RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

        ( Yanrong Lu ),( Lixiang Li ),( Haipeng Peng ),( Yixian Yang ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.3

        With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari`s scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.

      • KCI등재

        High SMAS face lift: clinical experience

        Zhijun Wang,Xiaoyan Ma,Lixiang Yang,Yan Wang,Lili Chen,Hang Lv 대한미용의학회 2018 대한미용의학회지 Vol.2 No.1

        Background: The ultimate goal of facelift is to lift the sagging soft tissue as much as possible, so as to restore them to the original anatomical position for facial rejuvenation. Objective: In our High-SMAS facelift, the SMAS-platysma flap were tighten strongly, so as to obtain full and youthful facial morphologic characteristics. In addition, the effectiveness of high-SMAS was evaluated in this paper. Methods: A total of 86 cases of SMAS face lift were performed in 22 months from January 2015 to November 2016. High SMAS technique was applied in 39 cases of them. All the 39 patients were female averaged 44 (29-65) years old. Postoperative follow-up wascarried out in 18 cases for an average of 13 months (4-22 months). After the SMAS-platysma flap was dissected in the lower face and neck,the key point of operating is focus on:The middle temporal fascia and superficial temporal fascia flap was dissected carefully. Break off the ligaments medial to the zygomatic arch and on the malar process exactly, and pay attention to protect the facial nerve. So that the high-SMAS and even higher-SMAS flap can be dissected. Results: In all the 18 cases followed up, most (11/18) obtained a clear mandibular margin after operation and scored even full mark. Perfect nasolabial fold improvement was achieved in few (7/18). In terms of Ogee curve evaluation, most (15/18) made it to the level of “acceptable”, which was shared by the evaluation of lower eyelid shortening effects (13/18). Very satisfied indicators as follow: the obtuse jowl line becomes clear, midface “ogee curve” is vary from linear to curves, and the nasolabial sulcus have been improved. Conclusion: High-SMAS Facelift is one of the most effective rhytidectomy, the most prominent parts of its effect including the improvement of midface and jowl line contour. Level of Evidence: IV

      • KCI등재

        Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

        ( Dong Xie ),( Haipeng Peng ),( Lixiang Li ),( Yixian Yang ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.5

        In contrast to traditional “store-and-forward” routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.

      • KCI등재

        Study of the H2O/Al2O3 Interface and the Acting Mechanism of Water in the Working Electrolyte

        Ming Jia,Qiang Li,Lixiang Li,Liang Cao,Juan Yang,Xiang-Yang Zhou,Liang Ai 대한금속·재료학회 2018 ELECTRONIC MATERIALS LETTERS Vol.14 No.5

        Using a working electrolyte containing mixed solvents of ethylene glycol and N,N-dimethylformamide, this paper presentsa study of the reactions on the H2O/Al2O3 interface with sum frequency vibrational spectroscopy and the effects of differentwater content on the performance of the working electrolyte and an aluminum electrolytic capacitor and summarizes the rulesof the variations in the performance parameters of the working electrolyte and aluminum electrolytic capacitor with respect tothe water content. The results demonstrate that, when the water content is increased from 2.5 to 15%, the conductivity of theworking electrolyte increased by 930 μS/cm, and the sparking voltage decreased by 27 V. Also, the increased water contentcauses lower oxidation efficiency and lower thermal stability. The leakage current of the aluminum electrolytic capacitorafter high-temperature storage increases with an increase in the water content, and the attenuation rate of capacitor’s thelow-temperature capacitance decreases with an increase in the water content.

      • SCOPUSKCI등재

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼