Learn More
In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage.(More)
Pre B cell leukemia homeobox 2 (PBX2), a member of PBX family, acts as a co-factor of homeobox proteins to regulate proliferation and differentiation of tumor cells. Our recent study revealed prognostic significance of PBX2 expression in non-small cell lung carcinoma. The significance of PBX2 expression was examined in cases with gastric cancer (GC) and(More)
The secret key based security scheme is proposed for achieving secure online banking. Encryption equipments are adopted at certification servers and client terminals. A secure certification protocol is established by using secret key encryption, combined secret key and smart card techniques. The one-time secret key generated automatically according to the(More)
To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to(More)
Listeria monocytogenes exhibits symbiotic codependence with the dominant commensal bacteria, which may help it avoid being removed or inactivated by disinfectants in local environments. In this study, we investigated L. monocytogenes-positive biofilms at food production facilities, and the dominant bacterial species of the biofilms were identified to(More)
In order to achieve secure authentication, an asynchronous challenge-response authentication solution is proposed. SD key, encryption cards or encryption machine provide encryption service. Hash function, symmetric algorithm and combined secret key method are adopted while authenticating. The authentication security is guaranteed due to the properties of(More)
This paper designs and implements an accelerated authentication system for mobile platform. This system is based on CSK (combined symmetric key) algorithm and cipher chip technology. It can generate the authentication code which is one-time-one-variant for the mobile terminal and reach to the goal of accelerated authentication. Compared to the popular WPKI(More)