期刊文献+
共找到277,478篇文章
< 1 2 250 >
每页显示 20 50 100
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
1
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
2
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
3
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
4
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Multi-radio fast routing recovery protocol based on spectrum situation awareness
5
作者 Chuanxin ZHOU Chao DONG +3 位作者 Xiaojun ZHU Fuhui ZHOU Qihui WU Zhengrui QIN 《Chinese Journal of Aeronautics》 2025年第3期435-446,共12页
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ... UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols. 展开更多
关键词 UAV ad hoc network OLSR protocol Routing recovery Electromagnetic spectrum situation awareness MULTI-RADIO
原文传递
Fresh Arrival--Rwanda-China avocado export protocol is a milestone in growing agricultural partnership
6
作者 ALAFATI MUGABO 《ChinAfrica》 2026年第1期46-47,共2页
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto... Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade. 展开更多
关键词 China trade protocol Rwanda agricultural partnership fresh avocado exports
原文传递
Enhanced Capacity Reversible Data Hiding Based on Pixel Value Ordering in Triple Stego Images
7
作者 Kim Sao Nguyen Ngoc Dung Bui 《Computers, Materials & Continua》 2026年第1期1571-1586,共16页
Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi... Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography. 展开更多
关键词 RDH reversible data hiding PVO RDH base three stego images
在线阅读 下载PDF
Towards mechanism-based tau-targeted therapies
8
作者 Lidia Bakota Roland Brandt 《Neural Regeneration Research》 2026年第2期687-688,共2页
Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,ta... Tau plays a crucial role in several neurodegenerative diseases,collectively referred to as tauopathies.Therefore,targeting potential pathological changes in tau could enable useful therapeutic interventions.However,tau is not an easy target because it dynamically interacts with microtubules and other cellular components,which presents a challenge for tau-targeted drugs.New cellular models could aid the development of mechanism-based tau-targeted therapies. 展开更多
关键词 tau targeted therapies cellular components mechanism based therapies cellular componentswhich cellular models MICROTUBULES TAUOPATHIES neurodegenerative diseasescollectively
暂未订购
Correction:Flux‑based assessment of ozone visible foliar injury in Southern Alps
9
作者 Elena Marra Alessandra De Marco +8 位作者 Andrea Ebone Anna Maria Ferrara Fabio Giannetti Francesco Tagliaferro Pierre Sicard Andrei Popa Ionel Popa Elena Paoletti Yasutomo Hoshika 《Journal of Forestry Research》 2026年第2期305-305,共1页
Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article ha... Correction to:Journal of Forestry Research(2025)36:124 https://doi.org/10.1007/s11676-025-01918-8 In this article the author’s name Yasutomo Hoshika was incorrectly written as Yasutoma Hoshika.The original article has been corrected. 展开更多
关键词 visible foliar injury southern Alps flux based assessment yasutomo hoshika journal forestry research yasutoma hoshikathe OZONE
在线阅读 下载PDF
Height-based biomass models differ for naturally regenerated and planted young trees
10
作者 Peter Marcis Jozef Pajtík +1 位作者 Bohdan Konôpka Martin Lukac 《Forest Ecosystems》 2026年第1期178-187,共10页
This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees a... This study investigated biomass allocation in young stands of European beech(Fagus sylvatica L.)and Norway spruce(Picea abies(L.)Karst.)across 31 forest sites in the Western Carpathians,Slovakia.A total of 541 trees aged 2–10 years,originating from natural regeneration and planting,were destructively sampled to quantify biomass in four components:foliage,branches,stems,and roots.Generalized non-linear least squares(GNLS)models with a weighing variance function outperformed log-transformed seemingly unrelated regression(SUR)models in terms of accuracy and robustness,especially for foliage and branch biomass.When using height as the predictor,SUR models tended to underestimate biomass in planted beech,leading to notable underprediction of aboveground and total biomass.Biomass allocation patterns varied significantly by species and regeneration origin.Using a non-linear system of equations and component ratio modelling,we found out that planted spruce displayed low variability and a consistent dominance of needle biomass,while naturally regenerated beech showed greater variability and a higher proportion of stem biomass,reflecting stronger competition-driven vertical growth.Interspecific differences in total biomass were more pronounced when using tree height,with spruce generally exhibiting greater biomass than beech at equivalent heights.Overall,stem base diameter marginally outperformed tree height as a predictor of biomass.However,tree height-based models showed strong performance and are particularly suitable for integration with remote sensing applications.These findings can directly support forest managers and modellers in comparing regeneration methods and biomass estimation approaches for early-stage stand development,carbon accounting,and remote sensing calibration. 展开更多
关键词 European beech Norway spruce Allometric relations Tree height Diameter at base Whole-tree biomass Tree components
在线阅读 下载PDF
Secured-FL:Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models
11
作者 Bello Musa Yakubu Nor Shahida Mohd Jamail +1 位作者 Rabia Latif Seemab Latif 《Computers, Materials & Continua》 2026年第3期734-757,共24页
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr... Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments. 展开更多
关键词 Federated learning(FL) blockchain FL based privacy model defense FL model security ethereum smart contract
在线阅读 下载PDF
Robust Hyper-Polarization Protocol of Nuclear Spins via Magic Sequence
12
作者 Haiyang Li Yongju Li +1 位作者 Hao Liao Ping Wang 《Chinese Physics Letters》 2026年第1期105-128,共24页
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei... Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center. 展开更多
关键词 transferring polarization electrons hyperpolarization protocols quantum information technologiesas nuclear spins pulse polarization nuclear spin polarization magic sequences nuclear magnetic resonance
原文传递
Erratum:Marine Shell-Inspired Laser Surface Texturing:Characterizing the Surface Properties of Co-Based Alloy
13
作者 Sefika Kasman Sertan Ozan 《Journal of Bionic Engineering》 2026年第1期551-551,共1页
The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Sur... The original online version of this article was revised:Several errors occurred in the published version of the article.These have now been corrected as follows:Page 2,section"2.2 Laser Texturing Procedure of Surfaces",line 2:The device name was corrected from"YDFLP-E-50-M8"to"YDFLP-50-M8."Page 3,Section 2.4:The phrase"95%confidence interval"has been corrected to"95%confidence level."Page 3,Figure 1 caption:The phrase"fandg"has been corrected to"f and g."The order"C4 and C12"has been reversed to"C12 and C4,"in accordance with the display order in the figure.Page 4,Figure reference:The phrase"Figs.4c and d"has been corrected to"Figs.5b and c."Page 5,paragraph starting with"The ANOVA results are presented...":The phrase"95%confidence interval"has been corrected to"95%confidence level." 展开更多
关键词 laser surface texturing surface properties marine shell inspired co based alloy laser texturing procedure confidence level ANOVA results
在线阅读 下载PDF
Home-Based Care Service
14
作者 XU JUNXING 《China Today》 2026年第3期70-72,共3页
Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursi... Hebei Province has incorporated targeted assistance services for people with disabilities into livelihood projects,upgrading the quality and efficiency of support services for disadvantaged groups.THE living and nursing allowances provided by the Chinese government for people with disabilities who are unable to work are not only important components of China’s social security system which provide for the needs of its disabled,but also show China’s ability to guarantee the basic living standard and social fairness and justice for this group of people. 展开更多
关键词 livelihood projects home based care targeted assistance livelihood projectsupgrading people disabilities living nursing allowances targeted assistance services social security system
在线阅读 下载PDF
Multimodal,multifaceted,imaging-based human brain white matter atlas
15
作者 Junchen Zhou Wenxia Li +4 位作者 Shuo Xu Bharat B.Biswal Huafu Chen Jiao Li Wei Liao 《Science Bulletin》 2026年第3期500-504,共5页
The brain atlas,or parcellation-delineating spatial partitions,organizes the brain's structure and function[1].The spatial arrangements of highly heterogeneous landscapes represent specialized functional regions f... The brain atlas,or parcellation-delineating spatial partitions,organizes the brain's structure and function[1].The spatial arrangements of highly heterogeneous landscapes represent specialized functional regions for investigating their interactions.Early efforts to parcellate the mammalian brain,using histological cytoarchitecture and myeloarchitecture,as well as recent in vivo magnetic resonance imaging(MRl)[2,3],have primarily involved cortical areas,subcortical structures,and cerebellar nuclei.Human brain parcellations primarily focus on grey matter(GM),which purposefully excludes white matter(WM),hindering the development of next-generation brain atlases. 展开更多
关键词 brain atlasor cerebellar nucleihuman brain p vivo magnetic resonance imaging mrl human brain white matter atlas histological cytoarchitecture imaging based PARCELLATION MULTIMODAL
原文传递
The Design and Implementation of SMS Gateway Interface for Early Warning Plan for Meteorological Hazards Based on CMPP Protocol 被引量:2
16
作者 苗传海 潘静 张超 《Meteorological and Environmental Research》 CAS 2010年第1期71-74,共4页
Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form t... Relying on CMPP (China Mobile Peer to Peer) protocol,we propose and design SMS (Short Message Service) gateway interface for early warning plan based on real-time meteorological database application,in order to form the meteorological mobile internet service system which is 'One point connect,service the whole province' for short.Accessing interface system to each city's SMG (Short Message Gateway) through standard protocol,we establish the information transmitting channel of short message platform and mobile SMG to realize the store-forward and flow control of short message.In addition,the stable and dependable communication connect of interface system and mobile SMG should be ensure,and the connect could be reconstructed while encountering any error,as well as committing short message would be stopped due to interruption of connect. 展开更多
关键词 CMPP protocol Meteorological warning Disaster prevention and reduction Short message interface Short message routing China
在线阅读 下载PDF
High efficiency AODV routing protocol based on link availability prediction in MANETs 被引量:2
17
作者 刘超 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期489-493,共5页
To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction ba... To cope with the problem of low protocol efficiency of the standard ad hoc on-demand distance vector (AODV) routing protocol with the periodic Hello message broadcast mechanism, a new link availability prediction based strategy is introduced to reduce the amount of Hello messages. In this strategy, a novel wireless link availability prediction model under line-of-sight (LOS) propagation environments is proposed based on which the parameter of Hello Interval in AODV can be dynamically adjusted to achieve the goal of changing the frequency of Hello message broadcasts under different link stability degrees. Simulation results demonstrate that, compared with the standard AODV with the periodic Hello message broadcast mechanism, the proposed protocol effectively reduces unnecessary control message overhead and greatly improves the performance in terms of end-to-end delay and efficiency. 展开更多
关键词 Hello message link availability ad hoc on-demand distance vector routing protocol ad hoc
在线阅读 下载PDF
Traditional Chinese medicine in the treatment of idiopathic pulmonary fibrosis based on syndrome differentiation:Study protocol of an exploratory trial 被引量:8
18
作者 Xue-qing Yu Shu-guang Yang +1 位作者 Yang Xie Jian-sheng Li 《Journal of Integrative Medicine》 SCIE CAS CSCD 2020年第2期163-168,共6页
Background: Idiopathic pulmonary fibrosis(IPF) has a poor prognosis and is often a kind of heavy financial burden to patients. Currently, few treatments are available for IPF. Clinical practice of traditional Chinese ... Background: Idiopathic pulmonary fibrosis(IPF) has a poor prognosis and is often a kind of heavy financial burden to patients. Currently, few treatments are available for IPF. Clinical practice of traditional Chinese medicine(TCM), using a syndrome differentiation approach, offers some treatment success in IPF. However, there is no sufficient evidence-based study of the role of TCM in IPF management to make strong conclusions. This study evaluates the efficacy and safety of TCM in the treatment of IPF.Methods and design: A multicenter, exploratory, randomized, double-blind and placebo-controlled trial is planned. A total of 80 patients will be enrolled in the study, which will include 26 weeks of treatment.Participants will be randomly assigned into TCM group or control group in a 1:1 ratio. The TCM group will be given TCM granules based on syndrome differentiation. Formulae include Bao-fei Hua-xian granule for lung qi deficiency, Jin-shui Huan-xian granule for lung-kidney qi deficiency and Yang-qing Kang-xian granule for yin deficiency and inner heat. The control group will be given a corresponding TCM granule placebo. The efficacy and safety of interventions will be evaluated by the outcome variables,including frequencies of acute exacerbations, pulmonary function, clinical symptoms, dyspnea, healthrelated quality of life(HRQo L), 6-minute walk distance and safety indicators.Discussion: It is hypothesized that TCM will decrease the frequency of adverse events, improve pulmonary function and HRQo L, based on our clinical experience. This trial is the first study of TCM treatment in IPF that is based on syndrome differentiation and will evaluate the efficacy and safety of TCM in IPF. 展开更多
关键词 IDIOPATHIC PULMONARY FIBROSIS Traditional Chinese medicine Syndrome differentiation protocol
原文传递
Formal analysis of robust email protocol based on authentication tests 被引量:1
19
作者 蒋睿 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期147-151,共5页
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m... Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy. 展开更多
关键词 email protocol authentication tests formal method perfect forward secrecy strand space model
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部