Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (141)
  • Open Access

    ARTICLE

    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    Gang Xu1, Yibo Cao1, Shiyuan Xu1, Xin Liu2,*, Xiu-Bo Chen3, Yiying Yu1, Xiaojun Wang4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5429-5441, 2022, DOI:10.32604/cmc.2022.028562

    Abstract With the increasing popularity of cloud storage, data security on the cloud has become increasingly visible. Searchable encryption has the ability to realize the privacy protection and security of data in the cloud. However, with the continuous development of quantum computing, the standard Public-key Encryption with Keyword Search (PEKS) scheme cannot resist quantum-based keyword guessing attacks. Further, the credibility of the server also poses a significant threat to the security of the retrieval process. This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems. Firstly, we design a lattice-based encryption primitive to… More >

  • Open Access

    ARTICLE

    A Steganography Model Data Protection Method Based on Scrambling Encryption

    Xintao Duan1,*, Zhiqiang Shao1, Wenxin Wang1, En Zhang1, Dongli Yue1, Chuan Qin2, Haewoon Nam3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5363-5375, 2022, DOI:10.32604/cmc.2022.027807

    Abstract At present, the image steganography method based on CNN has achieved good results. The trained model and its parameters are of great value. Once leaked, the secret image will be exposed. To protect the security of steganographic network model parameters in the transmission process, an idea based on network model parameter scrambling is proposed in this paper. Firstly, the sender trains the steganography network and extraction network, encrypts the extraction network parameters with the key shared by the sender and the receiver, then sends the extraction network and parameters to the receiver through the public channel, and the receiver recovers… More >

  • Open Access

    ARTICLE

    Efficient Routing Protection Algorithm Based on Optimized Network Topology

    Haijun Geng1,2, Zikun Jin1, Jiangyuan Yao3,*, Han Zhang4, Zhiguo Hu6, Bo Yang5, Yingije Guo7, Wei Wang1, Qidong Zhang1, Guoao Duan8

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4525-4540, 2022, DOI:10.32604/cmc.2022.027725

    Abstract Network failures are unavoidable and occur frequently. When the network fails, intra-domain routing protocols deploying on the Internet need to undergo a long convergence process. During this period, a large number of messages are discarded, which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers (ISP). Therefore, improving the availability of intra-domain routing is a trending research question to be solved. Industry usually employs routing protection algorithms to improve intra-domain routing availability. However, existing routing protection schemes compute as many backup paths as possible to reduce message loss due to… More >

  • Open Access

    ARTICLE

    Physiological and Biochemical Mechanisms of Exogenous Calcium Chloride on Alleviating Salt Stress in Two Tartary Buckwheat (Fagopyrum tataricum) Varieties Differing in Salinity Tolerance

    Tao Zhang*, Hongbing Yang

    Phyton-International Journal of Experimental Botany, Vol.91, No.8, pp. 1643-1658, 2022, DOI:10.32604/phyton.2022.019572

    Abstract Salt stress is one of the most serious abiotic stresses limiting plant growth and development. Calcium as an essential nutrient element and important signaling molecule plays an important role in ameliorating the adverse effect of salinity on plants. This study aimed to investigate the impact of exogenous calcium on improving salt tolerance in Tartary buckwheat cultivars, cv. Xinong9920 (salt-tolerant) and cv. Xinong9909 (salt-sensitive). Four-week-old Tartary buckwheat seedlings under 100 mM NaCl stress were treated with and without exogenous calcium chloride (CaCl2), Ca2+ chelator ethylene glycol tetraacetic acid (EGTA) and Ca2+-channel blocker lanthanum chloride (LaCl3) for 10 days. Then, some important… More >

  • Open Access

    ARTICLE

    Antifungal Activity of Crude Extracts of Tectona grandis L.f. against Wood Decay Fungi

    Enrique Cárcamo-Ibarra1, Mauro Manuel Martínez-Pacheco2, Abril Munro-Rojas1, Jorge Enrique Ambriz-Parra1, Crisanto Velázquez-Becerra1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.8, pp. 1795-1808, 2022, DOI:10.32604/phyton.2022.020578

    Abstract Wood is mainly made up of cellulose, hemicelluloses, lignin polymers and other organic and inorganic substances, making it susceptible to deteriorate by various biological agents. Tectona grandis L.f. (Teak) is a timber species with high resistance to biological deterioration, valued for its durability, beauty, and mechanical resistance. The purpose of this work was to evaluate the antifungal activity of crude extracts from teak on various fungi that cause wood deterioration. For this, Teak heartwood was obtained, then fragmented and pulverized until obtaining a flour which was used for compounds extraction using the Soxhlet technique coupled to a rotary evaporator through… More >

  • Open Access

    ARTICLE

    Phosphorylated Salicylic Acid as Flame Retardant in Epoxy Resins and Composites

    Lara Greiner1,*, Philipp Kukla2, Sebastian Eibl1, Manfred Döring3

    Journal of Renewable Materials, Vol.10, No.7, pp. 1931-1950, 2022, DOI:10.32604/jrm.2022.019548

    Abstract A novel, versatile flame retardant substructure based on phosphorylated salicylic acid (SCP) is described and used in the synthesis of new flame retardants for HexFlow® RTM6, a high-performance epoxy resin used in resin transfer molding processes as composite matrix. The starting material salicylic acid can be obtained from natural sources. SCP as reactive phosphorus chloride is converted with a novolak, a novolak containing 9, 10-dihydro-9- oxa-10-phospha-phenanthrene-10-oxide (DOPO) substituents or DOPO-hydroquinone to flame retardants with sufficient thermal stability and high char yield. Additionally, these flame retardants are soluble in the resin as well as react into the epoxy network. The determined… More >

  • Open Access

    ARTICLE

    A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS

    Tao Chen1, Zhao Qiu1,*, Gengquan Xie1, Lin Yuan1, Shaohua Duan1, Hao Guo1, Dahao Fu1, Hancheng Huang2

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 131-142, 2021, DOI:10.32604/jihpp.2021.026606

    Abstract Behind the popularity of multimedia technology, the dispute over image copyright is getting worse. In the digital watermark prevention technology for copyright infringement, watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership. Among the many digital watermarking technologies, zero watermarking technology has been favored in recent years. However, the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks, which may make the data too central, data storage security is low and copyright registration costs are too high, which creates a… More >

  • Open Access

    ARTICLE

    Protection of Zero-Sequence Power Variation in Mountain Wind Farm Collector Lines Based on Multi-Mode Grounding

    Hongchun Shu1,2, Yaqi Deng1,2,*, Pulin Cao2, Jun Dong2, Hongjiang Rao2, Zhiqian Bo2

    Energy Engineering, Vol.119, No.2, pp. 523-538, 2022, DOI:10.32604/ee.2022.015570

    Abstract The arc-suppression coil (ASC) in parallel low resistance (LR) multi-mode grounding is adopted in the mountain wind farm to cope with the phenomenon that is misoperation or refusal of zero-sequence protection in LR grounding wind farm. If the fault disappears before LR is put into the system, it is judged as an instantaneous fault; while the fault does not disappear after LR is put into the system, it is judged as a permanent fault; the single-phase grounding fault (SLG) protection criterion based on zero-sequence power variation is proposed to identify the instantaneous-permanent fault. Firstly, the distribution characteristic of zero-sequence voltage… More >

  • Open Access

    ARTICLE

    One Step Regioselective Acylation of Polyphenolic Wood Extractive and Its Application for Wood Treatment

    Wissem Sahmim, Georges Eid, Febrina Dellarose Boer, Hubert Chapuis, Philippe Gérardin, Christine Gérardin-Charbonnier*

    Journal of Renewable Materials, Vol.10, No.6, pp. 1491-1503, 2022, DOI:10.32604/jrm.2022.016364

    Abstract This study evaluated the methods of grafting commercial catechin with fatty acids, namely capric acid (C10), lauric acid (C12), and myristic acid (C14) through esterification. Specimens of beech wood (Fagus sylvatica L.) were impregnated with catechin and modified catechin-fatty acids, separately, at a 5% concentration diluted in ethanol using vacuum pressure treatment and subjected to leaching. The weight percentage gain before leaching (WPG), after leaching (WPGAL), and weight loss due to leaching (PL) were investigated. Both leached and unleached samples were tested against white-rot fungi (Trametes versicolor) in Petri-dishes for twelve weeks. Results show that samples treated with modified catechin-fatty… More > Graphic Abstract

    One Step Regioselective Acylation of Polyphenolic Wood Extractive and Its Application for Wood Treatment

  • Open Access

    ARTICLE

    Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme

    Yung-Yao Chen1,*, Yu-Chen Hu2, Ting-Kai Yang3, You-An Wang3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5167-5182, 2022, DOI:10.32604/cmc.2022.023993

    Abstract Nowadays since the Internet is ubiquitous, the frequency of data transfer through the public network is increasing. Hiding secure data in these transmitted data has emerged broad security issue, such as authentication and copyright protection. On the other hand, considering the transmission efficiency issue, image transmission usually involves image compression in Internet-based applications. To address both issues, this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding (AMBTC). First, an image is divided into non-overlapping blocks through AMBTC compression, the blocks are classified four types, namely smooth, semi-smooth, semi-complex, and complex. The… More >

Displaying 61-70 on page 7 of 141. Per Page