Zobrazeno 1 - 10
of 175
pro vyhledávání: '"Lifeng, Cao"'
Publikováno v:
网络与信息安全学报, Vol 9, Pp 92-105 (2023)
With the unprecedented growth in the speed of data generation and circulation in the era of big data, the emergence of blockchain technology provides a new solution for data authenticity verification.However, with the increasing demand for data flow
Externí odkaz:
https://doaj.org/article/0837ecf8403f430cb8fd641b7b4614b2
Publikováno v:
Frontiers in Bioscience-Landmark, Vol 29, Iss 1, p 27 (2024)
Background: The pentose phosphate pathway (PPP) is a critical metabolic pathway that generates NADPH and ribose-5-phosphate for nucleotide biosynthesis and redox homeostasis. In this study, we investigated a potential regulatory role for Krüppel-lik
Externí odkaz:
https://doaj.org/article/43a6cfb8206f4c428dc83d2ff28a0761
Publikováno v:
网络与信息安全学报, Vol 7, Pp 68-87 (2021)
Blockchain technology has the features of decentralization, high credibility, non-tampering and traceability, which can address the trust problem in traditional access control technology.Based on the implementation with blockchain, the unique advanta
Externí odkaz:
https://doaj.org/article/af41780f4190430e929df5d8d8eafe2c
Publikováno v:
iScience, Vol 25, Iss 4, Pp 104084- (2022)
Summary: Fire-training areas (FTAs) are an important source of perfluoroalkyl and polyfluoroalkyl substances (PFASs) pollution. However, the effect of PFASs on soil bacterial communities remains limited. Here, we detected the PFASs in soils ranging f
Externí odkaz:
https://doaj.org/article/79ad93f0f08d492797e3060a634326fc
Publikováno v:
Tongxin xuebao, Vol 41, Pp 184-201 (2020)
Aiming at the problem of security isolation of multi-tenant data in cloud environment,a tenant virtual domain isolation construction method based on L-DHT was proposed.Firstly,through the design of multi-tenant isolation mapping algorithm based on la
Externí odkaz:
https://doaj.org/article/3775c4d002ba4a159ea1f3677922550b
Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition
Publikováno v:
IEEE Access, Vol 8, Pp 162548-162568 (2020)
In the cloud environment, owing to the large-scale sharing of the upper application instance and the underlying virtual machine resources, the tenants' information flow boundary in the shared virtual machine is fuzzy and difficult to identify. In add
Externí odkaz:
https://doaj.org/article/c5f83810d4d948d68fe916155f1710de
Publikováno v:
IEEE Access, Vol 7, Pp 148363-148380 (2019)
Security issues of large-scale local area network are becoming more prominent and the anomaly detection for the network traffic is the key means to solve this problem. On the other hand, it is a challenge to extract effective and accurate traffic fea
Externí odkaz:
https://doaj.org/article/28b3434ff82a4ce9a0c042ff6339886a
Publikováno v:
Crystal Growth & Design. 23:2583-2592
Publikováno v:
Computers, Materials & Continua; 2023, Vol. 76 Issue 2, p2531-2549, 19p
Publikováno v:
Crystal Growth & Design. 23:592-601