Search scope:
排序: Display mode:
Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang
Engineering 2023, Volume 23, Issue 4, Pages 82-89 doi: 10.1016/j.eng.2022.03.021
Freeze-tolerant hydrogels can regulate the freezing behavior of the water inside them at subzero temperatures, thus maintaining their exceptional properties (e.g., intelligent responsiveness and liquid transporting) and extending their applications under cold conditions. Herein, a series of aggregation-induced emission (AIE)-active freeze-tolerant hydrogels are developed, which enable information encryption and decryption at subzero temperatures. The hydrogels possess varied freezing temperatures (Tf) depending on their betaine concentration. Above/below Tf, the information in the hydrogels that is encoded by means of AIE luminogens presents turn-off/-on fluorescence, thereby enabling the use of these hydrogels for information encryption and decryption. Moreover, by tuning the cooling procedures or introducing photothermal copper sulfide nanoparticles into the hydrogels via an in situ sulfidation process, together with certain irradiation conditions, multistage information readouts can be obtained, significantly enhancing the information security. Finally, because the decrypted information in the hydrogels is irreversibly sensitive to temperature fluctuation, external energy-free cryogenic anticounterfeiting labels built with the hydrogels are demonstrated, which can realize the visual and real-time viability monitoring of cryopreserved biosamples (e.g., mesenchymal stem cells and red blood cells) during cold-chain transportation (–80 °C).
Keywords: Freeze-tolerant hydrogels Aggregation-induced emission Encryption Decryption Anticounterfeiting
Cui Congcong,Li Yuxiao and Han Song
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 34-38 doi: 10.15302/J-SSCAE-2016.06.007
The obligation of decryption assistance by Internet service providers reflects the conflict between public power (the power of investigation) and the right of privacy (the right of communication privacy, private rights). Internet service providers should gather data under encryption by users on the basis of the principles of controllability and traceability, proportionality, and necessity. Providers should consider choosing their path prudently, supervised by strict procedure. Thus, the overall utility of social governance control, the tranquility of private life, and the business interests of Internet service providers can be maximized. Severe violations of private rights and disorderly situations due to governmental failure can be avoided if these suggestions are carried out.
Keywords: obligation of decryption assistance principle of necessity principle of proportionality principle of controllability and traceability remedy measures
Nanoscale cryptographic architecture design using quantum-dot cellular automata Regular Article
Bikash Debnath, Jadav Chandra Das, Debashis De,dr.debashis.de@gmail.com
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 11, Pages 1578-1586 doi: 10.1631/FITEE.1800458
Keywords: 量子点元胞自动机(QCA);多数决定门密码学;加密;解密;纳米级路由
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Strategic Study of CAE 2000, Volume 2, Issue 2, Pages 41-46
The conception of the generating lock P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XA≠XB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.
Keywords:
the generating lock
the central encrypting system
multi-tooth encrypting-decrypting algorithm
P
Title Author Date Type Operation
AIE-Active Freeze-Tolerant Hydrogels Enable Multistage Information Encryption and Decryption at Subzero Temperatures
Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang
Journal Article
The Obligation of Decryption Assistance by Internet Service Providers: Suggestions on the Amendment of Article 27 of the Network Security Law Draft (Second Draft)
Cui Congcong,Li Yuxiao and Han Song
Journal Article
Nanoscale cryptographic architecture design using quantum-dot cellular automata
Bikash Debnath, Jadav Chandra Das, Debashis De,dr.debashis.de@gmail.com
Journal Article