![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessDown-regulation of Toll-like receptor 4 gene expression by short interfering RNA attenuates bone cancer pain in a rat model
This study demonstrates a critical role in CNS innate immunity of the microglial Toll-like receptor 4 (TLR4) in the induction and maintenance of behavioral hypersensitivity in a rat model of bone cancer pain w...
-
Article
Synthesis, characterization and properties of LiFePO4/C cathode material
Lithium iron phosphate coated with carbon (LiFePO4/C) was synthesized by improved solid-state reaction using comparatively lower temperature and fewer sintering time. The carbon came from citric acid, which acted...
-
Article
Wavelet-based denoising attack on image watermarking
In this paper, we propose wavelet-based denoising attack methods on image watermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain or discrete wavelet transform (DWT) domain. ...
-
Article
Building intrusion tolerant software system
In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting...
-
Article
Atomic electronic contract protocol based on convertible signature
A new class of atomicity, namely contract atomicity is presented. A new technical strategy based on convertible signature and two-phase commitment is proposed for implementing atomicity of electronic contract ...
-
Article
Threshold decryption scheme with multiple policies
Based on the difficulty in computing discrete logarithm and square root on some special conditions, we propose a basic threshold secret sharing scheme for multiple secrets with multiple policies, which allows ...
-
Article
Masquerade detection using support vector machine
A new method using support vector data description (SVDD) to distinguish legitimate users from masqueraders based on UNIX user command sequences is proposed. Sliding windows are used to get low detection delay...
-
Article
Analysis and application for integrity model on trusted platform
To build a trusted platform based on Trusted Computing Platform Alliance (TCPA)'s recommendation, we analyze the integrity mechanism for such a PC platform in this paper. By combinning access control model wit...
-
Article
Threshold signature scheme based on discrete logarithm and quadratic residue
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shami...
-
Article
An improved non-repudiation protocol and its security analysis
This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic....
-
Article
Quick trickle permutation based on quick trickle characteristic sequence
The concept of quick trickle characteristic sequence is presented, the properties and count of quick trickle characteristic sequence are researched, the map** relationship between quick trickle characteristi...
-
Article
Research and implementation of unsupervised clustering-based intrusion detection
An unsupervised clustering-based intrusion detection algorithm is discussed in this paper. The basic idea of the algorithm is to produce the cluster by comparing the distances of unlabeled training data sets. ...
-
Article
Construction of network fault simulation platform and event samples acquisition techniques for event correlation
Event correlation is one key technique in network fault management. For the event sample acquisition problem in event correlation, a novel approach is proposed to collect the samples by constructing network si...