An amorphous CoSnO3@rGO nanocomposite fabricated using a surfactant‐assisted assembly method combined with thermal treatment served as a catalyst for non‐aqueous lithium‐oxygen(Li‐O2)batteries.In contrast to the s...An amorphous CoSnO3@rGO nanocomposite fabricated using a surfactant‐assisted assembly method combined with thermal treatment served as a catalyst for non‐aqueous lithium‐oxygen(Li‐O2)batteries.In contrast to the specific surface area of the bare CoSnO3 nanoboxes(104.3 m2 g–1),the specific surface area of the CoSnO3@rGO nanocomposite increased to approximately 195.8 m2 g–1 and the electronic conductivity also improved.The increased specific surface area provided more space for the deposition of Li2O2,while the improved electronic conductivity accelerated the decomposition of Li2O2.Compared to bare CoSnO3,the overpotential reduced by approximately 20 and 60 mV at current densities of 100 and 500 mA g?1 when CoSnO3@rGO was used as the catalyst.A Li‐O2 battery using a CoSnO3@rGO nanocomposite as the cathode catalyst cycled indicated a superior cyclic stability of approximately 130 cycles at a current density of 200 mA g–1 with a limited capacity of 1000 mAh g–1,which is 25 cycles more than that of the bare amorphous CoSnO3 nanoboxes.展开更多
Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper a...Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper attempts to sketch the evolution of TC from the view of our theoretical and engineering work.In theory,we focus on protocol design and security analysis.We have proposed the first ECDAA protocol scheme based on q-SDH assumption,which highlights a new way to design direct anonymous attestation scheme.In technical evolution,we discuss the key technologies of trust chain,trusted network connection and TC testing and evaluation.We break through several key technologies such as trusted boot,OS measurement and remote attestation,and implement a TC system from TPM/TCM to network.We also design and implement a testing and evaluation system of TC platform,which is the first one put into practical application in China.Finally,with the rapid development of cloud computing and mobile applications,TC is moving toward some new directions,such as the trust in cloud and mobile environments,new TPM standard,and flexible trust execution environment trust establishment method.展开更多
基金supported by the National Natural Science Foundation of China (11405144)the Fundamental Research Funds for the Central Universities (20720180081)~~
文摘An amorphous CoSnO3@rGO nanocomposite fabricated using a surfactant‐assisted assembly method combined with thermal treatment served as a catalyst for non‐aqueous lithium‐oxygen(Li‐O2)batteries.In contrast to the specific surface area of the bare CoSnO3 nanoboxes(104.3 m2 g–1),the specific surface area of the CoSnO3@rGO nanocomposite increased to approximately 195.8 m2 g–1 and the electronic conductivity also improved.The increased specific surface area provided more space for the deposition of Li2O2,while the improved electronic conductivity accelerated the decomposition of Li2O2.Compared to bare CoSnO3,the overpotential reduced by approximately 20 and 60 mV at current densities of 100 and 500 mA g?1 when CoSnO3@rGO was used as the catalyst.A Li‐O2 battery using a CoSnO3@rGO nanocomposite as the cathode catalyst cycled indicated a superior cyclic stability of approximately 130 cycles at a current density of 200 mA g–1 with a limited capacity of 1000 mAh g–1,which is 25 cycles more than that of the bare amorphous CoSnO3 nanoboxes.
基金supported by the National BasicResearch Program of China(2013CB338003)the National Natural Science Foundation of China(91118006 and 61202414)
文摘Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper attempts to sketch the evolution of TC from the view of our theoretical and engineering work.In theory,we focus on protocol design and security analysis.We have proposed the first ECDAA protocol scheme based on q-SDH assumption,which highlights a new way to design direct anonymous attestation scheme.In technical evolution,we discuss the key technologies of trust chain,trusted network connection and TC testing and evaluation.We break through several key technologies such as trusted boot,OS measurement and remote attestation,and implement a TC system from TPM/TCM to network.We also design and implement a testing and evaluation system of TC platform,which is the first one put into practical application in China.Finally,with the rapid development of cloud computing and mobile applications,TC is moving toward some new directions,such as the trust in cloud and mobile environments,new TPM standard,and flexible trust execution environment trust establishment method.