Skip to main content

and
  1. Article

    Open Access

    Down-regulation of Toll-like receptor 4 gene expression by short interfering RNA attenuates bone cancer pain in a rat model

    This study demonstrates a critical role in CNS innate immunity of the microglial Toll-like receptor 4 (TLR4) in the induction and maintenance of behavioral hypersensitivity in a rat model of bone cancer pain w...

    Liu Si Lan, Yang Jian **, Wang Li Na, Jiang Miao, Qiu Qiao Cheng in Molecular Pain (2010)

  2. No Access

    Article

    Synthesis, characterization and properties of LiFePO4/C cathode material

    Lithium iron phosphate coated with carbon (LiFePO4/C) was synthesized by improved solid-state reaction using comparatively lower temperature and fewer sintering time. The carbon came from citric acid, which acted...

    Zhou **n-wen, Zhan Dan, Wang Li-na in Wuhan University Journal of Natural Scienc… (2005)

  3. No Access

    Article

    Wavelet-based denoising attack on image watermarking

    In this paper, we propose wavelet-based denoising attack methods on image watermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain or discrete wavelet transform (DWT) domain. ...

    Xuan Jian-hui, Wang Li-na, Zhang Huan-guo in Wuhan University Journal of Natural Sciences (2005)

  4. No Access

    Article

    Building intrusion tolerant software system

    In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting...

    Peng Wen-ling, Wang Li-na, Zhang Huan-guo in Wuhan University Journal of Natural Scienc… (2005)

  5. No Access

    Article

    Atomic electronic contract protocol based on convertible signature

    A new class of atomicity, namely contract atomicity is presented. A new technical strategy based on convertible signature and two-phase commitment is proposed for implementing atomicity of electronic contract ...

    Liu Yi-chun, Wang Li-na, Zhang Huan-guo in Wuhan University Journal of Natural Sciences (2005)

  6. No Access

    Article

    Threshold decryption scheme with multiple policies

    Based on the difficulty in computing discrete logarithm and square root on some special conditions, we propose a basic threshold secret sharing scheme for multiple secrets with multiple policies, which allows ...

    Fei Ru-chun, Wang Li-na in Wuhan University Journal of Natural Sciences (2005)

  7. No Access

    Article

    Masquerade detection using support vector machine

    A new method using support vector data description (SVDD) to distinguish legitimate users from masqueraders based on UNIX user command sequences is proposed. Sliding windows are used to get low detection delay...

    Yang Min, Wang Li-na, Zhang Huan-guo in Wuhan University Journal of Natural Scienc… (2005)

  8. No Access

    Article

    Analysis and application for integrity model on trusted platform

    To build a trusted platform based on Trusted Computing Platform Alliance (TCPA)'s recommendation, we analyze the integrity mechanism for such a PC platform in this paper. By combinning access control model wit...

    Tu Guo-qing, Zhang Huan-guo, Wang Li-na in Wuhan University Journal of Natural Scienc… (2005)

  9. No Access

    Article

    Threshold signature scheme based on discrete logarithm and quadratic residue

    Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shami...

    Fei Ru-chun, Wang Li-na in Wuhan University Journal of Natural Sciences (2004)

  10. No Access

    Article

    An improved non-repudiation protocol and its security analysis

    This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic....

    Li Li, Zhang Huan-guo, Wang Li-na in Wuhan University Journal of Natural Sciences (2004)

  11. No Access

    Article

    Quick trickle permutation based on quick trickle characteristic sequence

    The concept of quick trickle characteristic sequence is presented, the properties and count of quick trickle characteristic sequence are researched, the map** relationship between quick trickle characteristi...

    Wang Li-na, Fei Ru-chun, Liu Zhu in Wuhan University Journal of Natural Sciences (2003)

  12. No Access

    Article

    Research and implementation of unsupervised clustering-based intrusion detection

    An unsupervised clustering-based intrusion detection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. ...

    Luo Min, Zhang Huan-guo, Wang Li-na in Wuhan University Journal of Natural Sciences (2003)

  13. No Access

    Article

    Construction of network fault simulation platform and event samples acquisition techniques for event correlation

    Event correlation is one key technique in network fault management. For the event sample acquisition problem in event correlation, a novel approach is proposed to collect the samples by constructing network si...

    Su Yu-bei, Wang Zhi, Cao Yang, Huang Tian-xi in Wuhan University Journal of Natural Scienc… (2001)