Qikun Zhang

ORCID: 0000-0002-8370-2002
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security in Wireless Sensor Networks
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Wireless Body Area Networks
  • Cancer, Hypoxia, and Metabolism
  • User Authentication and Security Systems
  • Cancer, Lipids, and Metabolism
  • Advanced Data Storage Technologies
  • Growth Hormone and Insulin-like Growth Factors
  • Privacy-Preserving Technologies in Data
  • Advanced Optical Network Technologies
  • Chinese history and philosophy
  • Cancer therapeutics and mechanisms
  • Ionic liquids properties and applications
  • Robotics and Sensor-Based Localization
  • Cloud Data Security Solutions
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Computing and Algorithms
  • Optical Network Technologies
  • Higher Education and Teaching Methods
  • RNA modifications and cancer
  • Energy Efficient Wireless Sensor Networks
  • TiO2 Photocatalysis and Solar Cells
  • Peer-to-Peer Network Technologies
  • Access Control and Trust

Shandong Normal University
2016-2025

Zhengzhou University of Light Industry
2014-2024

Northeastern University
2024

Yuxian People's Hospital
2009

Beijing Jiaotong University
2009

Lanzhou University of Technology
2007

Lanzhou University
2005

Lanzhou University Second Hospital
2005

Conversion of plastic wastes to fatty acids is an attractive means supplement the sourcing these high-value, high-volume chemicals. We report a method for transforming polyethylene (PE) and polypropylene (PP) at ~80% conversion with number-average molar masses up ~700 670 daltons, respectively. The process applicable municipal PE PP their mixtures. Temperature-gradient thermolysis key controllably degrading into waxes inhibiting production small molecules. are upcycled by oxidation over...

10.1126/science.adh0993 article EN Science 2023-08-10

Telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. Group-oriented communication is an important application for telemedicine. However, transmission of information over insecure channel such as Internet or private data storing generates a security problem. Therefore, authentication, confidentiality, privacy are challenges in developing suitable encryption protocol group quite modern medicine. Group key agreement one way to ensure...

10.1109/access.2018.2799007 article EN cc-by-nc-nd IEEE Access 2018-01-01

The application of intelligent computing in Internet Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more efficient. Secure communication secure resource sharing among terminals are essential. A channel for can be established through group key agreement (GKA), thereby ensuring the security terminals. Taking into account confidentiality level shared resources each terminal, different permissions a GKA protocol is proposed. Compared with previous work,...

10.1002/int.22644 article EN International Journal of Intelligent Systems 2021-08-31

ZSM-5 zeolite is a kind of high-value-added porous aluminosilicate zeolite. The use the coal gasification slag utilization process by-product desilication liquid as silicon raw material to replace current materials such water glass will help reduce production costs and achieve high-value solid waste. zeolites for volatile organic compounds (VOCs) adsorption were prepared by one-step hydrothermal method using solution from main source sodium source. effects crystallization reaction time,...

10.3390/separations11020039 article EN cc-by Separations 2024-01-26

Group key agreement is a good way to ensure secure communication within group. However, the identity authentication, privacy protection, and information sharing access control (different rights may exist for different sensitivity of information) are issues be solved in group agreement. Aiming at these problems, this paper proposes protocol based on protection attribute authentication (GKA-PPAA). The hidden attributes; it not only preserves advantages traditional identity-based protocol, but...

10.1109/access.2019.2926404 article EN cc-by IEEE Access 2019-01-01

The recent development of wireless body area network (WBAN) technology plays a significant role in the modern healthcare system for patient health monitoring. However, owing to open nature channel and sensitivity transmitted messages, data security privacy threats WBAN have been widely discussed must be solved. In years, many authentication protocols had proposed provide protection WBANs. these schemes are not computationally efficient process. Inspired by studies, lightweight secure...

10.1155/2021/4939589 article EN cc-by Security and Communication Networks 2021-07-22

With the rapid development of communication and microelectronic technology, vehicular ad hoc network (VANET) has received extensive attention. However, due to open nature wireless links, it will cause VANET generate many security issues such as data leakage, hijacking, eavesdropping. To solve above problem, this paper proposes a new authentication protocol which uses bilinear pairings temporary pseudonyms. The proposed can realize functions identity vehicle verification message sent by...

10.1155/2021/6692568 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

The novel rose-shaped S-scheme heterojunction photocatalyst (β-Bi 2 O 3 /Bi 2.33 )/TiO is successfully prepared by a green DES-mediated strategy and remarkably promotes the efficiency for antibiotics degradation water splitting into hydrogen.

10.1039/d5cc00266d article EN Chemical Communications 2025-01-01

Hydrogen peroxide (H2 O2 ) is considered one of the most important chemical products and has a promising future in photocatalytic preparation, which green, pollution-free, hardly consumes any non-renewable energy. This study involves preparation benzoxazine with Si─O bonds via Mannich reaction, followed by co-hydrolysis to produce photocatalysts containing Si─O─Ti bonds. In this study, photocatalyst synthesized characterized using fourier transform infrared spectroscopy, nuclear magnetic...

10.1002/smll.202303907 article EN Small 2023-08-11

While creating unprecedented opportunities, artificial intelligence is also accompanied by risks [...]

10.3390/electronics13122311 article EN Electronics 2024-06-13

Boron is a special pollutant. Because of its relatively small molecular weight, it can freely penetrate the reverse osmosis membrane in same way that water molecules during seawater desalination, which affects effluent quality desalinated seawater. In this study, new magnetic adsorption material, MNP-NMDG, was synthesized by combining nanoparticles (MNPs) Fe3O4 with N-methyl-d-glucamine high selectivity to boron, and MNP-NMDG characterized scanning electron microscopy (SEM), Fourier...

10.3390/w14081212 article EN Water 2022-04-09

The terminals in mobile cloud computing have themselves the special characteristics, such as flexibility, distributed different domains, resourceconstraint and easily to be captured et al. participated collaborative computing, information exchange sharing secrets may come from networks or clouds. For this complex network environment paper proposes a Multi-domain lightweight Asymmetric group key agreement (ML-AGKA). It adopts bilinear mapping blind technology achieve an asymmetric protocol...

10.1049/cje.2018.07.002 article EN Chinese Journal of Electronics 2018-09-01

Group key agreement (GKA) is one of the technologies for ensuring information exchange security among group members. While GKA widely used in secure multi-party computation, safety resources sharing, and distributed collaborative computing. It still has some flaws limitations. We proposes a Blockchain-based dynamic (BDGKA) protocol. In contrast to prior works, BDGKA differs several significant ways: 1) anonymous identity authenticationit can prevent privacy leaks; 2) traceability-it track...

10.1049/cje.2020.02.020 article EN Chinese Journal of Electronics 2020-05-01

10.7544/issn1000-1239.2014.20121165 article EN Journal of Computer Research and Development 2014-08-15

Today most multi-domain networks authentication systems provide data security and mutual with asymmetric traditional public key cryptography., there exist some problems, such as the overhead of passing certificates, more complexity management certificates network bottlenecks so on. These schemes can’t protect safety interoperability in distributed effectively. Aiming at these paper proposes an identity-based protocol among domains large-scale collaborative computing network. It adopts...

10.12928/telkomnika.v13i1.1164 article EN cc-by-sa TELKOMNIKA (Telecommunication Computing Electronics and Control) 2014-03-01
Coming Soon ...