Zobrazeno 1 - 10
of 78
pro vyhledávání: '"Chuangui MA"'
Publikováno v:
Shipin gongye ke-ji, Vol 45, Iss 10, Pp 8-16 (2024)
Objective: This study was conducted to investigate the purification process aimed at obtaining a shiitake glycoprotein with lead eliminating effect, and to explore its preventive and therapeutic efficacy against lead acetate-induced lead toxicity in
Externí odkaz:
https://doaj.org/article/68403f1674f048a7b4b0e82aa632a3cc
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
User authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. In order to protect the security of real-time data query from an external user, many two-factor (password
Externí odkaz:
https://doaj.org/article/1f307ea6e48d4649865806e064f66267
Autor:
Fansheng Cheng, Wenxiang Li, Yang Nie, Ye Liu, Wenwen Jiang, Chaoping Wang, Chuangui Ma, Kexiang Wang
Publikováno v:
Food and Bioprocess Technology. 14:1983-1995
Mushrooms are subject to bacterial spoilage, browning, senescence, and quality deterioration immediately after harvest. To uncover the impact of the gasotransmitter hydrogen sulfide (H2S) on harvested mushrooms, button mushrooms were treated with H2S
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030967901
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::62d453b592d8737e5538a365cee6645d
https://doi.org/10.1007/978-3-030-96791-8_24
https://doi.org/10.1007/978-3-030-96791-8_24
Publikováno v:
Fundamenta Informaticae. 157:201-220
Publikováno v:
Information Security and Cryptology ISBN: 9783030142339
Inscrypt
Inscrypt
In this paper, we introduce a new multi-authority ciphertext policy attribute-based encryption (MA-CP-ABE) system. In our system, there are multiple central authorities (CAs) and attribute authorities (AAs). The CAs will not need to coordinate or eve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d18e9d2f534b4d4c66188f11bea4dc3d
https://doi.org/10.1007/978-3-030-14234-6_23
https://doi.org/10.1007/978-3-030-14234-6_23
Autor:
Chuangui Mao, Ming Li, Xinglu Li, Zhengao Li, Tao Liu, Liangsen Wang, Wenfei Zhu, Lixia Chen, Yuliang Sun
Publikováno v:
Sensors, Vol 24, Iss 17, p 5748 (2024)
The objective of this study was to assess the concurrent validity of the Kunwei force plate system in relation to variables during a counter-movement jump (CMJ) task, in comparison to the Kistler in-ground force plate system, which is considered the
Externí odkaz:
https://doaj.org/article/feab4480cdbd475e9e2f06a801686069
Publikováno v:
Applicable Algebra in Engineering, Communication and Computing. 28:99-108
The discrete logarithm problem with auxiliary inputs (DLP-wAI) is a special discrete logarithm problem. Cheon first proposed a novel algorithm to solve the discrete logarithm problem with auxiliary inputs. Given a cyclic group $${\mathbb {G}}=\langle
Publikováno v:
Soft Computing. 21:5665-5673
Wireless sensor networks have been widely used in several applications ranging from environmental and health-care monitoring to military uses. Since sensor networks are typically deployed in hostile environments, broadcast authentication is a fundame
Publikováno v:
Information Security and Cryptology ISBN: 9783319751597
Inscrypt
Inscrypt
Differential and linear cryptanalysis are two of the most effective attacks on block ciphers. Searching for (near) optimal differential or linear trails is not only useful for the security evaluation of block ciphers against these attacks, but also i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4d4cdce80c2d3289a818dd0b9b995859
https://doi.org/10.1007/978-3-319-75160-3_24
https://doi.org/10.1007/978-3-319-75160-3_24