aureus secreted toxins, thus supporting macrophage oxidative burst, nitric oxide production, and bactericidal activity, and diminishing MRSA-induced neutrophil extracellular trap release. In a mouse model of MRSA systemic infection, PNP administration reduced bacterial counts in the blood and protected against mortality. Taken together, the results from the present work provide a proof of principle of the therapeutic benefit of PNPs in toxin neutralization, cytoprotection, and increased host resistance to invasive S. aureus infection.

Keywords: Nanoparticle     Nanosponge     Platelet     Staphylococcus aureus     Bacterial toxins     Sepsis    

Design of Block Cipher Substitution Network on Chaos

Sun Feng,Qin Honglei,Xu Yiaoqun,Hao Yianling

Strategic Study of CAE 2000, Volume 2, Issue 9,   Pages 47-49

Abstract:

In this paper, a design of block cipher substitution network is presented by use of the ergodic theoryThe computer simulation result shows that the block cipher substitution network of chaos is highly complex

Keywords: chaos sequence     permutation network     ergodic theory     time complexity    

BORON: an ultra-lightweight and low power encryption design for pervasive computing Article

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 317-331 doi: 10.1631/FITEE.1500415

Abstract: We propose an ultra-lightweight, compact, and low power block cipher BORON.The BORON cipher includes shift operators, round permutation layers, and XOR operations.number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipherBORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput asBORON is a well-suited cipher design for applications where both a small footprint area and low power

Keywords: Lightweight cryptography     SP network     Block cipher     Internet of Things (IoT)     Encryption     Embedded security    

PAC in artificial stream in postoperative care for family planning

Zhong Huiling

Strategic Study of CAE 2014, Volume 16, Issue 5,   Pages 31-33

Abstract:

The purpose of the study abortion care (PAC) in the artificial stream

Keywords: abortion     post-abortion care     family planning care     effectiveness analysis    

Value Engineering/Value Management Model and Application of Aerospace Projects

Wan-hua Qiu,Han-peng Zhang,Ze-Shui Xu,De-Sheng Wu

Frontiers of Engineering Management 2015, Volume 2, Issue 4,   Pages 373-377 doi: 10.15302/J-FEM-2015056

Abstract: This paper presents a new space model developed by general value engineering/value management model. The authors take the function analysis, function optimization and function realization of the development object as the basic point, to get the final optimization structure by value evaluation, so as to improve the project quality and reduce the project cost. The final case shows that the application of this model can save about 18% of the time and considerable cost of the usually planned projects under the condition of quality assurance.

Keywords: aerospace project     value engineering     value optimization     value stream     design structure matrix    

Photothermal materials for efficient solar powered steam generation

Fenghua Liu, Yijian Lai, Binyuan Zhao, Robert Bradley, Weiping Wu

Frontiers of Chemical Science and Engineering 2019, Volume 13, Issue 4,   Pages 636-653 doi: 10.1007/s11705-019-1824-1

Abstract: Solar powered steam generation is an emerging area in the field of energy harvest and sustainable technologies. The nano-structured photothermal materials are able to harvest energy from the full solar spectrum and convert it to heat with high efficiency. Moreover, the materials and structures for heat management as well as the mass transportation are also brought to the forefront. Several groups have reported their materials and structures as solutions for high performance devices, a few creatively coupled other physical fields with solar energy to achieve even better results. This paper provides a systematic review on the recent developments in photothermal nanomaterial discovery, material selection, structural design and mass/heat management, as well as their applications in seawater desalination and fresh water production from waste water with free solar energy. It also discusses current technical challenges and likely future developments. This article will help to stimulate novel ideas and new designs for the photothermal materials, towards efficient, low cost practical solar-driven clean water production.

Keywords: solar stream generation     plasmonics     porous carbon     photothermal materials     solar energy conversion efficiency    

Marine Renewable Energy Seascape Review

Alistair G. L. Borthwick

Engineering 2016, Volume 2, Issue 1,   Pages 69-78 doi: 10.1016/J.ENG.2016.01.011

Abstract: This article briefly reviews ocean energy production from offshore wind, tidal stream, ocean current,

Keywords: Marine renewable energy     Offshore wind     Tidal stream     Ocean current     Tidal range     Wave energy     Ocean thermal    

Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA Personal View

Vijay DAHIPHALE, Gaurav BANSOD, Ankur ZAMBARE, Narayan PISHAROTY

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 4,   Pages 615-628 doi: 10.1631/FITEE.1800681

Abstract: We present novel architectures for hardware implementation for the ANU cipher and present results associatedThe ANU cipher is implemented at 4-, 8-, 16-, and 32-bit datapath sizes on four different field-programmableWith these different datapath designs, ANU cipher proves to be the obvious choice for implementing security

Keywords: Lightweight cryptography     Internet of Things (IoT)     Embedded security     Encryption     FPGA     Datapath design    

Title Author Date Type Operation

Survey of design and security evaluation of authenticated encryption algorithms in theCAESARcompetition

Fan ZHANG, Zi-yuan LIANG, Bo-lin YANG, Xin-jie ZHAO, Shi-ze GUO, Kui REN

Journal Article

Anensemble method for data stream classification in the presence of concept drift

Omid ABBASZADEH,Ali AMIRI,Ali Reza KHANTEYMOORI

Journal Article

Effects of riparian land use on water quality and fish communities in the headwater stream of the Taizi

Sen DING, Yuan ZHANG, Bin LIU, Weijing KONG, Wei MENG

Journal Article

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Journal Article

Residence time distribution and modeling of the liquid phase in an impinging stream reactor

Xingjun WANG, Xianhui HU, Lishun HU, Guangsuo YU, Fuchen WANG,

Journal Article

Chaotic behavior of LNG after stratification in main stream region of storage tank

WANG Jingjing, MA Xiaoqian

Journal Article

The Contributions Evaluation of Truck Ro-Ro Shipments in the Upper-stream Yangtze River and Its Developing

Xu Maozeng,Wu Min

Journal Article

Engineered Biomimetic Platelet Membrane-Coated Nanoparticles Block Staphylococcus aureus Cytotoxicity and Protect Against Lethal Systemic Infection

Jwa-Kyung Kim, Satoshi Uchiyama, Hua Gong, Alexandra Stream, Liangfang Zhang, Victor Nizet

Journal Article

Design of Block Cipher Substitution Network on Chaos

Sun Feng,Qin Honglei,Xu Yiaoqun,Hao Yianling

Journal Article

BORON: an ultra-lightweight and low power encryption design for pervasive computing

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Journal Article

PAC in artificial stream in postoperative care for family planning

Zhong Huiling

Journal Article

Value Engineering/Value Management Model and Application of Aerospace Projects

Wan-hua Qiu,Han-peng Zhang,Ze-Shui Xu,De-Sheng Wu

Journal Article

Photothermal materials for efficient solar powered steam generation

Fenghua Liu, Yijian Lai, Binyuan Zhao, Robert Bradley, Weiping Wu

Journal Article

Marine Renewable Energy Seascape

Alistair G. L. Borthwick

Journal Article

Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA

Vijay DAHIPHALE, Gaurav BANSOD, Ankur ZAMBARE, Narayan PISHAROTY

Journal Article