Skip to main content

and
  1. Article

    Open Access

    Chaotic microlasers caused by internal mode interaction for random number generation

    Chaotic semiconductor lasers have been widely investigated for generating unpredictable random numbers, especially for lasers with external optical feedback. Nevertheless, chaotic lasers under external feedbac...

    Chun-Guang Ma, **-Long **ao, Zhi-**ong **ao, Yue-De Yang in Light: Science & Applications (2022)

  2. No Access

    Article

    A Secure Quantum Voting Scheme Based on Orthogonal Product States

    As an important topic of quantum cryptography, quantum voting has attracted more and more attention in recent years. In this paper, we propose a quantum voting scheme based on a new set of orthogonal product s...

    Gang Du, Bao-Min Zhou, Chun-Guang Ma in International Journal of Theoretical Physi… (2021)

  3. Article

    Open Access

    Extended versus non-extended lymphadenectomy during radical cystectomy for patients with bladder cancer: a meta-analysis of the effect on long-term and short-term outcomes

    Pelvic lymphadenectomy (PLND) is an integral part of curative surgery for high-risk non-muscle invasive and muscle-invasive bladder cancer. The therapeutic value of extended PLND is controversial.

    Yu-Chen Wang, Jie Wu, Bo Dai, Yi-Jun Shen in World Journal of Surgical Oncology (2019)

  4. No Access

    Article

    Offline Arbitrated Quantum Blind Dual-Signature Protocol with Better Performance in Resisting Existential Forgery Attack

    In this paper, we present an offline arbitrated quantum blind dual-signature protocol by using four-particle entangled Greenberger-Horne-Zeilinger(GHZ) states. By using the special relationship of four-particl...

    Hong-Wei Sun, Long Zhang, Hui-Juan Zuo in International Journal of Theoretical Physi… (2018)

  5. No Access

    Article

    Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons

    Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of t...

    Ke-Jia Zhang, Leong-Chuan Kwek, Chun-Guang Ma, Long Zhang in Quantum Information Processing (2018)

  6. Article

    Open Access

    Nephrometry score-guided off-clamp laparoscopic partial nephrectomy: patient selection and short-time functional results

    Laparoscopic partial nephrectomy (LPN) is not a novel but a relatively technically challenging surgical procedure. Off-clamp LPN with zero ischemia can completely eliminate ischemic reperfusion injury to the k...

    Hong-Kai Wang, **ao-Jian Qin, Chun-Guang Ma in World Journal of Surgical Oncology (2016)

  7. No Access

    Article

    Evaluation of fine particles in surgical smoke from an urologist’s operating room by time and by distance

    Electrocautery, harmonic scalpel tissue dissection and other surgical techniques can generate surgical smoke with high proportion of ‘fine particles’ (PM2.5) <2.5 μm, which is known to have adverse effects on hum...

    Hong-Kai Wang, Fei Mo, Chun-Guang Ma, Bo Dai in International Urology and Nephrology (2015)

  8. No Access

    Chapter and Conference Paper

    Cryptanalysis and Improvement of Sood et al.’s Dynamic ID-Based Authentication Scheme

    Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Recently, Sood et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails ...

    Chun-Guang Ma, Ding Wang, Qi-Ming Zhang in Distributed Computing and Internet Technology (2012)

  9. No Access

    Chapter and Conference Paper

    On the Security of an Improved Password Authentication Scheme Based on ECC

    The design of secure remote user authentication schemes for mobile applications is still an open and quite challenging problem, though many schemes have been published lately. Recently, Islam and Biswas pointe...

    Ding Wang, Chun-guang Ma, Lan Shi, Yu-heng Wang in Information Computing and Applications (2012)

  10. No Access

    Chapter and Conference Paper

    Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing

    The design of secure remote user authentication schemes for mobile devices in Cloud Computing is still an open and quite challenging problem, though many such schemes have been published lately. Recently, Chen...

    Ding Wang, Ying Mei, Chun-guang Ma, Zhen-shan Cui in Web Information Systems and Mining (2012)

  11. Chapter and Conference Paper

    Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

    In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...

    Ding Wang, Chun-guang Ma, Peng Wu in Data and Applications Security and Privacy XXVI (2012)

  12. Chapter and Conference Paper

    Breaking a Robust Remote User Authentication Scheme Using Smart Cards

    Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. Recently, Yeh et al. showed that Hsiang and Shih’s password-based remote ...

    Ding Wang, Chun-guang Ma, Sen-dong Zhao, Chang-li Zhou in Network and Parallel Computing (2012)

  13. No Access

    Chapter and Conference Paper

    Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture

    In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment has several security flaws and further proposed an improved version w...

    Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui in Network and System Security (2012)

  14. No Access

    Chapter and Conference Paper

    A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy

    Forward secrecy is one of the important properties of remote user authentication schemes to limit the effects of eventual failure of the entire system when the long-term private keys of one or more parties are...

    Chun-Guang Ma, Ding Wang, ** Zhao, Yu-Heng Wang in Web Technologies and Applications (2012)

  15. Article

    Involvement of microRNA-21 in mediating chemo-resistance to docetaxel in androgen-independent prostate cancer PC3 cells

    To investigate whether microRNA-21 was involved in mediating the chemoresistance of prostate cancer cells to docetaxel.

    Guo-hai Shi, Ding-wei Ye, Xu-dong Yao, Shi-ling Zhang, Bo Dai in Acta Pharmacologica Sinica (2010)