期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Amorphous CoSnO_3@rGO nanocomposite as an efficient cathode catalyst for long-life Li-O_2 batteries 被引量:1
1
作者 Guanghui Yue Jiandi Liu +3 位作者 Jiangtao Han Donghui Qin Qiang Chen jianxiong shao 《Chinese Journal of Catalysis》 SCIE EI CAS CSCD 北大核心 2018年第12期1951-1959,共9页
An amorphous CoSnO3@rGO nanocomposite fabricated using a surfactant‐assisted assembly method combined with thermal treatment served as a catalyst for non‐aqueous lithium‐oxygen(Li‐O2)batteries.In contrast to the s... An amorphous CoSnO3@rGO nanocomposite fabricated using a surfactant‐assisted assembly method combined with thermal treatment served as a catalyst for non‐aqueous lithium‐oxygen(Li‐O2)batteries.In contrast to the specific surface area of the bare CoSnO3 nanoboxes(104.3 m2 g–1),the specific surface area of the CoSnO3@rGO nanocomposite increased to approximately 195.8 m2 g–1 and the electronic conductivity also improved.The increased specific surface area provided more space for the deposition of Li2O2,while the improved electronic conductivity accelerated the decomposition of Li2O2.Compared to bare CoSnO3,the overpotential reduced by approximately 20 and 60 mV at current densities of 100 and 500 mA g?1 when CoSnO3@rGO was used as the catalyst.A Li‐O2 battery using a CoSnO3@rGO nanocomposite as the cathode catalyst cycled indicated a superior cyclic stability of approximately 130 cycles at a current density of 200 mA g–1 with a limited capacity of 1000 mAh g–1,which is 25 cycles more than that of the bare amorphous CoSnO3 nanoboxes. 展开更多
关键词 Amorphous CoSnO3 nanoboxe NANOCOMPOSITE Li‐O2 battery Cathode catalyst
下载PDF
The theory and practice in the evolution of trusted computing 被引量:5
2
作者 Dengguo Feng Yu Qin +1 位作者 Wei Feng jianxiong shao 《Chinese Science Bulletin》 SCIE EI CAS 2014年第32期4173-4189,共17页
Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper a... Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper attempts to sketch the evolution of TC from the view of our theoretical and engineering work.In theory,we focus on protocol design and security analysis.We have proposed the first ECDAA protocol scheme based on q-SDH assumption,which highlights a new way to design direct anonymous attestation scheme.In technical evolution,we discuss the key technologies of trust chain,trusted network connection and TC testing and evaluation.We break through several key technologies such as trusted boot,OS measurement and remote attestation,and implement a TC system from TPM/TCM to network.We also design and implement a testing and evaluation system of TC platform,which is the first one put into practical application in China.Finally,with the rapid development of cloud computing and mobile applications,TC is moving toward some new directions,such as the trust in cloud and mobile environments,new TPM standard,and flexible trust execution environment trust establishment method. 展开更多
关键词 可信计算 TCM 计算平台 移动应用 TPM 安全芯片 安全分析 匿名认证
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部