∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the f...∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the following difficult problems 1-3 and to construct three ettlcient cryptographic protocols 4 6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both -- 3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t - 1 iil a (t, n)- threshold secret sharing scheme:3) How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes.展开更多
目的分析儿童急性淋巴细胞白血病(acute lymphoblastic leukemia,ALL)经中国儿童肿瘤协作组急性淋巴细胞白血病2015方案(Chinese Children's Cancer Group ALL-2015 protocol,CCCG-ALL-2015)治疗后的累积复发率(cumulative incidenc...目的分析儿童急性淋巴细胞白血病(acute lymphoblastic leukemia,ALL)经中国儿童肿瘤协作组急性淋巴细胞白血病2015方案(Chinese Children's Cancer Group ALL-2015 protocol,CCCG-ALL-2015)治疗后的累积复发率(cumulative incidence of relapse,CIR),并探讨影响复发的危险因素。方法回顾性分析2015年1月—2019年12月接受CCCG-ALL-2015方案治疗的852例患儿的临床资料,计算CIR并分析影响儿童急性B淋巴细胞白血病(B-ALL)复发的危险因素。结果852例ALL患儿中,146例(17.1%)发生复发,8年CIR为(19.8±1.6)%。B-ALL与急性T淋巴细胞白血病患儿的8年CIR比较差异无统计学意义(P>0.05)。146例复发患儿中,复发时间主要集中于极早期(62例,42.5%)和早期(46例,31.5%),极早期单纯骨髓复发42例(28.8%),早期单纯骨髓复发27例(18.5%)。Cox比例风险回归模型分析显示,融合基因MLLr阳性(HR=4.177,95%CI:2.086~8.364,P<0.001)和第46天微小残留病≥0.01%(HR=2.013,95%CI:1.163~3.483,P=0.012)是B-ALL患儿经CCCG-ALL-2015方案治疗后复发的危险因素。结论儿童ALL经CCCG-ALL-2015方案治疗后仍有较高的复发率,以极早期和早期单纯骨髓复发常见;第46天微小残留病≥0.01%、融合基因MLLr阳性与B-ALL复发密切相关。展开更多
A new method for multi-protocol label switching is presented in this study, whose core idea is to construct model for simulating process of accommodating network online loads and then adopt genetic algorithm to optimi...A new method for multi-protocol label switching is presented in this study, whose core idea is to construct model for simulating process of accommodating network online loads and then adopt genetic algorithm to optimize the model. Due to the heuristic property of evolutional method, the new method is efficient and effective, which is verified by the experiments.展开更多
Modern cars are mostly computerized and equipped with passive keyless entry and start(PKES) system. PKES is based on Radio Frequency Identification(RFID) technology for authentication of the authorized drivers. RFID t...Modern cars are mostly computerized and equipped with passive keyless entry and start(PKES) system. PKES is based on Radio Frequency Identification(RFID) technology for authentication of the authorized drivers. RFID technology has replaced the conventional ways of identification and authorization in order to facilitate users while introducing new security challenges. In this article, we focused on verifying the presence of authorized key in the physical proximity of car by employing multiple antennas. Application of multiple antennas to the currently developed cryptographic algorithms opens a new approach for researchers to improve security of RFID based systems. We propose an advanced security system for PKES using multiple antennas wherein an authorized key passes through multiple vicinities to allow driver to access and start the car. Furthermore, we modified a light-weight cryptographic protocol named as HB(Hopper and Blum) protocol to integrate it with the proposed design based on multiple antennas. Simulation results show improvement in security functionality while keeping in view the efficiency constraints.展开更多
The growing need for high-performance networking is achieved with parallel processing;several networking functions are processed concurrently in order to accomplish a performance Networking Architecture. Open systems ...The growing need for high-performance networking is achieved with parallel processing;several networking functions are processed concurrently in order to accomplish a performance Networking Architecture. Open systems interconnection (OSI) model is an example of multi-layering structure, and each layer performs definite function unique to that layer. OSI model works on pass it on principle, and it is divided in two stacks lower stack and upper stack. Layers 4 - 7 represent upper stack and responsible for data applications. The remaining 1 - 3 layers represent the lower stack and mostly involve in data movement. There are many techniques are available for server optimization enhancing the availability by distributing the load among peer servers. According to our knowledge, nobody has implemented such splitting architecture across the entire OSI model. In this paper, we present multilayer Split-protocol (MLSP) a high performance, reliable and secure technique for spiting an application or network protocol across OSI model, and we present the design, implementation, and empirical performance evaluation of MLSP. It is the ideal choice for Cloud services where each functional component is considered an independent of each other.展开更多
基金supported by the Foundation of tihe National Natural Science of China under Grant Nos 90604034 (Key Project), 10726012, 10871222, 10531040,and 10471156
文摘∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the following difficult problems 1-3 and to construct three ettlcient cryptographic protocols 4 6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both -- 3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t - 1 iil a (t, n)- threshold secret sharing scheme:3) How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes.
文摘目的分析儿童急性淋巴细胞白血病(acute lymphoblastic leukemia,ALL)经中国儿童肿瘤协作组急性淋巴细胞白血病2015方案(Chinese Children's Cancer Group ALL-2015 protocol,CCCG-ALL-2015)治疗后的累积复发率(cumulative incidence of relapse,CIR),并探讨影响复发的危险因素。方法回顾性分析2015年1月—2019年12月接受CCCG-ALL-2015方案治疗的852例患儿的临床资料,计算CIR并分析影响儿童急性B淋巴细胞白血病(B-ALL)复发的危险因素。结果852例ALL患儿中,146例(17.1%)发生复发,8年CIR为(19.8±1.6)%。B-ALL与急性T淋巴细胞白血病患儿的8年CIR比较差异无统计学意义(P>0.05)。146例复发患儿中,复发时间主要集中于极早期(62例,42.5%)和早期(46例,31.5%),极早期单纯骨髓复发42例(28.8%),早期单纯骨髓复发27例(18.5%)。Cox比例风险回归模型分析显示,融合基因MLLr阳性(HR=4.177,95%CI:2.086~8.364,P<0.001)和第46天微小残留病≥0.01%(HR=2.013,95%CI:1.163~3.483,P=0.012)是B-ALL患儿经CCCG-ALL-2015方案治疗后复发的危险因素。结论儿童ALL经CCCG-ALL-2015方案治疗后仍有较高的复发率,以极早期和早期单纯骨髓复发常见;第46天微小残留病≥0.01%、融合基因MLLr阳性与B-ALL复发密切相关。
基金This work was supported by the National Natural Science Foundation of China (No10371097)Open Project of Com-putational Key Laboratory in Yunnan Provice
文摘A new method for multi-protocol label switching is presented in this study, whose core idea is to construct model for simulating process of accommodating network online loads and then adopt genetic algorithm to optimize the model. Due to the heuristic property of evolutional method, the new method is efficient and effective, which is verified by the experiments.
基金supported by the National Key Research and Development Program(No.2016YFB0800602)National Natural Science Foundation of China(NSFC)(No.61502048)Shandong provincial Key Research and Development Program of China(2018CXGC0701,2018GGX106005)
文摘Modern cars are mostly computerized and equipped with passive keyless entry and start(PKES) system. PKES is based on Radio Frequency Identification(RFID) technology for authentication of the authorized drivers. RFID technology has replaced the conventional ways of identification and authorization in order to facilitate users while introducing new security challenges. In this article, we focused on verifying the presence of authorized key in the physical proximity of car by employing multiple antennas. Application of multiple antennas to the currently developed cryptographic algorithms opens a new approach for researchers to improve security of RFID based systems. We propose an advanced security system for PKES using multiple antennas wherein an authorized key passes through multiple vicinities to allow driver to access and start the car. Furthermore, we modified a light-weight cryptographic protocol named as HB(Hopper and Blum) protocol to integrate it with the proposed design based on multiple antennas. Simulation results show improvement in security functionality while keeping in view the efficiency constraints.
文摘The growing need for high-performance networking is achieved with parallel processing;several networking functions are processed concurrently in order to accomplish a performance Networking Architecture. Open systems interconnection (OSI) model is an example of multi-layering structure, and each layer performs definite function unique to that layer. OSI model works on pass it on principle, and it is divided in two stacks lower stack and upper stack. Layers 4 - 7 represent upper stack and responsible for data applications. The remaining 1 - 3 layers represent the lower stack and mostly involve in data movement. There are many techniques are available for server optimization enhancing the availability by distributing the load among peer servers. According to our knowledge, nobody has implemented such splitting architecture across the entire OSI model. In this paper, we present multilayer Split-protocol (MLSP) a high performance, reliable and secure technique for spiting an application or network protocol across OSI model, and we present the design, implementation, and empirical performance evaluation of MLSP. It is the ideal choice for Cloud services where each functional component is considered an independent of each other.