Learn More
—Due to the existence of security threats in the cloud, many mechanisms have been proposed to allow a user to audit data integrity with the public key of the data owner before utilizing cloud data. The correctness of choosing the right public key in previous mechanisms depends on the security of Public Key Infrastructure (PKI). Although traditional PKI has(More)
Throughput of Concurrent Multipath Transfer varies with different path selection schemes. As the number of path increases, the path selection solution space increases exponentially while receiving buffer efficiency decreases. To solve this problem, we model the throughput of Concurrent Multipath Transfer and find that it may be limited by the receiving(More)
Saxitoxin (STX) and tetrodotoxin (TTX) are frequently used to selectively block sodium channels. In this study, we provide evidence that commercial STX also inhibits L-type Ca2+ currents (I(Ca,L)) in adult mouse ventricular myocytes (VMs) and tsA-201 cells that were transiently cotransfected with three calcium channel subunits. We measured inhibition of(More)
—Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted(More)
Comparing to the client based locating, infrastructure based methods do not require install special software or hardware at client side. So it not only fits for real deployment, but also supports some specific requirement (ex target tracking). Former researchers mainly adopt k-NN method in infrastructure based locating. However, its computing complexity is(More)
The aim of this study is to determine the diagnostic accuracy of contrast-enhanced ultrasonography (CEUS) for diagnosis of small (≤2 cm in diameter) hepatocellular carcinoma (HCC) through a meta-analysis of published studies. A comprehensive literature search of PubMed, Embase, Web of Science, and China BioMedicine databases was conducted on articles(More)