- Cryptography and Data Security
- Complexity and Algorithms in Graphs
- Cryptography and Residue Arithmetic
- Coding theory and cryptography
- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- Cloud Data Security Solutions
- Cryptographic Implementations and Security
- Ultrasound in Clinical Applications
- Security in Wireless Sensor Networks
- Advanced Software Engineering Methodologies
- Traumatic Brain Injury and Neurovascular Disturbances
- graph theory and CDMA systems
- Dermatology and Skin Diseases
- Allergic Rhinitis and Sensitization
- Acute Kidney Injury Research
- Hemodynamic Monitoring and Therapy
- Sepsis Diagnosis and Treatment
- Intensive Care Unit Cognitive Disorders
- Asthma and respiratory diseases
- Ultrasound and Hyperthermia Applications
- Body Composition Measurement Techniques
- Retinal Development and Disorders
- Medicinal plant effects and applications
- Advanced Algebra and Geometry
Hebei General Hospital
2016-2024
Shanghai Traditional Chinese Medicine Hospital
2024
Fanjingshan National Nature Reserve
2023
Nanjing Normal University
2005-2022
Xidian University
2016-2018
Shanghai Changning Maternity and Infant Health Hospital
2017
Soochow University
2017
Zhangjiagang First People's Hospital
2017
Hebei University
2016
Illinois Institute of Technology
2006
Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, WSNs have been broadly applied, such as target tracking environment remote monitoring. However, can be easily compromised by a vast attacks, interception tampering, etc. this paper, we mainly focus on integrity protection, give an identity-based aggregate signature (IBAS) scheme with designated verifier for WSNs. According to advantage...
Cloud computing is a technology that will change how data stored, managed, and accessed. It reduces the need for users to set up hardware resources on demand, it eases things businesses individuals, but as cloud becomes more common, security problems are becoming big issue its future growth. They focus three basic models of computing: Software Service-SaaS, Platform Service-PaaS, Infrastructure Service-IaaS; add main architectural models: public, private, hybrid, multi-cloud, analyse their...
Background This study aims to systematically assess the risk factors, overall strength of association, and evidence quality related sepsis-associated encephalopathy. Methods A systematic search was conducted in Cochrane Library, PubMed, Web Science, Embase for cohort or case-control studies published up August 2023 on factors associated with sepsis-related The selected were screened, data extracted, evaluated using Newcastle–Ottawa Scale. Meta-analysis performed RevMan 5.3 software....
ABSTRACT As the key generation center (KGC) in a certificateless cryptosystem is no longer fully trusted, for practical applications, secure encryption (CLE) scheme should withstand malicious KGC attacks. In this paper, we investigate CLE schemes withstanding attacks from without resorting to random oracles. At first, show insecurity of (ZW scheme) presented by Zhang and Wang. Although ZW was proved be chosen ciphertext using oracles, find that it cannot resist KGC. We an attack demonstrates...
Recent studies have revealed a link between estradiol (E2) and glucose homeostasis. We aimed to assess the association cord blood hormone levels risk of gestational diabetes mellitus (GDM). A total 204 pregnant women with GDM without (control) were included in study. Maternal diagnosed using 75 g oral tolerance test at 24 26 weeks gestation. Cord samples from neonates collected immediately post delivery. Controls, which randomly selected study population, matched (cases controls ratio: 1:1)...
In recent years, deploying Internet of Things (IoT) in electronic healthcare systems (EHS) has made great progress detection. It is extremely important to reduce the cost communication and ensure authenticity integrity data. A linearly homomorphic signature scheme can solve above problems. However, when scale EHS too large, transmission, storage verification signatures need a high cost. An aggregate combine many generated by different users into short one. Therefore, only one needs be...
Background Early recognition of persistent acute kidney injury (AKI) could optimize management and prevent deterioration function. The Doppler-based renal resistive index (RI) has shown promising results for predicting AKI in preliminary studies. Here, we aimed to evaluate the performance RI, clinical indicators, their combinations predict short-term prognosis septic shock patients.Method We performed a retrospective study based on data from prospective single-center general ICU between...
An aggregate signature (AS) scheme combines multiple signatures which is generated by many different users into a single one. This feature very beneficial for diminishing storage cost, bandwidth and verification cost. Many previous attempts have been made designing AS schemes, while the former security models not clearly addressed coalition attacks, most of existing schemes cannot resist these kinds attacks. In this study, authors provide modified model certificateless (CLAS) then give new...
In an identity based cryptosystem, a user's is used as its public key. So, digital certificate no longer needed for the authenticity of However, necessary problem arises: how to prove that user revoked or non-revoked? The ideal revocation mechanism update every private key at time period by generater (PKG). Most existing works are revocable encryption. this paper, we present signature scheme, which more efficient than previous solutions. our composed both initial and periodically updated...
Certificateless public key cryptosystem (CLPKC) improves the identity based to be key-escrow free. Many research works on CLPKC have been presented so far. However, revocation problem in still lacks effective solutions. The current approaches suffer from either low efficiency or security weakness. In this study, we propose first 'scalable revocable' certificateless encryption (RCLE) scheme against 'decryption exposure'. is provably secure standard model. Moreover, give a second interesting...
Certificateless public key cryptography (CLPKC), with properties of no escrow and certificate, has received a lot attention since its invention. However, how to revoke user in certificateless cryptosystem still remains problem: the existing solutions are not practical for use due either costly mediator or enormous computation (secret channel). In this paper, we present new approach solve revocation problem CLPKC, by giving concrete revocable signature scheme. The scheme is more efficient...
Despite the complexity of allergic rhinitis (AR) pathogenesis, no FDA-approved drug has been developed to achieve optimal therapeutic effects. The present study explored efficacy and mechanism Huangqi (Hedysarum Multijugum Maxim)-Gancao (Glycyrrhizae Radix et Rhizoma or licorice) herb pair in treating AR by network pharmacology experimental approaches. bioactive ingredients Gancao were identified used predict targets these herbs generate pharmacological network. Ovalbumin (OVA)-induced mouse...
Objectives The purpose of this study was to evaluate the performance urinary C-C motif chemokine ligand 14 (CCL14) and renal resistive index (RI) in predicting persistent AKI unselected critically ill patients.
Certificateless public key cryptography (CL-PKC) is an important type of cryptography, which effectively solves the inherent escrow problem in identity based while keeps its certificate-free property. As adversarial models CL-PKC are relatively complex, designing efficient and secure certificate less encryption schemes standard model has been interesting challenging research topic. In this paper, we give cryptanalysis to existing scheme model. We show insecurity by demonstrating two kinds attacks.