Learn More
This paper presents a distributed user authentication scheme in wireless sensor networks. Our scheme is based on the self-certified keys cryptosystem (SCK), and we have modified it to use elliptic curve cryptography (ECC) to establish pair-wise keys for use in our user authentication scheme. The proposed scheme imposes very light computational and(More)
Plant root architecture is highly plastic during development and can adapt to many environmental stresses. The proper distribution of roots within the soil under various conditions such as salinity, water deficit, and nutrient deficiency greatly affects plant survival. Salinity profoundly affects the root system architecture of Arabidopsis (Arabidopsis(More)
Drought induces root death in plants; however, the nature and characteristics of root cell death and its underlying mechanisms are poorly understood. Here, we provide a systematic analysis of cell death in the primary root tips in Arabidopsis during water stress. Root tip cell death occurs when high water deficit is reached. The dying cells were first(More)
Tanshinone IIA (T2A), a derivative of phenanthrenequinone and also the major active ingredient of Danshen, has been paid extensive attention as a promising cancer therapy for its potential anti-cancer activities. In this study, the apoptosis and autophagy of human prostate cancer PC-3 cells were observed after 5 μM T2A treatment, as well as their relevance.(More)
The GOST hash function family has served as the new Russian national hash standard (GOST R 34.11-2012) since January 1, 2013, and it has two members, i.e., GOST-256 and GOST-512 which correspond to two different output lengths. Most of the previous analyses of GOST emphasize on the compression function rather than the hash function. In this paper, we focus(More)
We consider the problem of approximating an arbitrary generic surface with a given set of simple surface prim-itives. In contrast to previous approaches based on variational surface approximation, which are primarily concerned with finding an optimal partitioning of the input geometry, we propose to integrate a model selection step into the algorithm in(More)
This paper proposes explicit formulae for the addition step and doubling step in Miller's algorithm to compute Tate pairing on Ja-cobi quartic curves. We present a geometric interpretation of the group law on Jacobi quar-tic curves, which leads to formulae for Miller's algorithm. The doubling step formula is competitive with that for Weierstrass curves and(More)
This paper presents a new method for estimating normals on unorganized point clouds that preserves sharp features. It is based on a robust version of the Randomized Hough Transform (RHT). We consider the filled Hough transform accumulator as an image of the discrete probability distribution of possible normals. The normals we estimate corresponds to the(More)
It is well known that all the known black-box zero-knowledge proofs of knowledge for NP are non-constant-round. Whether there exit constant-round black-box zero-knowledge proofs of knowledge for all NP languages under certain standard assumptions is an open problem. This paper focuses on the problem and gives a positive answer by presenting two(More)