Search

Your search keyword '"Da Zhi Sun"' showing total 44 results

Search Constraints

Start Over You searched for: Author "Da Zhi Sun" Remove constraint Author: "Da Zhi Sun" Search Limiters Full Text Remove constraint Search Limiters: Full Text
44 results on '"Da Zhi Sun"'

Search Results

1. On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices

3. An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map

4. Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices

5. Member Tampering Attack on Burmester-Desmedt Group Key Exchange Protocol and Its Countermeasure

6. Security and Privacy Analysis of Vinoth et al.’s Authenticated Key Agreement Scheme for Industrial IoT

7. Efficient oblivious transfer with membership verification

8. On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy

9. On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications

10. Curcumin Alleviates Oxaliplatin-Induced Peripheral Neuropathic Pain through Inhibiting Oxidative Stress-Mediated Activation of NF-κB and Mitigating Inflammation

11. On the Security of Symmetric Encryption Against Mass Surveillance

12. An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map

13. Advanced encryption standard based on key dependent S‐Box cube

14. On Multi-Scalar Multiplication Algorithms for Register-Constrained Environments

15. Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing

16. Xiaotan Jieyu Prescription Alleviates Breast Precancerous Lesions through PI3K/Akt Signaling Pathway

18. Effect of methylnitronitrosoguanidine (MNNG) on the malignant transformation of human gastric mucosa GES-1 cells and its mechanism

19. Efficient oblivious transfer with membership verification

20. Xiao Tan He Wei Decoction reverses MNNG-induced precancerous lesions of gastric carcinoma in vivo and vitro: Regulation of apoptosis through NF-κB pathway

21. On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy

22. A comment on 'An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation'

23. A hash-based RFID security protocol for strong privacy protection

24. On the security of an enhanced novel access control protocol for wireless sensor networks

25. Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure

26. Improvements of Juang 's Password-Authenticated Key Agreement Scheme Using Smart Cards

27. A new design of wearable token system for mobile device security

28. An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks

30. Elevated Plasma D-Dimer Levels Correlate with Long Term Survival of Gastric Cancer Patients

31. Differences in the origin of philosophy between Chinese medicine and Western medicine: Exploration of the holistic advantages of Chinese medicine

32. A Chinese Herbal Formula to Improve General Psychological Status in Posttraumatic Stress Disorder: A Randomized Placebo-Controlled Trial on Sichuan Earthquake Survivors

33. OB glue paste technique for establishing nude mouse human gastric cancer orthotopic transplantation models

34. Xiaotan Sanjie decoction attenuates tumor angiogenesis by manipulating Notch-1-regulated proliferation of gastric cancer stem-like cells

35. Syndrome differentiation in traditional Chinese medicine and E-cadherin/ICAM-1 gene protein expression in gastric carcinoma

39. Characteristics of gastric cancer in syndromic classifications on Traditional Chinese Medicine: Analysis of 767 cases

40. A Chinese Herbal Formula to Improve General Psychological Status in Posttraumatic Stress Disorder: A Randomized Placebo-Controlled Trial on Sichuan Earthquake Survivors.

41. Improvements of Juang et al.'s Password-Authenticated Key Agreement Scheme Using Smart Cards.

42. A New Design of Wearable Token System for Mobile Device Security.

43. An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks.

44. Xiaotan Sanjie decoction attenuates tumor angiogenesis by manipulating Notch-1-regulated proliferation of gastric cancer stem-like cells.

Catalog

Books, media, physical & digital resources