- Security in Wireless Sensor Networks
- Cryptography and Data Security
- Advanced Authentication Protocols Security
- Wireless Body Area Networks
- Cancer, Hypoxia, and Metabolism
- User Authentication and Security Systems
- Cancer, Lipids, and Metabolism
- Advanced Data Storage Technologies
- Growth Hormone and Insulin-like Growth Factors
- Privacy-Preserving Technologies in Data
- Advanced Optical Network Technologies
- Chinese history and philosophy
- Cancer therapeutics and mechanisms
- Ionic liquids properties and applications
- Robotics and Sensor-Based Localization
- Cloud Data Security Solutions
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Computing and Algorithms
- Optical Network Technologies
- Higher Education and Teaching Methods
- RNA modifications and cancer
- Energy Efficient Wireless Sensor Networks
- TiO2 Photocatalysis and Solar Cells
- Peer-to-Peer Network Technologies
- Access Control and Trust
Shandong Normal University
2016-2025
Zhengzhou University of Light Industry
2014-2024
Northeastern University
2024
Yuxian People's Hospital
2009
Beijing Jiaotong University
2009
Lanzhou University of Technology
2007
Lanzhou University
2005
Lanzhou University Second Hospital
2005
Conversion of plastic wastes to fatty acids is an attractive means supplement the sourcing these high-value, high-volume chemicals. We report a method for transforming polyethylene (PE) and polypropylene (PP) at ~80% conversion with number-average molar masses up ~700 670 daltons, respectively. The process applicable municipal PE PP their mixtures. Temperature-gradient thermolysis key controllably degrading into waxes inhibiting production small molecules. are upcycled by oxidation over...
Telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. Group-oriented communication is an important application for telemedicine. However, transmission of information over insecure channel such as Internet or private data storing generates a security problem. Therefore, authentication, confidentiality, privacy are challenges in developing suitable encryption protocol group quite modern medicine. Group key agreement one way to ensure...
The application of intelligent computing in Internet Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more efficient. Secure communication secure resource sharing among terminals are essential. A channel for can be established through group key agreement (GKA), thereby ensuring the security terminals. Taking into account confidentiality level shared resources each terminal, different permissions a GKA protocol is proposed. Compared with previous work,...
ZSM-5 zeolite is a kind of high-value-added porous aluminosilicate zeolite. The use the coal gasification slag utilization process by-product desilication liquid as silicon raw material to replace current materials such water glass will help reduce production costs and achieve high-value solid waste. zeolites for volatile organic compounds (VOCs) adsorption were prepared by one-step hydrothermal method using solution from main source sodium source. effects crystallization reaction time,...
Group key agreement is a good way to ensure secure communication within group. However, the identity authentication, privacy protection, and information sharing access control (different rights may exist for different sensitivity of information) are issues be solved in group agreement. Aiming at these problems, this paper proposes protocol based on protection attribute authentication (GKA-PPAA). The hidden attributes; it not only preserves advantages traditional identity-based protocol, but...
The recent development of wireless body area network (WBAN) technology plays a significant role in the modern healthcare system for patient health monitoring. However, owing to open nature channel and sensitivity transmitted messages, data security privacy threats WBAN have been widely discussed must be solved. In years, many authentication protocols had proposed provide protection WBANs. these schemes are not computationally efficient process. Inspired by studies, lightweight secure...
With the rapid development of communication and microelectronic technology, vehicular ad hoc network (VANET) has received extensive attention. However, due to open nature wireless links, it will cause VANET generate many security issues such as data leakage, hijacking, eavesdropping. To solve above problem, this paper proposes a new authentication protocol which uses bilinear pairings temporary pseudonyms. The proposed can realize functions identity vehicle verification message sent by...
The novel rose-shaped S-scheme heterojunction photocatalyst (β-Bi 2 O 3 /Bi 2.33 )/TiO is successfully prepared by a green DES-mediated strategy and remarkably promotes the efficiency for antibiotics degradation water splitting into hydrogen.
Hydrogen peroxide (H2 O2 ) is considered one of the most important chemical products and has a promising future in photocatalytic preparation, which green, pollution-free, hardly consumes any non-renewable energy. This study involves preparation benzoxazine with Si─O bonds via Mannich reaction, followed by co-hydrolysis to produce photocatalysts containing Si─O─Ti bonds. In this study, photocatalyst synthesized characterized using fourier transform infrared spectroscopy, nuclear magnetic...
While creating unprecedented opportunities, artificial intelligence is also accompanied by risks [...]
Boron is a special pollutant. Because of its relatively small molecular weight, it can freely penetrate the reverse osmosis membrane in same way that water molecules during seawater desalination, which affects effluent quality desalinated seawater. In this study, new magnetic adsorption material, MNP-NMDG, was synthesized by combining nanoparticles (MNPs) Fe3O4 with N-methyl-d-glucamine high selectivity to boron, and MNP-NMDG characterized scanning electron microscopy (SEM), Fourier...
The terminals in mobile cloud computing have themselves the special characteristics, such as flexibility, distributed different domains, resourceconstraint and easily to be captured et al. participated collaborative computing, information exchange sharing secrets may come from networks or clouds. For this complex network environment paper proposes a Multi-domain lightweight Asymmetric group key agreement (ML-AGKA). It adopts bilinear mapping blind technology achieve an asymmetric protocol...
Group key agreement (GKA) is one of the technologies for ensuring information exchange security among group members. While GKA widely used in secure multi-party computation, safety resources sharing, and distributed collaborative computing. It still has some flaws limitations. We proposes a Blockchain-based dynamic (BDGKA) protocol. In contrast to prior works, BDGKA differs several significant ways: 1) anonymous identity authenticationit can prevent privacy leaks; 2) traceability-it track...
Today most multi-domain networks authentication systems provide data security and mutual with asymmetric traditional public key cryptography., there exist some problems, such as the overhead of passing certificates, more complexity management certificates network bottlenecks so on. These schemes can’t protect safety interoperability in distributed effectively. Aiming at these paper proposes an identity-based protocol among domains large-scale collaborative computing network. It adopts...