![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
The grapevine miR827a regulates the synthesis of stilbenes by targeting VqMYB14 and gives rise to susceptibility in plant immunity
Grapevine (Vitis vinifera L.) is an economically important fruit crop cultivated worldwide. In China, grapevine cultivation is very extensive, and a few Vitis grapes have excellent pathogen and stress resistance,...
-
Chapter and Conference Paper
An Improved Model of PBFT with Anonymity and Proxy Based on Linkable Ring Signature
At present, PBFT has become an important consensus mechanism in the blockchain due to its high efficiency. In PBFT, a primary node must be chosen. If the primary node is attacked, PBFT needs to select a new no...
-
Chapter and Conference Paper
A Multi-server Authentication Scheme Based on Fuzzy Extractor
Biometrics have been widely used in various authentication occasions, especially in the Internet field. However, the security of biometrics has attracted a lot of attention. Once the biometric template used fo...
-
Article
MACT: A multi-channel anonymous consensus based on Tor
As the core of blockchain technology, consensus mechanism determines the security, stability and availability of the system. Most of consensus mechanism including Po-X, X-BFT and so on mainly focuses on the de...
-
Article
Two-factor identity authentication scheme based on blockchain and fuzzy extractor
A new biometric identity authentication scheme is proposed based on fuzzy extractor and the advantages of blockchain with decentralization and anonymity. First of all, the fuzzy extractor for biometric informa...
-
Article
Investigation into the effects of leukemia inhibitory factor on the bone repair capacity of BMSCs-loaded BCP scaffolds in the mouse calvarial bone defect model
Leukemia inhibitory factor (LIF) is known to play a major role in bone physiology. In the present study, we examined the in vitro effects of LIF on osteoblast differentiation of bone marrow stem cells (BMSCs) ...
-
Article
A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation
Since chaotic maps have the excellent properties of unpredictability, ergodicity and sensitivity to their parameters and initial values, they are quite suitable for generating chaotic sequences for securing co...
-
Article
A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion
Template security is a critical issue in biometric systems. As we know, our biometrics will not change when we reach adulthood. What will happen if our biometric template is lost or stolen? The classical fuzzy...
-
Chapter and Conference Paper
A Secure Authentication Scheme Based on Chen’s Chaotic System and Finger Vein’s Auxiliary Data
A secure authentication scheme based on Chen’s chaotic system and finger vein’s auxiliary data is proposed. In this scheme, the pixel positions of the finger vein feature template are shuffled by using Arnold ...
-
Article
A novel location-based encryption model using fuzzy vault scheme
The secure storage of the sensitive data in mobile devices is an urgent issue. Most of the existed encryption algorithms are location independent, which means the encrypted data can be decrypted anywhere. In t...
-
Chapter and Conference Paper
A Cancelable Multi-Biometric Template Generation Algorithm Based on Bloom Filter
For the security issue of multiple biometric templates in current multi-biometric systems, this paper proposes a cancelable multi-biometric template generation algorithm based on Bloom filter. Our algorithm us...
-
Chapter and Conference Paper
Secure Biometric Authentication Scheme Based on Chaotic Map
Biometric authentication system has been widely used because of its convenience. But the development of science and technology has brought new challenges to biological information in the authentication system....
-
Article
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia
Biometric identification has caused a multitude of problems in the networking environment, such as the storage of user’s biometric template and the leakage of user’s privacy, therefore, biometric encryption ha...
-
Chapter and Conference Paper
Face Recognition Based on Cross-Validation by Support Vector Machine
Support vector machine (SVM) is a kind of machine learning based on statistical learning theory. It shows unique advantages in the small-sample, nonlinear, and high-dimension pattern recognition. Principal com...
-
Article
Formulations of some bit switching functions in DES
In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, expansion, and permuted choices. They are generally presented in the form of matrixes and r...
-
Chapter and Conference Paper
A Key Sharing Fuzzy Vault Scheme
Based on the classical fuzzy vault and the Diffie-Hellman key exchange scheme, a key sharing fuzzy vault scheme is proposed. In this fuzzy vault scheme, the two users cooperatively build their shared fuzzy vau...
-
Article
Two fast algorithms for computing point scalar multiplications on elliptic curves
The key operation in Elliptic Curve Cryptosystems(ECC) is point scalar multiplication. Making use of Frobenius endomorphism, Müller and Smart proposed two efficient algorithms for point scalar multiplications ...
-
Chapter and Conference Paper
Generalization of Elliptic Curve Digital Signature Schemes
ECDSA can be viewed as the elliptic curve analogue of DSA. Many variants of (ElGamal) DSA and some general types were proposed in [4]. In this paper, several general types of ECDSA and some new variants of the...