Search Results - "Xiao, Meihua"
-
1
Formal analysis of signal protocol based on logic of events theory
Published in Scientific reports (04-09-2024)“…The Signal is an end-to-end encrypted communication protocol composed of a double ratchet (DR) protocol and an extended triple Diffie-Hellman (X3DH) protocol…”
Get full text
Journal Article -
2
A formal analysis method for composition protocol based on model checking
Published in Scientific reports (19-05-2022)“…Protocol security in a composition protocol environment has always been an open problem in the field of formal analysis and verification of security protocols…”
Get full text
Journal Article -
3
Prognosis of colorectal cancer, prognostic index of immunogenic cell death associated genes in response to immunotherapy, and potential therapeutic effects of ferroptosis inducers
Published in Frontiers in immunology (20-09-2024)“…This study leverages bioinformatics and medical big data to integrate datasets from the Gene Expression Omnibus (GEO) and The Cancer Genome Atlas (TCGA),…”
Get full text
Journal Article -
4
Genetic analysis and QTLs identification of stigma traits in japonica rice (Oryza sativa L.)
Published in Euphytica (01-05-2021)“…Short stigma is one of the main reasons of low yield of F 1 hybrid seed production, especially in japonica rice. Genetics analysis and identifying favorable…”
Get full text
Journal Article -
5
Formal Analysis of DTLS-SRTP Combined Protocol Based on Logic of Events
Published in Applied sciences (01-03-2024)“…Security analysis of composite protocols is a critical issue in the field of network security. In complex network environments, the traditional approach of…”
Get full text
Journal Article -
6
Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality
Published in Entropy (Basel, Switzerland) (06-07-2022)“…To achieve multiple color images encryption, a secure double-color-image encryption algorithm is designed based on the quaternion multiple parameter discrete…”
Get full text
Journal Article -
7
A novel formal logic for formal analysis of timeliness in non-repudiation protocols
Published in Journal of King Saud University. Computer and information sciences (01-09-2023)“…Non-repudiation protocols are aimed at exchanging digital messages and irrefutable receipts between two mistrusting parties over the Internet, which form the…”
Get full text
Journal Article -
8
Single-view 3D reconstruction via dual attention
Published in PeerJ. Computer science (22-10-2024)“…Constructing global context information and local fine-grained information simultaneously is extremely important for single-view 3D reconstruction. In this…”
Get full text
Journal Article -
9
Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events
Published in Chinese Journal of Electronics (01-01-2022)“…The increasing commercialization and massive deployment of radio frequency identification (RFID) systems has raised many security related issues which in…”
Get full text
Journal Article -
10
Current advances of Carthamus tinctorius L.: a review of its application and molecular regulation of flavonoid biosynthesis
Published in Medicinal Plant Biology (01-01-2024)“…Safflower is a valuable medicinal plant due to its diverse flavonoids, known as safflower yellow (SY) and safflower red (SR) pigments, which are popular in the…”
Get full text
Journal Article -
11
LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
Published in IEEE access (2019)“…Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important. The…”
Get full text
Journal Article -
12
A Novel Approach to Automatic Security Protocol Analysis Based on Authentication Event Logic
Published in Chinese Journal of Electronics (01-01-2015)“…Since security protocols form the cornerstones of modern secure networked systems, it is important to develop informative, accurate, and deployable approach…”
Get full text
Journal Article -
13
Proving Mutual Authentication Property of KerNeeS Protocol Based on Logic of Events
Published in IEEE access (01-01-2018)“…The near field communication (NFC) is widely used on mobile devices and make it possible to take advantage of NFC system to complete mobile payment. But with…”
Get full text
Journal Article -
14
Formal Analysis and Verification of OAuth 2.0 Protocol Improved by Key Cryptosystems
Published in Chinese Journal of Electronics (01-05-2017)“…The reasons which take huge losses to enterprises and users are: Open authorization (OAuth) 2.0 protocol is excessively dependent on Hyper text transfer…”
Get full text
Journal Article -
15
A Framework for Formal Analysis of Anonymous Communication Protocols
Published in Security and communication networks (02-05-2022)“…Anonymity is the property of keeping secret the identity of the user performing a certain action. The need for anonymity may arise in a wide range of…”
Get full text
Journal Article -
16
Long non‑coding RNA ZFPM2‑AS1 promotes colorectal cancer progression by sponging miR‑137 to regulate TRIM24
Published in Molecular medicine reports (01-02-2021)“…Accumulating evidence indicates that long non‑coding RNAs (lncRNAs) may serve essential roles during tumorigenesis of colorectal cancer (CRC). The lncRNA…”
Get full text
Journal Article -
17
Insight into the pyrolysis behavior of corn straw through TG-FTIR, Py-GC/MS experiments and ReaxFF MD simulations
Published in Fuel (Guildford) (15-09-2024)“…[Display omitted] •Pyrolysis characteristics of stover was studied experimentally and theoretically.•The required activation energy decreased slightly with…”
Get full text
Journal Article -
18
Proving authentication property of PUF-based mutual authentication protocol based on logic of events
Published in Soft computing (Berlin, Germany) (2022)“…PUF (Physical unclonable function) is a new hardware security primitive, and the research on PUFs is one of the emerging research focuses. For PUF-based mutual…”
Get full text
Journal Article -
19
Formal Analysis of the Security Protocol with Timestamp Using SPIN
Published in Computational intelligence and neuroscience (23-08-2022)“…The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against…”
Get full text
Journal Article -
20
Insight into the thermal conversion of corn stalk gasification in supercritical water based on reactive molecular dynamics simulations
Published in Journal of the Energy Institute (01-02-2023)“…Supercritical water gasification (SCWG) technology could be used for the clean and efficient utilization of waste biomass. This work first constructed a…”
Get full text
Journal Article