Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Zuohui Li"'
Publikováno v:
HortScience, Vol 58, Iss 8 (2023)
The genus Lycoris Herb. belongs to the Amaryllidaceae family, which consists of about 20 species and is distributed in warm temperate to subtropical zones of East Asia, from southwestern China to Japan and southern Korea, with a few zones extending t
Externí odkaz:
https://doaj.org/article/b99ea7b68f684e4588f2edb2051e1b35
Publikováno v:
Dianxin kexue, Vol 36, Pp 111-116 (2020)
With the rapid development of core network technology,network structures have become increasingly complicated.Nowadays,it is urgent to transform from the traditional CT core network to IT core network.Widely used in the IT field,SRE model provided co
Externí odkaz:
https://doaj.org/article/0951a33b2bc94da6a6408922abfd2dee
Publikováno v:
网络与信息安全学报, Vol 4, Pp 32-38 (2018)
Considered the cross-domain authentication of mobile devices in the Internet of things,a certificate based anonymous cross-domain authentication scheme was proposed.First,combined with the characteristics of PKI and IBS,a certificate based signature
Externí odkaz:
https://doaj.org/article/d611cbc630f54294a6a2cd0510c1defe
Publikováno v:
Wuhan University Journal of Natural Sciences. 27:1-10
5G provides a unified authentication architecture and access management for IoT (Internet of Things) devices. But existing authentication services cannot cover massive IoT devices with various computing capabilities. In addition, with the development
Publikováno v:
Frontiers in Oncology, Vol 14 (2024)
BackgroundRapidly developed chemoresistance to dacarbazine (DTIC) is a major obstacle in the clinical management of melanoma; however, the roles and mechanisms of epi-transcriptomic RNA modification in this process have not been investigated.MethodDT
Externí odkaz:
https://doaj.org/article/bfb28d75004042aab9f445833efcee24
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811359125
Mobile cloud computing (MCC) is becoming an important way of data sharing. It is of great value for people to store and retrieve personal data at anytime and anywhere. Attribute-based encryption (ABE) can solve the problem of flexible sharing among m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8599cc4b7fcd03b0b30ccb9a0a27fc3c
https://doi.org/10.1007/978-981-13-5913-2_11
https://doi.org/10.1007/978-981-13-5913-2_11
Searchable Ciphertext-Policy Attribute-Based Encryption with Multi-Keywords for Secure Cloud Storage
Publikováno v:
Proceedings of the 2018 International Conference on Computing and Pattern Recognition.
Searchable encryption is one of the most important techniques for the sensitive data outsourced to cloud server, and has been widely used in cloud storage which brings huge convenience and saves bandwidth and computing resources. A novel searchable c
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
With the progress of cloud storage technology, its data security is threatened and its time of data destruction is limited in its life cycle in the cloud storage environment. Based on object storage technology, cryptography and data rewrite technolog
Publikováno v:
Proceedings of the 2017 2nd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2017).
Publikováno v:
International Journal of Information and Communication Technology. 13:340
The P4P architecture is mainly composed of appTracker, iTracker and peer. The single appTracker manages sharing resources in the different ISP domains. Every peer registers with appTracker when joining the network, and then requests resources from ap