RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Security on Dynamic ID-based Authentication Schemes

        Jingxuan Zhai,Tianjie Cao,Xiuqing Chen,Shi Huang 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.1

        Dynamic ID-based authentication schemes based on password and smart card are widely used to provide two-factor authentication and user anonymity. However, these schemes have one or the other possible security weaknesses. In this paper, we analyze the schemes of Li et al. and Wang et al. published in recent years. After the analysis, we demonstrates that Li et al.’s schemes are vulnerable to off-line password guessing attack if the user’s identity is compromised, Li et al.’s scheme cannot withstand the impersonation attack and linkability attack, Wang et al.’s schemes cannot resist off-line password guessing attack if the attacker steals a smart card, Wang et al.’s schemes fail to provide forward security. Our result shows that none of the existing dynamic ID based authentication schemes can achieve all the desirable security goals.

      • An Improved User-Participating Authentication Scheme

        Huang Shi,Tianjie Cao,Gao Caiyun 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.6

        Authentication between user and server has become more and more important in the insecure network. Chen et al’s proposed a user-participating authentication scheme. The CAPTCHA techniques and visual secret sharing is used in their scheme. The scheme can complete mutual authentication and resist certain known attacks. But for password guessing attack and denial-of-service attack, it can not resist. Therefore, an improved scheme to eliminate these weaknesses is proposed in this paper.

      • KCI등재

        Genome Sequencing Highlights the Plant Cell Wall Degrading Capacity of Edible Mushroom Stropharia rugosoannulata

        Guo Mengpei,Ma Xiaolong,Zhou Yan,Bian Yinbing,Liu Gaolei,Cai Yingli,Huang Tianji,Dong Hongxia,Cai Dingjun,Wan Xueji,Wang Zhihong,Xiao Yang,Kang Heng 한국미생물학회 2023 The journal of microbiology Vol.61 No.1

        The basidiomycetous edible mushroom Stropharia rugosoannulata has excellent nutrition, medicine, bioremediation, and biocontrol properties. S. rugosoannulata has been widely and easily cultivated using agricultural by-products showing strong lignocellulose degradation capacity. However, the unavailable high-quality genome information has hindered the research on gene function and molecular breeding of S. rugosoannulata. This study provided a high-quality genome assembly and annotation from S. rugosoannulata monokaryotic strain QGU27 based on combined Illumina-Nanopore data. The genome size was about 47.97 Mb and consisted of 20 scaffolds, with an N50 of 3.73 Mb and a GC content of 47.9%. The repetitive sequences accounted for 17.41% of the genome, mostly long terminal repeats (LTRs). A total of 15,726 coding gene sequences were putatively identified with the BUSCO score of 98.7%. There are 142 genes encoding plant cell wall degrading enzymes (PCWDEs) in the genome, and 52, 39, 30, 11, 8, and 2 genes related to lignin, cellulose, hemicellulose, pectin, chitin, and cutin degradation, respectively. Comparative genomic analysis revealed that S. rugosoannulata is superior in utilizing aldehyde-containing lignins and is possible to utilize algae during the cultivation.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼