Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    An Interesting Complex: [Cd(l -trp) (d-trp)] n

    A novel coordination polymer [Cd(l-trp) (d-trp)] n (where l-trp and d-trp are l-tryptophan and d-tryptophan or (S)-2-amino-3-(3-indolyl)propionic acid and (R)-2-amino-3-(3-indol...

    Jian Wang, **ngyou Xu, Weixing Ma, Fujun Yin in Journal of Inorganic and Organometallic Po… (2009)

  2. No Access

    Chapter and Conference Paper

    On the Equivalence of Two Definitions of Visual Cryptography Scheme

    A visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. To the best of our knowledge, th...

    Teng Guo, Feng Liu, ChuanKun Wu in Information Security Practice and Experience (2012)

  3. No Access

    Chapter and Conference Paper

    Multi-pixel Encryption Visual Cryptography

    A visual cryptography scheme (VCS) is a secret sharing method, for which the secret can be decoded by human eyes without needing any cryptography knowledge nor any computation. In their pioneer work, Naor and ...

    Teng Guo, Feng Liu, ChuanKun Wu in Information Security and Cryptology (2012)

  4. No Access

    Chapter and Conference Paper

    Flexible Visual Cryptography Scheme without Distortion

    For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered ...

    Feng Liu, Teng Guo, ChuanKun Wu, Ching-Nung Yang in Digital Forensics and Watermarking (2012)

  5. Chapter and Conference Paper

    Threshold Secret Image Sharing

    A (k,n) threshold secret image sharing scheme, abbreviated as (k,n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In...

    Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang in Information and Communications Security (2013)

  6. No Access

    Chapter and Conference Paper

    Visual Cryptography for Natural Images and Visual Voting

    Visual cryptography is a type of secret sharing which encodes a secret image into several shadow images in such a way that the stacking of certain images printed on transparencies will reveal the secret. The d...

    Teng Guo, Feng Liu, ChuanKun Wu in Information Security and Cryptology (2013)

  7. No Access

    Chapter

    Flexible Visual Cryptography Scheme and Its Application

    For visual cryptography scheme (VCS), normally, the size of the recovered secret image will be expanded by m( ≥ 1) times of the original secret image. In most cases, m is not a square number, hence the recovered ...

    Feng Liu, Teng Guo, ChuanKun Wu in Transactions on Data Hiding and Multimedia… (2014)

  8. No Access

    Chapter and Conference Paper

    On \((k, n)\) Visual Cryptography Scheme with \(t\) Essential Parties

    In visual cryptography schemes (VCS), we often denote the set of all parties by \(P=\{1,2,\cdots ,n\}\) ...

    Teng Guo, Feng Liu, ChuanKun Wu, YaWei Ren, Wen Wang in Information Theoretic Security (2014)

  9. No Access

    Chapter and Conference Paper

    The Security Defect of a Multi-pixel Encoding Method

    A visual cryptography scheme (VCS) encodes a secret image into several share images, such that stacking sufficient number of shares will reveal the secret while insufficient number of shares provide no informa...

    Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou, YaWei Ren in Information Security (2015)

  10. Article

    Open Access

    Nanostructured lipid carriers for percutaneous administration of alkaloids isolated from Aconitum sinomontanum

    Lipid-based nanosystems have great potential for transdermal drug delivery. In this study, nanostructured lipid carriers (NLCs) for short-acting alkaloids lappacontine (LA) and ranaconitine (RAN) isolated from Ac...

    Teng Guo, Yongtai Zhang, Jihui Zhao, Chunyun Zhu in Journal of Nanobiotechnology (2015)

  11. No Access

    Chapter and Conference Paper

    An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion

    In traditional visual cryptography scheme (VCS), each pixel of secret image is encrypted into m( \( \geqslant 1 \) ...

    Wen Wang, Feng Liu, Weiqi Yan, Gang Shen, Teng Guo in Digital-Forensics and Watermarking (2016)

  12. No Access

    Chapter and Conference Paper

    Privacy Monitor

    This paper first proposes a design for privacy monitor that only users at the right angle viewpoint can see the screen clearly, while users at a large enough deviated angle viewpoint cannot see any useful info...

    Teng Guo, Feng Liu, Wen Wang, BingTao Yu in Digital Forensics and Watermarking (2017)

  13. No Access

    Chapter and Conference Paper

    Temporal Integration Based Visual Cryptography Scheme and Its Application

    Visual cryptography scheme (VCS) is an image secret sharing method which exploits the spatial responds characteristics of Human visual system (HVS). Applications of traditional OR and XOR based VCSs are seriou...

    Wen Wang, Feng Liu, Teng Guo, Yawei Ren in Digital Forensics and Watermarking (2017)

  14. No Access

    Chapter and Conference Paper

    Information Security Display Technology with Multi-view Effect

    Information security is arousing wide attention of the world. Apart from the traditional attack on transmission process, threats specific to display terminals should not be ignored as well. In this paper, we i...

    Wen Wang, Feng Liu, Teng Guo, Yawei Ren, Gang Shen in Digital Forensics and Watermarking (2017)

  15. No Access

    Article

    SrZn2(PO4)2–TiO2 composite microwave dielectric ceramics with wide tunability range for temperature coefficient of resonant frequency

    A phosphate based composite ceramics system, (1 − x)SrZn2(PO4)2xTiO2 (0 ≤ x ≤ 0.5), was prepared by the solid-state reaction method, and the relations between the phase composition, crystal structure and microwa...

    Teng Guo, Yu Guo, Zhenzhen Hui, **angju Ye in Journal of Materials Science: Materials in… (2017)

  16. No Access

    Article

    p-Type CuFeO2 nanoflakes prepared by sodium alginate-assisted hydrothermal method for photoelectrochemical water reduction

    p-Type delafossite CuFeO2 is a promising material for photoelectrochemical water reduction due to its significant light absorption, chemical stability, and earth abundance. Herein, the CuFeO2 nanoflakes are synth...

    Cong Xu, Tengfei Jiang, Zhonglian Wu, Wenfeng Zhou in Journal of Materials Science (2018)

  17. No Access

    Article

    Microwave dielectric properties of NaBaPO4 ceramics with fast sintering properties

    Phosphate compound with mixed cations, NaBaPO4 can be a new candidate of microwave dielectric ceramics with the basis of the systematically investigations of the ternary compound series of AMPO4 (A = Li, Na, K; M...

    Teng Guo, Zhifu Liu, Yu Guo, Zhijie Ding in Journal of Materials Science: Materials in… (2018)

  18. No Access

    Article

    Real-time monitoring and quantification of organic by-products and mechanism study of acetone decomposition in a dielectric barrier discharge reactor

    Non-thermal plasma (NTP) degradation of low-concentration acetone was investigated in a cylindrical dielectric barrier discharge reactor. The effects of oxygen content and flow rate on the removal efficiency a...

    Xueshuang Li, Teng Guo, Zhen Peng, Li Xu in Environmental Science and Pollution Resear… (2019)

  19. No Access

    Article

    Transcutol® P/Cremophor® EL/Ethyl Oleate–Formulated Microemulsion Loaded into Hyaluronic Acid–Based Hydrogel for Improved Transdermal Delivery and Biosafety of Ibuprofen

    In the present study, a novel transdermal delivery system was developed and its advantages were demonstrated. Ibuprofen is a commonly used anti-inflammatory, antipyretic, and analgesic drug; however, because o...

    Yongtai Zhang, Kai Zhang, Zhi Wang, Hongmei Hu, Qian **g, Yanyan Li in AAPS PharmSciTech (2019)

  20. No Access

    Chapter and Conference Paper

    DEFINE: Friendship Detection Based on Node Enhancement

    Network representation learning (NRL) is a matter of importance to a variety of tasks such as link prediction. Learning low-dimensional vector representations for node enhancement based on nodes attributes and...

    Hanxiao Pan, Teng Guo, Hayat Dino Bedru, Qing Qing in Databases Theory and Applications (2020)

previous disabled Page of 2