期刊文献+
共找到10,866篇文章
< 1 2 250 >
每页显示 20 50 100
Smart Contract-Aided Attribute-Based Signature Algorithm with Non-Monotonic Access Structures
1
作者 Xin Xu Zhen Yang Yongfeng Huang 《Computers, Materials & Continua》 2025年第6期5019-5035,共17页
Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained envi... Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical. 展开更多
关键词 attribute-based signature non-monotone smart contract
在线阅读 下载PDF
Attribute-based signatures on lattices 被引量:2
2
作者 Xie Jia Hu Yupu +2 位作者 Gao Juntao Gao Wen Li Xuelian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第4期83-90,共8页
Because of its wide application in anonymous authentication and attribute-based messaging, the attribute-based signature scheme has attracted the public attention since it was proposed in 2008. However, most of the ex... Because of its wide application in anonymous authentication and attribute-based messaging, the attribute-based signature scheme has attracted the public attention since it was proposed in 2008. However, most of the existing attribute-based signature schemes are no longer secure in quantum era. Fortunately, lattice-based cryptography offers the hope of withstanding quantum computers. And lattices has elevated it to the status of a promising potential alternative to cryptography based on discrete log and factoring, owing to implementation simplicity, provable security reductions and quantum-immune. In this paper, the first lattice attribute-based signature scheme in random oracle model is proposed, which is proved existential unforgeability and perfect privacy. Compared with the current attribute-based signature schemes, our new attribute-based signature scheme can resist quantum attacks and has much shorter public-key size and signature size. Furthermore, this scheme is extended into an attribute-based signature scheme on number theory research unit(NTRU) lattice, which is also secure even in quantum era and has much higher efficiency than the former. 展开更多
关键词 attribute signature lattice unforgeability perfect privacy
原文传递
Attribute-Based Signature on Lattices 被引量:4
3
作者 毛贤平 陈克非 +1 位作者 龙宇 王亮亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期406-411,共6页
Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can... Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can sign a message with any predicate that is satisfied by his attributes set. Unfortunately, there does not exist an attributebased signature which is resistance to the quantum attacks. This means we do not have secure attribute-based signature schemes in a post-quantum world. Based on this consideration, an attribute-based signature on lattices,which could resist quantum attacks, is proposed. This scheme employs "bonsai tree" techniques, and could be proved secure under the hardness assumption of small integer solution problem. 展开更多
关键词 attribute-based signature LATTICE small integer solution problem
原文传递
An Attribute-Based Signature Scheme from Lattice Assumption 被引量:5
4
作者 ZHANG Yanhua HU Yupu JIANG Mingming 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第3期207-213,共7页
Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to t... Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to the concatenation of a lattice matrix with the sum of some random matrices, and the signature vector is generated by using the Preimage Sampling algorithm. Compared with current attribute-based signature schemes, this scheme can resist quantum attacks and enjoy shorter public-key, smaller signature size and higher efficiency. 展开更多
关键词 attribute-based signature lattice assumption small integer solution post-quantum cryptography high efficiency
原文传递
An Attribute-Based Ring Signature Scheme in Lattice 被引量:2
5
作者 LI Wei FAN Mingyu JIA Zhenhong 《Wuhan University Journal of Natural Sciences》 CAS 2012年第4期297-301,共5页
An attribute-based ring signature scheme in lattice was proposed in this paper. In this signature scheme, an entity’s attributes correspond to the columns of a lattice matrix, and the signature was generated by using... An attribute-based ring signature scheme in lattice was proposed in this paper. In this signature scheme, an entity’s attributes correspond to the columns of a lattice matrix, and the signature was generated by using a subset of these attributes. The entities possessing these attributes form a ring. The scheme is computationally efficient than the schemes based on the integer factor problem and discrete logarithm problem, furthermore it is still secure in quantum computing environment. 展开更多
关键词 ring signature ATTRIBUTE Bonsai tree model LATTICE
原文传递
Attribute-Based Encryption for Secure Access Control in Personal Health Records
6
作者 Dakshnamoorthy Manivannan 《Computer Systems Science & Engineering》 2025年第1期533-555,共23页
Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets... Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets such as roles,specialties,or certifications.This data-centric cryptographic paradigm enables highly fine-grained,policydriven access control,minimizing the need for identity management and supporting scalable multi-user scenarios.This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade.It explores the evolution of these schemes,analyzing their design principles,strengths,limitations,and the level of granularity they offer in access control.The review also evaluates the security guarantees,efficiency,and practical applicability of these schemes in real-world healthcare environments.Furthermore,the paper outlines the current state of ABE as a mechanism for safeguarding EHR data and managing user access,while also identifying the key challenges that remain.Open issues such as scalability,revocation mechanisms,policy updates,and interoperability are discussed in detail,providing valuable insights for researchers and practitioners aiming to advance the secure management of health information systems. 展开更多
关键词 attribute-based encryption attribute-based access control data security cloud security privacypreserving healthcare IoMT security blockchain-based access control
在线阅读 下载PDF
Attribute-Based Encryption for IoT Environments—A Critical Survey
7
作者 Daskshnamoorthy Manivannan 《Journal on Internet of Things》 2025年第1期71-97,共27页
Attribute-Based Encryption(ABE)secures data by tying decryption rights to user attributes instead of identities,enabling fine-grained access control.However,many ABE schemes are unsuitable for Internet of Things(IoT)d... Attribute-Based Encryption(ABE)secures data by tying decryption rights to user attributes instead of identities,enabling fine-grained access control.However,many ABE schemes are unsuitable for Internet of Things(IoT)due to limited device resources.This paper critically surveys ABE schemes developed specifically for IoT over the past decade,examining their evolution,strengths,limitations,and access control capabilities.It provides insights into their security,effectiveness,and real-world applicability,highlights the current state of ABE in securing IoT data and access,and discusses remaining challenges and open issues. 展开更多
关键词 attribute-based encryption attribute-based access control cloud security security of internet of things
在线阅读 下载PDF
Several Attacks on Attribute-Based Encryption Schemes
8
作者 Phi Thuong Le Huy Quoc Le Viet Cuong Trinh 《Computers, Materials & Continua》 2025年第6期4741-4756,共16页
Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digita... Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digital rightsmanagement.ABE schemes rely on hard cryptographic assumptions such as pairings and others(pairingfree)to ensure their security against external and internal attacks.Internal attacks are carried out by authorized users who misuse their access to compromise security with potentially malicious intent.One common internal attack is the attribute collusion attack,in which users with different attribute keys collaborate to decrypt data they could not individually access.This paper focuses on the ciphertext-policy ABE(CP-ABE),a type of ABE where ciphertexts are produced with access policies.Our firstwork is to carry out the attribute collusion attack against several existing pairingfree CP-ABE schemes.As a main contribution,we introduce a novel attack,termed the anonymous key-leakage attack,concerning the context in which users could anonymously publish their secret keys associated with certain attributes on public platforms without the risk of detection.This kind of internal attack has not been defined or investigated in the literature.We then show that several prominent pairing-based CP-ABE schemes are vulnerable to this attack.We believe that this work will contribute to helping the community evaluate suitable CP-ABE schemes for secure deployment in real-life applications. 展开更多
关键词 attribute-based encryption ciphertext-policy attribute collusion attack anonymous key-leakage attack
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
9
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
Genomic signatures of local adaptation to precipitation and solar radiation in kiwifruit
10
作者 Quan Jiang Yufang Shen +2 位作者 Lianhai Wu Zhengwang Jiang Xiaohong Yao 《Plant Diversity》 2025年第5期733-745,共13页
Local adaptation is critical for plant survivals and reproductions in the context of global environmental change.Heterogeneous environments impose various selection pressures that influence the fitness of organisms an... Local adaptation is critical for plant survivals and reproductions in the context of global environmental change.Heterogeneous environments impose various selection pressures that influence the fitness of organisms and leave genomic signatures during the process of adaptation to local environments.However,unveiling the genomic signatures of adaptation still poses a major challenge especially for perennials due to limited genomic resources.Here,we utilized Actinidia eriantha,a Chinese endemic liana,as a model case to detect drivers of local adaptation and adaptive signals through landscape genomics for 311 individuals collected from 25 populations.Our results demonstrated precipitation and solar radiation were two crucial factors influencing the patterns of genetic variations and driving adaptive processes.We further uncovered a set of genes involved in adaptation to heterogeneous environments.Among them,AeERF110 showed high genetic differentiation between populations and was confirmed to be involved in local adaptation via changes in allele frequency along with precipitation(Prec_03)and solar radiation(Srad_03)in native habitats separately,implying that adaptive loci frequently exhibited environmental and geographic signals.In addition,we assessed genetic offsets of populations under four future climate models and revealed that populations from middle and east clusters faced higher risks in adapting to future environments,which should address more attentions.Taken together,our study opens new perspectives for understanding the genetic underpinnings of local adaptation in plants to environmental changes in a more comprehensive fashion and offered the guides on applications in conservation efforts. 展开更多
关键词 Local adaptation KIWIFRUIT Genotype-environment association study Genomic signatures Conservation application
在线阅读 下载PDF
Whole-genome sequencing reveals genetic architecture and selection signatures of Kazakh cattle
11
作者 Zhannur Niyazbekova Yuan Xu +11 位作者 Min Qiu Hao-Ping Wang Ibragimov Primkul Hojjat Asadollahpour Nanaei Yessengali Ussenbekov Kuanysh Kassen Yi Liu Cai-Yue Gao Shynar Akhmetsadykova Nuriddin Ruzikulov Yu Jiang Yu-Dong Cai 《Zoological Research》 2025年第2期301-311,共11页
Local cattle breeds play a critical role in breeding programs due to their genetic adaptations to diverse environmental conditions.However,the genomic architecture of local cattle breeds in Kazakhstan remains largely ... Local cattle breeds play a critical role in breeding programs due to their genetic adaptations to diverse environmental conditions.However,the genomic architecture of local cattle breeds in Kazakhstan remains largely unexplored.This study utilized whole-genome sequencing data from Kazakh cattle to elucidate their genetic composition,uncovering three primary ancestral components:European,Eurasian,and East Asian taurine.The East Asian taurine lineage likely represents the earliest genetic contribution to Kazakh cattle but was largely replaced by subsequent waves of cattle migrations across Eurasia,leaving only a minor genetic signature in the current cattle population.In contrast,Eurasian taurine ancestry predominated in the Alatau and Kazakh local breeds,while the European taurine component was most prevalent in Kazakh white-headed cattle,consistent with their documented breeding history.Kazakh cattle exhibited higher genetic diversity and lower inbreeding coefficients compared to European commercial breeds,reflecting reduced exposure to intense artificial selection.A strong selection signal was identified on chromosome 6 at a locus encompassing PDGFRA,KIT,and KDR,which may be associated with the white-headed pigmentation characteristic of Kazakh white-headed cattle.Additional genes under selection were linked to lipid metabolism(IRS1,PRKG1,and ADCY8),meat production traits(KCNMA1,PDGFRA,HIF1A,and ANTXR1),and dairy production(ATP2B1,DHX15,FUK,NEGR1,CCDC91,COG4,and PTK2B).This study represents the first comprehensive analysis of nuclear genome data from local Kazakh cattle.It highlights the impact of historical cattle migrations across Eurasia on their genetic landscape and identifies key genomic regions under selection.These findings advance our understanding of the evolutionary history of cattle and offer valuable genetic resources for future breeding strategies. 展开更多
关键词 Kazakh white-headed cattle Alatau cattle Local breed Genetic diversity Whole-genome sequencing Selection signatures
在线阅读 下载PDF
Renovated Random Attribute-Based Fennec Fox Optimized Deep Learning Framework in Low-Rate DoS Attack Detection in IoT
12
作者 Prasanalakshmi Balaji Sangita Babu +4 位作者 Maode Ma Zhaoxi Fang Syarifah Bahiyah Rahayu Mariyam Aysha Bivi Mahaveerakannan Renganathan 《Computers, Materials & Continua》 2025年第9期5831-5858,共28页
The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptibl... The rapid progression of the Internet of Things(IoT)technology enables its application across various sectors.However,IoT devices typically acquire inadequate computing power and user interfaces,making them susceptible to security threats.One significant risk to cloud networks is Distributed Denial-of-Service(DoS)attacks,where attackers aim to overcome a target system with excessive data and requests.Among these,low-rate DoS(LR-DoS)attacks present a particular challenge to detection.By sending bursts of attacks at irregular intervals,LR-DoS significantly degrades the targeted system’s Quality of Service(QoS).The low-rate nature of these attacks confuses their detection,as they frequently trigger congestion control mechanisms,leading to significant instability in IoT systems.Therefore,to detect the LR-DoS attack,an innovative deep-learning model has been developed for this research work.The standard dataset is utilized to collect the required data.Further,the deep feature extraction process is executed using the Residual Autoencoder with Sparse Attention(ResAE-SA),which helps derive the significant feature required for detection.Ultimately,the Adaptive Dense Recurrent Neural Network(ADRNN)is implemented to detect LR-DoS effectively.To enhance the detection process,the parameters present in the ADRNN are optimized using the Renovated Random Attribute-based Fennec Fox Optimization(RRA-FFA).The proposed optimization reduces the False Discovery Rate and False Positive Rate,maximizing the Matthews Correlation Coefficient from 23,70.8,76.2,84.28 in Dataset 1 and 70.28,73.8,74.1,82.6 in Dataset 2 on EPC-ADRNN,DPO-ADRNN,GTO-ADRNN,FFA-ADRNN respectively to 95.8 on Dataset 1 and 91.7 on Dataset 2 in proposed model.At batch size 4,the accuracy of the designed RRA-FFA-ADRNN model progressed by 9.2%to GTO-ADRNN,11.6%to EFC-ADRNN,10.9%to DPO-ADRNN,and 4%to FFA-ADRNN for Dataset 1.The accuracy of the proposed RRA-FFA-ADRNN is boosted by 12.9%,9.09%,11.6%,and 10.9%over FFCNN,SVM,RNN,and DRNN,using Dataset 2,showing a better improvement in accuracy with that of the proposed RRA-FFA-ADRNN model with 95.7%using Dataset 1 and 94.1%with Dataset 2,which is better than the existing baseline models. 展开更多
关键词 Detecting low-rate DoS attacks adaptive dense recurrent neural network residual autoencoder with sparse attention renovated random attribute-based fennec fox optimization
在线阅读 下载PDF
Hydrothermal signatures in sediments along the South Mid Atlantic Ridge from 18°S to 22°S:implications for potential hydrothermal fields
13
作者 Peng YANG Chuanshun LI +5 位作者 Jihua LIU Baoju YANG Jun YE Bing LI Yuan DANG Dewen DU 《Journal of Oceanology and Limnology》 2025年第3期746-763,共18页
The hydrothermal signatures of mid-ocean ridge sediments are crucial geochemical data providing insights into investigating hydrothermal anomalies and locating seafloor massive sulfide deposits.This paper outlines the... The hydrothermal signatures of mid-ocean ridge sediments are crucial geochemical data providing insights into investigating hydrothermal anomalies and locating seafloor massive sulfide deposits.This paper outlines the geochemical features of 24 surface sediments and one sediment core(26 V-GC 01,294 cm)along the South Mid-Atlantic Ridge(SMAR)from 18°S to 22°S,an area where hydrothermal active fields have yet to be discovered.The surface sediments mainly consist of biogenic carbonates,aluminosilicates,and hydrothermal Fe-Mn(oxy)oxides.The core sediments primarily comprise organic matter,detrital materials,hydrothermal components,and substances scavenged from seawater.The rare Earth element(REE)patterns suggest the presence of hydrothermal contributions within the surface and core sediments.The enrichment factors for Fe,Mn,Cu,and Zn in surface sediments suggest these metals are concentrated at the 19°S,21°S,and 21.5°S segments,further indicating their potential as hydrothermal active fields.Downcore variations of Fe,Mn,P,Cu,Pb,V,and Co suggest at least six episodes of hydrothermal activity.The impact of hydrothermal processes on the sediments from SMAR 18°S to 22°S indicates that the study area has the potential to host a significant number of hydrothermal active fields. 展开更多
关键词 South Mid-Atlantic Ridge hydrothermal signature sediment geochemistry 18°S-22°S hydrothermal activity
在线阅读 下载PDF
Modeling air gun signatures in marine seismic exploration considering multiple physical factors 被引量:10
14
作者 李国发 曹明强 +1 位作者 陈浩林 倪成洲 《Applied Geophysics》 SCIE CSCD 2010年第2期158-165,194,共9页
Based on analyzing the limit of Ziolkowski's bubble oscillation formulation,a new model with various physical factors is established to simulate air gun signatures fo marine seismic exploration.The practical effects ... Based on analyzing the limit of Ziolkowski's bubble oscillation formulation,a new model with various physical factors is established to simulate air gun signatures fo marine seismic exploration.The practical effects of physical factors,such as heat transfe across the bubble wall,air gun port throttling,vertical rise of the bubble,fluid viscosity,and the existence of the air gun body were all taken into account in the new model.Compared with Ziolkowski's model,the signatures simulated by the new model,with small peak amplitude and rapid decay of bubble oscillation,are more consistent with actual signatures The experiment analysis indicates:(1)gun port throttling controls the peak amplitude of ai gun pulse;(2)since the hydrostatic pressure decreases when the bubble rises,the bubble oscillation period changes;(3)heat transfer and fluid viscosity are the main factors tha explain the bubble oscillation damping. 展开更多
关键词 heat transfer port throttling fluid viscosity marine exploration air gun signature
在线阅读 下载PDF
A genome scan of recent positive selection signatures in three sheep populations 被引量:4
15
作者 ZHAO Fu-ping WEI Cai-hong +4 位作者 ZHANG Li LIU Jia-sen WANG Guang-kai ZENG Tao DU Li-xin 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2016年第1期162-174,共13页
Domesticated sheep have been exposed to artificial selection for the production of fiber, meat, and milk as well as to natural selection. Such selections are likely to have imposed distinctive selection signatures on ... Domesticated sheep have been exposed to artificial selection for the production of fiber, meat, and milk as well as to natural selection. Such selections are likely to have imposed distinctive selection signatures on the sheep genome. Therefore, detecting selection signatures across the genome may help elucidate mechanisms of selection and pinpoint candidate genes of interest for further investigation. Here, detection of selection signatures was conducted in three sheep breeds, Sunite (n=66), German Mutton (n=159), and Dorper (n=93), using the Illumina OvineSNP50 Genotyping BeadChip array. Each animal provided genotype information for 43 273 autosomal single nucleotide polymorphisms (SNPs). We adopted two complementary haplotype-based statistics of relative extended haplotype homozygosity (REHH) and the cross-popu- lation extended haplotype homozygosity (XP-EHH) tests. In total, 707,755, and 438 genomic regions subjected to positive selection were identified in Sunite, German Mutton, and Dorper sheep, respectively, and 42 of these regions were detected using both REHH and XP-EHH analyses. These genomic regions harbored many important genes, which were enriched in gene ontology terms involved in muscle development, growth, and fat metabolism. Fourteen of these genomic regions overlapped with those identified in our previous genome-wide association studies, further indicating that these genes under positive selection may underlie growth developmental traits. These findings contribute to the identification of candidate genes of interest and aid in understanding the evolutionary and biological mechanisms for controlling complex traits in Chinese and western sheep. 展开更多
关键词 selection signature detection sheep genome REHH test XP-EHH test SNP chip
在线阅读 下载PDF
Fair quantum blind signatures 被引量:3
16
作者 王天银 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第6期66-70,共5页
We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatu... We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. 展开更多
关键词 fair blind signature single photons hash function
原文传递
Developing chemical signatures of particulate air pollution in the Pearl River Delta region, China 被引量:4
17
作者 Mei Zheng Yuan Cheng +1 位作者 Limin Zeng Yuanhang Zhang 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2011年第7期1143-1149,共7页
PM 2.5 samples were collected in a regional sampling network with three sites in Hong Kong and four sites in the adjacent inland Pearl River Delta (PRD) or Guangdong Province during four months/seasons from 2002–20... PM 2.5 samples were collected in a regional sampling network with three sites in Hong Kong and four sites in the adjacent inland Pearl River Delta (PRD) or Guangdong Province during four months/seasons from 2002–2003. Trans-boundary transport between Hong Kong and the inland PRD is inevitable under the influence of Asian monsoon. In summer, Hong Kong serves as the upwind site of the inland PRD while during other seasons it is under the influence of continental emissions. Previous studies have recognized the importance of using chemical signatures to differentiate local vs. regional contributions to air pollutants in Hong Kong such as the CO/NOx ratio, ratios of different VOC species. In this study, detailed chemical speciation by gas chromatography-mass spectrometry was performed with PM 2.5 samples to identify new chemical signatures to distinguish aerosols in Hong Kong from those from the inland PRD. Since Hong Kong is not influenced by the continental emissions from the inland PRD during summer, comparison focused on chemical data obtained from this season for chemical signatures. The new ratios developed from the current study include LCPI/HCPI ratio of alkanes (0.39 ± 0.02 in Hong Kong vs. 0.78 ± 0.08 in the inland PRD), pyrene to benzo[ghi]perylene ratio (0.97 ± 0.21 in Hong Kong compared to 0.20 ± 0.06 in the inland PRD), and the ratio of 1,2-benzenedioic acid to 1,4-benzenedioic acid (1.8 ± 0.1 in Hong Kong vs. 0.6 ± 0.05 in the inland PRD). Results from this study also revealed that Hong Kong was impacted by ship emissions as reflected by substantially high V/Ni ratio (9 ± 2) while this ratio was about 1–2 at all sites in the inland PRD, which is very close to typical ratios from residual oil combustion. 展开更多
关键词 PM 2.5 chemical signature local and regional air pollution Hong Kong Pearl River Delta
原文传递
Genome-wide detection of selective signatures in a Duroc pig population 被引量:2
18
作者 DIAO Shu-qi LUO Yuan-yu +7 位作者 MA Yun-long DENG Xi HE Ying-ting GAO Ning ZHANG Hao LI Jia-qi CHEN Zan-mou ZHANG Zhe 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2018年第11期2528-2535,共8页
The Duroc pig has high adaptability and feeding efficiency, making it one of the most popular pig breeds worldwide. Over long periods of natural and artificial selection, genetic footprints, i.e., selective signatures... The Duroc pig has high adaptability and feeding efficiency, making it one of the most popular pig breeds worldwide. Over long periods of natural and artificial selection, genetic footprints, i.e., selective signatures, were left in the genome. In this study, a Duroc pig population (n=715) was genotyped with the Porcine SNP60K Bead Chip and the GeneSeek Genomic Profiler (GGP) Porcine Chip. The relative extended haplotype homozygosity (REHH) method was used for selective signature detection in a subset of the population (n=368), selected to represent a balanced family structure. In total, 154 significant core regions were detected as selective signatures (,P〈0.01), some of which overlap with previously reported quantitative trait loci associated with several economically important traits, including average daily gain and backfat thickness. Genome annotation for these significant core regions revealed a variety of interesting candidate genes including GATA3, TAF3, ATP5C1, and FGFI. These genes were functionally related to anterior/posterior pattern specification, phosphatidylinositol 3-kinase signaling, embryonic skeletal system morphogenesis, and oxidation-reduction processes. This research provides knowledge for the study of selection mechanisms and breeding practices in Duroc and other pigs. 展开更多
关键词 DUROC selective signature candidate genes REHH
在线阅读 下载PDF
Learning the signatures of the human grasp using a scalable tactile glove 被引量:5
19
作者 Zheng Lou 《Journal of Semiconductors》 EI CAS CSCD 2019年第7期2-2,共1页
Humans can sense, weigh and grasp different objects, deduce their physical properties at the same time, and exert appropriate forces – a challenging task for modern robots. Studying the mechanics of human grasping ob... Humans can sense, weigh and grasp different objects, deduce their physical properties at the same time, and exert appropriate forces – a challenging task for modern robots. Studying the mechanics of human grasping objects will play a supplementary role in visual-based robot object processing. These tools require large-scale tactile data sets with high spatial resolution. However, there is no large human-grasped tactile data set covering the whole hand, because dense coverage of the human hand with tactile sensors is challenging. Hence, the capability of observing and learning from successful daily humanobject interactions is the long-term goal of aiding the development of robots and prosthetics. 展开更多
关键词 SCALABLE TACTILE GLOVE signatures
在线阅读 下载PDF
Metabiotics: The Functional Metabolic Signatures of Probiotics: Current State-of-Art and Future Research Priorities—Metabiotics: Probiotics Effector Molecules 被引量:4
20
作者 Aarti Singh Vishakha Vishwakarma Barkha Singhal 《Advances in Bioscience and Biotechnology》 2018年第4期147-189,共43页
The intricate “orchestered molecular conversation” between the host and gut microbiome is one of the most dynamic research areas in recent years. The rhythmic chemical cross talk in the form of bioactive metabolites... The intricate “orchestered molecular conversation” between the host and gut microbiome is one of the most dynamic research areas in recent years. The rhythmic chemical cross talk in the form of bioactive metabolites and signalling molecules synthesized by gut microbiome plays a significant role for the modulation of human health in diversified ways. They are recognized as low molecular weight (LMW) molecules having versatile chemical attributes. They possess magnificent capability of interacting with surrounding environment and controlling the genes for various genetic, biochemical and physiological functions for maintaining the homeostasis that is now-a-days termed as “small molecules microbes originated (SMOM) homeostasis” in the host. These metabolic signatures have close structural and functional resemblance with small molecules synthesized by host eukaryotic cells and dietary components. Therefore, they may be considered as universalized metabolites contributing to the remarkable phenomenon of epigenetic regulation, cell to cell communication and stability of genome manifesting the overall growth and development of the host and known as “metabiotics”. The wide panorama of utilization of probiotics is continuously expanding and conferring the major health benefits through metabiotic components are gaining tremendous momentum therefore recognized as “hidden soldiers” of the body. Therefore firstly, we outline the need and types of metabiotic molecules and depicting their role in human health. Then, we summarize their preventive and therapeutic avenues in various diseases and finally, we propose the current technological interventions, bottlenecks and future perspectives in this field that are implied for accelerating their comprehensive understanding and utilization at industrial scale. 展开更多
关键词 Metabiotics PROBIOTICS METABOLIC signatures Gut MICROBIOME HOMEOSTASIS
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部