Search Results - "Xiao, Meihua"

Refine Results
  1. 1

    Formal analysis of signal protocol based on logic of events theory by Li, Zehuan, Xiao, Meihua, Xu, Ruihan

    Published in Scientific reports (04-09-2024)
    “…The Signal is an end-to-end encrypted communication protocol composed of a double ratchet (DR) protocol and an extended triple Diffie-Hellman (X3DH) protocol…”
    Get full text
    Journal Article
  2. 2

    A formal analysis method for composition protocol based on model checking by Xiao, Meihua, Zhao, Hanyu, Yang, Ke, Ouyang, Ri, Song, Weiwei

    Published in Scientific reports (19-05-2022)
    “…Protocol security in a composition protocol environment has always been an open problem in the field of formal analysis and verification of security protocols…”
    Get full text
    Journal Article
  3. 3

    Prognosis of colorectal cancer, prognostic index of immunogenic cell death associated genes in response to immunotherapy, and potential therapeutic effects of ferroptosis inducers by Lei, Mengjie, Xiao, Meihua, Long, Zhiqing, Lin, Taolin, Ding, Ran, Quan, Qi

    Published in Frontiers in immunology (20-09-2024)
    “…This study leverages bioinformatics and medical big data to integrate datasets from the Gene Expression Omnibus (GEO) and The Cancer Genome Atlas (TCGA),…”
    Get full text
    Journal Article
  4. 4

    Genetic analysis and QTLs identification of stigma traits in japonica rice (Oryza sativa L.) by Jiang, Jianhua, Xu, Lei, Xiao, Meihua, Hu, Changmin, Zhang, Ying, Wang, Dezheng, Dang, Xiaojing

    Published in Euphytica (01-05-2021)
    “…Short stigma is one of the main reasons of low yield of F 1 hybrid seed production, especially in japonica rice. Genetics analysis and identifying favorable…”
    Get full text
    Journal Article
  5. 5

    Formal Analysis of DTLS-SRTP Combined Protocol Based on Logic of Events by Xiao, Meihua, Zhong, Yizhou, Li, Zehuan, Chen, Fangping

    Published in Applied sciences (01-03-2024)
    “…Security analysis of composite protocols is a critical issue in the field of network security. In complex network environments, the traditional approach of…”
    Get full text
    Journal Article
  6. 6

    Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality by Xiao, Meihua, Tan, Ruixiao, Ye, Huosheng, Gong, Lihua, Zhu, Zhiliang

    Published in Entropy (Basel, Switzerland) (06-07-2022)
    “…To achieve multiple color images encryption, a secure double-color-image encryption algorithm is designed based on the quaternion multiple parameter discrete…”
    Get full text
    Journal Article
  7. 7

    A novel formal logic for formal analysis of timeliness in non-repudiation protocols by Yang, Ke, Xiao, Meihua, Zhong, Xiaomei, Zhong, Yingqiang

    “…Non-repudiation protocols are aimed at exchanging digital messages and irrefutable receipts between two mistrusting parties over the Internet, which form the…”
    Get full text
    Journal Article
  8. 8

    Single-view 3D reconstruction via dual attention by Li, Chenghuan, Xiao, Meihua, Li, Zehuan, Chen, Fangping, Wang, Dingli

    Published in PeerJ. Computer science (22-10-2024)
    “…Constructing global context information and local fine-grained information simultaneously is extremely important for single-view 3D reconstruction. In this…”
    Get full text
    Journal Article
  9. 9

    Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events by ZHONG, Xiaomei, XIAO, Meihua, ZHANG, Tong, YANG, Ke, LUO, Yunxian

    Published in Chinese Journal of Electronics (01-01-2022)
    “…The increasing commercialization and massive deployment of radio frequency identification (RFID) systems has raised many security related issues which in…”
    Get full text
    Journal Article
  10. 10

    Current advances of Carthamus tinctorius L.: a review of its application and molecular regulation of flavonoid biosynthesis by Zhihua Wu, Ruting Li, Meihao Sun, Xueli Hu, Meihua Xiao, Zunhong Hu, Peipei Jiao, Shoucheng Pu, Juntuan Zhai, Jiaqiang Zhang

    Published in Medicinal Plant Biology (01-01-2024)
    “…Safflower is a valuable medicinal plant due to its diverse flavonoids, known as safflower yellow (SY) and safflower red (SR) pigments, which are popular in the…”
    Get full text
    Journal Article
  11. 11

    LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols by Song, Jiawen, Xiao, Meihua, Yang, Ke, Wang, Xizhong, Zhong, Xiaomei

    Published in IEEE access (2019)
    “…Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important. The…”
    Get full text
    Journal Article
  12. 12

    A Novel Approach to Automatic Security Protocol Analysis Based on Authentication Event Logic by Xiao, Meihua, Ma, Chenglin, Deng, Chunyan, Zhu, Ke

    Published in Chinese Journal of Electronics (01-01-2015)
    “…Since security protocols form the cornerstones of modern secure networked systems, it is important to develop informative, accurate, and deployable approach…”
    Get full text
    Journal Article
  13. 13

    Proving Mutual Authentication Property of KerNeeS Protocol Based on Logic of Events by Yang, Ke, Xiao, Meihua, Song, Jiawen, Chen, Jia, Zhong, Xiaomei, Wang, Xizhong

    Published in IEEE access (01-01-2018)
    “…The near field communication (NFC) is widely used on mobile devices and make it possible to take advantage of NFC system to complete mobile payment. But with…”
    Get full text
    Journal Article
  14. 14

    Formal Analysis and Verification of OAuth 2.0 Protocol Improved by Key Cryptosystems by Xiao, Meihua, Cheng, Daolei, Li, Wei, Li, Ya'nan, Liu, Xinqian, Mei, Yingtian

    Published in Chinese Journal of Electronics (01-05-2017)
    “…The reasons which take huge losses to enterprises and users are: Open authorization (OAuth) 2.0 protocol is excessively dependent on Hyper text transfer…”
    Get full text
    Journal Article
  15. 15

    A Framework for Formal Analysis of Anonymous Communication Protocols by Yang, Ke, Xiao, Meihua

    Published in Security and communication networks (02-05-2022)
    “…Anonymity is the property of keeping secret the identity of the user performing a certain action. The need for anonymity may arise in a wide range of…”
    Get full text
    Journal Article
  16. 16

    Long non‑coding RNA ZFPM2‑AS1 promotes colorectal cancer progression by sponging miR‑137 to regulate TRIM24 by Xiao, Meihua, Liang, Zhi, Yin, Zhihui

    Published in Molecular medicine reports (01-02-2021)
    “…Accumulating evidence indicates that long non‑coding RNAs (lncRNAs) may serve essential roles during tumorigenesis of colorectal cancer (CRC). The lncRNA…”
    Get full text
    Journal Article
  17. 17

    Insight into the pyrolysis behavior of corn straw through TG-FTIR, Py-GC/MS experiments and ReaxFF MD simulations by Zhang, Xiuxia, Liu, Xinming, Xiao, Meihua, Feng, Hongqing, Lin, Riyi, Wang, Xinwei

    Published in Fuel (Guildford) (15-09-2024)
    “…[Display omitted] •Pyrolysis characteristics of stover was studied experimentally and theoretically.•The required activation energy decreased slightly with…”
    Get full text
    Journal Article
  18. 18

    Proving authentication property of PUF-based mutual authentication protocol based on logic of events by Song, Jiawen, Xiao, Meihua, Zhang, Tong, Zhou, Haoyang

    Published in Soft computing (Berlin, Germany) (2022)
    “…PUF (Physical unclonable function) is a new hardware security primitive, and the research on PUFs is one of the emerging research focuses. For PUF-based mutual…”
    Get full text
    Journal Article
  19. 19

    Formal Analysis of the Security Protocol with Timestamp Using SPIN by Xiao, Meihua, Song, Weiwei, Yang, Ke, OuYang, Ri, Zhao, Hanyu

    “…The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against…”
    Get full text
    Journal Article
  20. 20

    Insight into the thermal conversion of corn stalk gasification in supercritical water based on reactive molecular dynamics simulations by Zhang, Xiuxia, Liu, Lining, Xiao, Meihua, Lang, Bofan, Xia, Lianxin, Lin, Riyi, Wang, Xinwei

    Published in Journal of the Energy Institute (01-02-2023)
    “…Supercritical water gasification (SCWG) technology could be used for the clean and efficient utilization of waste biomass. This work first constructed a…”
    Get full text
    Journal Article