Elsevier期刊
期刊
会议
图书
作者:Xinyi Huang , Junlong Li ...
来源:[J].Journal of Electroanalytical Chemistry(IF 2.672), 2018, Vol.816, pp.75-82Elsevier
摘要:Abstract(#br)A simple protease-free and signal-on electrochemical biosensor based on GR-5 DNAzyme and catalytic hairpin assembly (CHA) for sensitive lead ion (Pb 2+ ) assay was constructed in this work. In the presence of Pb 2+ , GR-5 DNAzyme specifically reacted with Pb 2+ ...
作者:... Saru Kumari , Xinyi Huang , Mohammad Wazid
来源:[J].Future Generation Computer Systems(IF 1.864), 2017, Vol.68, pp.74-88Elsevier
摘要:Abstract(#br)With the rapid development of mobile cloud computing, the security becomes a crucial part of communication systems in a distributed mobile cloud computing environment. Recently, in 2015, Tsai and Lo proposed a privacy-aware authentication scheme for distributed ...
作者:... Wei Wu , Xinyi Huang , Li Xu
来源:[J].Journal of Computer and System Sciences(IF 1), 2017, Vol.83 (1), pp.73-83Elsevier
摘要:Abstract(#br)We propose a new design of universal designated verifier transitive signatures, to authenticate dynamically growing big graph data. The scheme is built on the classical RSA signature and possesses several desirable properties. It supports edge-signature composition a...
作者:Xinyi Huang , Aiping Dong ...
来源:[J].BBA - General Subjects(IF 3.848), 2017, Vol.1861 (1), pp.3095-3105Elsevier
摘要:Abstract(#br)Background(#br)Seven in absentia homologs (SIAHs) comprise a family of highly conserved E3 ubiquitin ligases that play an important role in regulating signalling pathways in tumorigenesis, including the DNA damage repair and hypoxia response pathways. SIAH1 and SIAH2...
作者:Xinyi Huang , Yang Xiang
来源:[J].Journal of Computer and System Sciences(IF 1), 2017Elsevier
摘要:Abstract(#br)Personal Health Record (PHR) has been developed as a promising solution that allows patient–doctors interactions in a very effective way. Cloud technology has been seen as the prominent candidate to store the sensitive medical record in PHR, but to date, the sec...
作者:... Francesco Palmieri , Xinyi Huang , Aniello Castiglione
来源:[J].Information Sciences(IF 3.643), 2017, Vol.387, pp.56-74Elsevier
摘要:Abstract(#br)With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is moved on centralized network-based repository services, providing elastic outsourced storage capacity, available through remote access. This introduces new challenges a...
作者:Shao-Jun Yang , Xinyi Huang
来源:[J].Future Generation Computer Systems(IF 1.864), 2018, Vol.86, pp.582-590Elsevier
摘要:Abstract(#br)Security protocols for RFID and IoT are often built on NP-hard problems. The greedy algorithm is an effective method to solve some NP-hard problems. However, the greedy algorithm can get the optimal solution if and only if the structure of the solutions is a matroid....
作者:Xinyi Huang , Chaorui Li
来源:[J].Materials Letters(IF 2.224), 2018, Vol.211, pp.348-351Elsevier
摘要:Abstract(#br)Single-walled carbon nanotubes (SWCNTs) cannot be stably dispersed in aqueous solutions, which greatly limit their use in biomedical applications. In this study, functionalized SWCNTs were dispersed in chitosan (CS) solution, which greatly promoted the water sol...
作者:Xinyi Huang , Xiaofeng Chen
来源:[J].Information Sciences(IF 3.643), 2018, Vol.429, pp.390-405Elsevier
摘要:Abstract(#br)Wireless communications in smart homes are vulnerable to many adversarial attacks such as eavesdropping. To secure the communications, secret session keys need to be established between home appliances. In existing symmetric key establishment protocols, it is assumed...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×