Skip to main content

and
  1. No Access

    Article

    The grapevine miR827a regulates the synthesis of stilbenes by targeting VqMYB14 and gives rise to susceptibility in plant immunity

    Grapevine (Vitis vinifera L.) is an economically important fruit crop cultivated worldwide. In China, grapevine cultivation is very extensive, and a few Vitis grapes have excellent pathogen and stress resistance,...

    Yangyang Luo, Linxia Wang, Jie Zhu, **gwen Tian in Theoretical and Applied Genetics (2024)

  2. No Access

    Chapter and Conference Paper

    An Improved Model of PBFT with Anonymity and Proxy Based on Linkable Ring Signature

    At present, PBFT has become an important consensus mechanism in the blockchain due to its high efficiency. In PBFT, a primary node must be chosen. If the primary node is attacked, PBFT needs to select a new no...

    Zhuobiao Wang, Gengran Hu, Lin You in Algorithms and Architectures for Parallel Processing (2024)

  3. No Access

    Chapter and Conference Paper

    A Multi-server Authentication Scheme Based on Fuzzy Extractor

    Biometrics have been widely used in various authentication occasions, especially in the Internet field. However, the security of biometrics has attracted a lot of attention. Once the biometric template used fo...

    Wang Cheng, Lin You, Gengran Hu in Algorithms and Architectures for Parallel Processing (2024)

  4. No Access

    Article

    MACT: A multi-channel anonymous consensus based on Tor

    As the core of blockchain technology, consensus mechanism determines the security, stability and availability of the system. Most of consensus mechanism including Po-X, X-BFT and so on mainly focuses on the de...

    **ngyu Li, Ziyu Zheng, Pengyu Cheng, ** Li, Lin You in World Wide Web (2023)

  5. No Access

    Article

    Two-factor identity authentication scheme based on blockchain and fuzzy extractor

    A new biometric identity authentication scheme is proposed based on fuzzy extractor and the advantages of blockchain with decentralization and anonymity. First of all, the fuzzy extractor for biometric informa...

    Di Bao, Lin You in Soft Computing (2023)

  6. No Access

    Article

    Investigation into the effects of leukemia inhibitory factor on the bone repair capacity of BMSCs-loaded BCP scaffolds in the mouse calvarial bone defect model

    Leukemia inhibitory factor (LIF) is known to play a major role in bone physiology. In the present study, we examined the in vitro effects of LIF on osteoblast differentiation of bone marrow stem cells (BMSCs) ...

    Youde Liang, Rui** Zhou, **n Liu in Journal of Bioenergetics and Biomembranes (2021)

  7. No Access

    Article

    A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation

    Since chaotic maps have the excellent properties of unpredictability, ergodicity and sensitivity to their parameters and initial values, they are quite suitable for generating chaotic sequences for securing co...

    Lin You, Ersong Yang, Guangyi Wang in Soft Computing (2020)

  8. No Access

    Article

    A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion

    Template security is a critical issue in biometric systems. As we know, our biometrics will not change when we reach adulthood. What will happen if our biometric template is lost or stolen? The classical fuzzy...

    Lin You, Ting Wang in Soft Computing (2019)

  9. No Access

    Chapter and Conference Paper

    A Secure Authentication Scheme Based on Chen’s Chaotic System and Finger Vein’s Auxiliary Data

    A secure authentication scheme based on Chen’s chaotic system and finger vein’s auxiliary data is proposed. In this scheme, the pixel positions of the finger vein feature template are shuffled by using Arnold ...

    Tingting Lan, Hui Wang, Lin You in Cyberspace Safety and Security (2019)

  10. No Access

    Article

    A novel location-based encryption model using fuzzy vault scheme

    The secure storage of the sensitive data in mobile devices is an urgent issue. Most of the existed encryption algorithms are location independent, which means the encrypted data can be decrypted anywhere. In t...

    Lin You, Yulei Chen, Bin Yan, Meng Zhan in Soft Computing (2018)

  11. No Access

    Chapter and Conference Paper

    A Cancelable Multi-Biometric Template Generation Algorithm Based on Bloom Filter

    For the security issue of multiple biometric templates in current multi-biometric systems, this paper proposes a cancelable multi-biometric template generation algorithm based on Bloom filter. Our algorithm us...

    Lin You, Xun Li in Algorithms and Architectures for Parallel Processing (2018)

  12. No Access

    Chapter and Conference Paper

    Secure Biometric Authentication Scheme Based on Chaotic Map

    Biometric authentication system has been widely used because of its convenience. But the development of science and technology has brought new challenges to biological information in the authentication system....

    Jiahao Liang, Lin You in Algorithms and Architectures for Parallel Processing (2018)

  13. No Access

    Article

    High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia

    Biometric identification has caused a multitude of problems in the networking environment, such as the storage of user’s biometric template and the leakage of user’s privacy, therefore, biometric encryption ha...

    Zhendong Wu, Bin Liang, Lin You, Zhihua Jian, ** Li in Soft Computing (2016)

  14. No Access

    Chapter and Conference Paper

    Face Recognition Based on Cross-Validation by Support Vector Machine

    Support vector machine (SVM) is a kind of machine learning based on statistical learning theory. It shows unique advantages in the small-sample, nonlinear, and high-dimension pattern recognition. Principal com...

    **gfang Hu, Lin You in Proceedings of the Second International Co… (2015)

  15. No Access

    Article

    Formulations of some bit switching functions in DES

    In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, expansion, and permuted choices. They are generally presented in the form of matrixes and r...

    Lin You, Yilin Yang, Wanli Wen in Wuhan University Journal of Natural Sciences (2013)

  16. Chapter and Conference Paper

    A Key Sharing Fuzzy Vault Scheme

    Based on the classical fuzzy vault and the Diffie-Hellman key exchange scheme, a key sharing fuzzy vault scheme is proposed. In this fuzzy vault scheme, the two users cooperatively build their shared fuzzy vau...

    Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang in Information and Communications Security (2012)

  17. No Access

    Article

    Two fast algorithms for computing point scalar multiplications on elliptic curves

    The key operation in Elliptic Curve Cryptosystems(ECC) is point scalar multiplication. Making use of Frobenius endomorphism, Müller and Smart proposed two efficient algorithms for point scalar multiplications ...

    Lin You, Qiaoyan Wen, Maozhi Xu in Journal of Electronics (China) (2004)

  18. No Access

    Chapter and Conference Paper

    Generalization of Elliptic Curve Digital Signature Schemes

    ECDSA can be viewed as the elliptic curve analogue of DSA. Many variants of (ElGamal) DSA and some general types were proposed in [4]. In this paper, several general types of ECDSA and some new variants of the...

    Lin You, Yi **an Yang, Chun Qi Zhang in Information and Communications Security (2001)