Search Results - "GAN Qingqing"
-
1
Authentication scheme based on smart card in multi-server environment
Published in Wireless networks (01-02-2020)“…For authentication schemes based on smart card in multi-server environment, there is a common problem—the parameters stored in a user’s smart card linearly…”
Get full text
Journal Article -
2
Molecular Basis for PI(3,5)P2 Recognition by SNX11, a Protein Involved in Lysosomal Degradation and Endosome Homeostasis Regulation
Published in Journal of molecular biology (24-07-2020)“…Phosphatidylinositol 3,5-bisphosphate (PI(3,5)P2) is an essential phosphoinositide required for endosome homeostasis and sorting for lysosomal degradation;…”
Get full text
Journal Article -
3
Application and Evaluation of Deep Neural Networks for Airborne Hyperspectral Remote Sensing Mineral Mapping: A Case Study of the Baiyanghe Uranium Deposit in Northwestern Xinjiang, China
Published in Remote sensing (Basel, Switzerland) (01-10-2022)“…Deep learning is a popular topic in machine learning and artificial intelligence research and has achieved remarkable results in various fields. In geological…”
Get full text
Journal Article -
4
A Scheme for Verifying the Integrity of Outsourced Data
Published in China communications (01-11-2015)“…Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor…”
Get full text
Journal Article -
5
Effects of heating temperature on pore structure evolution of briquette coals
Published in Fuel (Guildford) (15-07-2021)“…•The mechanical properties of briquette coal are significantly influenced by heat treatment.•The surface microstructure and fracture structure in the briquette…”
Get full text
Journal Article -
6
Effect of heating on the molecular carbon structure and the evolution of mechanical properties of briquette coal
Published in Energy (Oxford) (15-12-2021)“…Preparing briquette coal (BC) via the heating and pressure method can improve its low mechanical strength in physical simulation tests and gas outbursts while…”
Get full text
Journal Article -
7
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
Published in Frontiers of Computer Science (01-10-2023)“…When one enterprise acquires another, the electronic data of the acquired enterprise will be transferred to the acquiring enterprise. In particular, if the…”
Get full text
Journal Article -
8
MFPSE: Multi-user Forward Private Searchable Encryption with dynamic authorization in cloud computing
Published in Computer communications (01-07-2022)“…Dynamic Searchable Symmetric Encryption (DSSE) allows users to outsource data with ciphertext format to untrusted servers and supports the operations of data…”
Get full text
Journal Article -
9
ERRγ-DBD undergoes dimerization and conformational rearrangement upon binding to the downstream site of the DR1 element
Published in Biochemical and biophysical research communications (14-05-2023)“…The estrogen-related receptor (ERR) family members are reported to bind DNA elements as either monomer or dimer. However, to date, only one solution NMR…”
Get full text
Journal Article -
10
Verifiable Data Search with Fine-Grained Authorization in Edge Computing
Published in Security and communication networks (10-11-2022)“…In the research of searchable encryption, fine-grained data authorization is a convenient way to manage the search rights for users. Recently, Liu et al…”
Get full text
Journal Article -
11
Effect of chemical structure on mechanical-seepage characteristics of briquette under different heating temperatures
Published in Powder technology (01-10-2023)“…Based on the low strength and high permeability of briquette coal (BC) used in physical simulations of coal mine disasters, we propose a new briquette…”
Get full text
Journal Article -
12
Effect of molecular carbon structures on the evolution of the pores and strength of lignite briquette coal with different heating rates
Published in Fuel (Guildford) (01-01-2022)“…•The micropores of BC-5 ℃/min was greater than other BC.•The mechanical strength of BC-5 ℃/min was close to RC.•Heating rate primarily affects the longitudinal…”
Get full text
Journal Article -
13
Online/offline remote data auditing with strong key-exposure resilience for cloud storage
Published in Computer standards and interfaces (01-03-2024)Get full text
Journal Article -
14
Substrate‐induced dimerization of elaiophylin glycosyltransferase reveals a novel self‐activating form of glycosyltransferase for symmetric glycosylation
Published in Acta crystallographica. Section D, Biological crystallography. (01-10-2022)“…Elaiophylin (Ela), a unique 16‐membered symmetric macrodiolide antibiotic, displays broad biological activity. Two rare 2‐deoxy‐l‐fucose moieties at the ends…”
Get full text
Journal Article -
15
Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
Published in Science China. Information sciences (01-12-2018)“…Big data offers significant benefits; however, security and privacy problems must be considered, especially with regard to outsourced big data. Auditing…”
Get full text
Journal Article -
16
Corrigendum to “An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs”
Published in Security and communication networks (01-01-2024)Get full text
Journal Article -
17
Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing
Published in IEEE transactions on services computing (01-11-2022)“…As a useful cryptographic primitive, searchable symmetric encryption (SSE) has been intensively studied to achieve the secure and efficient retrieval of…”
Get full text
Journal Article -
18
A key-insulated secure multi-server authenticated key agreement protocol for edge computing-based VANETs
Published in Internet of things (Amsterdam. Online) (01-04-2023)“…Authenticated key agreement is an important mechanism for the protection of data transmission in vehicular ad hoc networks (VANETs). However, in the existing…”
Get full text
Journal Article -
19
A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing
Published in Journal of information security and applications (01-12-2021)“…Nowadays, fog computing has become an emerging hot-topic for possessing the same advantages as cloud computing and the lower latency. Nevertheless, there are…”
Get full text
Journal Article -
20
Enabling online/offline remote data auditing for secure cloud storage
Published in Cluster computing (01-12-2021)“…The notion of Remote Data Auditing (RDA) has been put forward to achieve the integrity verification for cloud data. However, most of the existing RDA…”
Get full text
Journal Article