Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Kaiyan Zheng"'
Autor:
Yaxing Kong, Shulei He, Donglai Ma, Xian Gu, Qian Wang, Jingqiao Zhao, Jianyun Zhang, Qian Tian, Yuguang Zheng, Yanmei Chen, Kaiyan Zheng
Publikováno v:
BMC Genomics, Vol 25, Iss 1, Pp 1-20 (2024)
Abstract Semen Ziziphi Spinosae (SZS) is a traditional Chinese herbal medicine widely used to treat insomnia and anxiety in clinical practice. Currently, the demand for SZS is increasing every year, but the production of wild SZS is unstable due to e
Externí odkaz:
https://doaj.org/article/f0797f7250524a28b336c40e6e134267
Autor:
Bing Li, Zhenmin Yang, Fuying Mao, Qian Wang, Huiyong Fang, Xian Gu, Kaiyan Zheng, Yuguang Zheng, Yunsheng Zhao, Jianming Jiang
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-13 (2023)
Abstract The dried root of Saposhnikovia divaricata (Turcz.) Schischk. is popular as a good medicinal material, however the abundant aerial part is often discarded, which caused the waste of resources. In order to exploit resources, the essential oil
Externí odkaz:
https://doaj.org/article/9aa9c2027dd6458a8541de84903b10e7
Autor:
Huigai Sun, Kaiyan Zheng, Xiaowei Han, Junna Song, Yang Li, Lei Du, Yuguang Zheng, Donglai Ma
Publikováno v:
Mitochondrial DNA. Part B. Resources, Vol 7, Iss 5, Pp 796-797 (2022)
Piptanthus nepalensis (Hooker) Sweet is a semi deciduous or deciduous shrub belonging to the genus Piptanthus, Leguminosae. P. nepalensis has been used as a folk medicinal herb in Nepal and was cultivated all over the world as an ornamental plant. In
Externí odkaz:
https://doaj.org/article/5cd1c13ff6a44fa3a0c77da1e97ddbb4
Publikováno v:
Canadian Journal of Microbiology. 68:353-366
Atractylodes macrocephala Koidz. (AMK) is widely used in traditional Chinese medicine owing to its pharmacological activity. Here, we aimed to characterize the differentially expressed genes (DEGs) of one- and three-year growth (OYG and TYG) rhizomes
Publikováno v:
CCWC
With the widespread of cloud computing, the delegation of storage and computing is becoming a popular trend. Concerns on data integrity, security, user privacy as well as the correctness of execution are highlighted due to the untrusted remote data m
Publikováno v:
2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4).
While the multiple party computation (MPC) has been suggested for over two decades, we still have not witnessed implementations that make MPC or its derivates deployed in a palpable reality. Difficulties stem from serial security and trust issues, ty
Autor:
Peng Wang, Kaiyan Zheng
Publikováno v:
ICISSP
Publikováno v:
Progress in Cryptology – AFRICACRYPT 2018 ISBN: 9783319893389
AFRICACRYPT
AFRICACRYPT
BRW-polynomial function is suggested as a preferred alternative of polynomial function, owing to its high efficiency and seemingly non-existent weak keys. In this paper we investigate the weak-key issue of BRW-polynomial function as well as BRW-insta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0c66c275261874667e358300c0a5c139
https://doi.org/10.1007/978-3-319-89339-6_3
https://doi.org/10.1007/978-3-319-89339-6_3
Publikováno v:
Proceedings of the 2017 3rd International Conference on Economics, Social Science, Arts, Education and Management Engineering (ESSAEME 2017).
Publikováno v:
Fast Software Encryption ISBN: 9783662529928
FSE
FSE
Universal hash functions UHFs have been extensively used in the design of cryptographic schemes. If we consider the related-key attack RKA against these UHF-based schemes, some of them may not be secure, especially those using the key of UHF as a par
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e590db668e2e019c6742302064d0ce2f
https://doi.org/10.1007/978-3-662-52993-5_26
https://doi.org/10.1007/978-3-662-52993-5_26