-
Article
Open AccessChaotic microlasers caused by internal mode interaction for random number generation
Chaotic semiconductor lasers have been widely investigated for generating unpredictable random numbers, especially for lasers with external optical feedback. Nevertheless, chaotic lasers under external feedbac...
-
Article
A Secure Quantum Voting Scheme Based on Orthogonal Product States
As an important topic of quantum cryptography, quantum voting has attracted more and more attention in recent years. In this paper, we propose a quantum voting scheme based on a new set of orthogonal product s...
-
Article
Open AccessExtended versus non-extended lymphadenectomy during radical cystectomy for patients with bladder cancer: a meta-analysis of the effect on long-term and short-term outcomes
Pelvic lymphadenectomy (PLND) is an integral part of curative surgery for high-risk non-muscle invasive and muscle-invasive bladder cancer. The therapeutic value of extended PLND is controversial.
-
Article
Offline Arbitrated Quantum Blind Dual-Signature Protocol with Better Performance in Resisting Existential Forgery Attack
In this paper, we present an offline arbitrated quantum blind dual-signature protocol by using four-particle entangled Greenberger-Horne-Zeilinger(GHZ) states. By using the special relationship of four-particl...
-
Article
Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons
Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of t...
-
Article
Open AccessNephrometry score-guided off-clamp laparoscopic partial nephrectomy: patient selection and short-time functional results
Laparoscopic partial nephrectomy (LPN) is not a novel but a relatively technically challenging surgical procedure. Off-clamp LPN with zero ischemia can completely eliminate ischemic reperfusion injury to the k...
-
Article
Evaluation of fine particles in surgical smoke from an urologist’s operating room by time and by distance
Electrocautery, harmonic scalpel tissue dissection and other surgical techniques can generate surgical smoke with high proportion of ‘fine particles’ (PM2.5) <2.5 μm, which is known to have adverse effects on hum...
-
Chapter and Conference Paper
Cryptanalysis and Improvement of Sood et al.’s Dynamic ID-Based Authentication Scheme
Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Recently, Sood et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails ...
-
Chapter and Conference Paper
On the Security of an Improved Password Authentication Scheme Based on ECC
The design of secure remote user authentication schemes for mobile applications is still an open and quite challenging problem, though many schemes have been published lately. Recently, Islam and Biswas pointe...
-
Chapter and Conference Paper
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing
The design of secure remote user authentication schemes for mobile devices in Cloud Computing is still an open and quite challenging problem, though many such schemes have been published lately. Recently, Chen...
-
Chapter and Conference Paper
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...
-
Chapter and Conference Paper
Breaking a Robust Remote User Authentication Scheme Using Smart Cards
Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. Recently, Yeh et al. showed that Hsiang and Shih’s password-based remote ...
-
Chapter and Conference Paper
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture
In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment has several security flaws and further proposed an improved version w...
-
Chapter and Conference Paper
A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy
Forward secrecy is one of the important properties of remote user authentication schemes to limit the effects of eventual failure of the entire system when the long-term private keys of one or more parties are...
-
Article
Involvement of microRNA-21 in mediating chemo-resistance to docetaxel in androgen-independent prostate cancer PC3 cells
To investigate whether microRNA-21 was involved in mediating the chemoresistance of prostate cancer cells to docetaxel.