231 results on '"Sun, Da Zhi"'
Search Results
2. Alkyl Radical Initiated Cyclization/Cascade for Synthesizing Lactam‐Substituted Alkyl Sulfones
3. Fe-Catalyzed Fluorosulfonylation of Alkenes via Sulfur Dioxide Insertion: Synthesis of Lactam-Functionalized Alkyl Sulfonyl Fluorides.
4. Differences in the origin of philosophy between Chinese medicine and western medicine: Exploration of the holistic advantages of Chinese medicine
5. Microstructure and thermal stability of sintered pure tungsten processed by multiple direction compression
6. Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3
7. Effect of Turning Numbers on SiCP/Al Composites Interface Diffusion Behavior and Microstructure Properties Consolidated by High Pressure Torsion
8. On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
9. Determination of Microcystin-LR in Environmental Water by Magnetic Solid Phase Extraction-High Performance Liquid Chromatography
10. Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
11. Xiaotan Sanjie decoction normalizes tumor permissive microenvironment in gastric cancer (Review)
12. Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
13. Improvement of Lee-Kim-Yoo’s Remote User Authentication Scheme Using Smart Cards
14. Research progress in targeted therapies for gastric cancer
15. Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
16. Strategy of integrated traditional Chinese medicine and Western medicine treatment for cancer based on the concept of survival with the tumor
17. Member Tampering Attack on Burmester-Desmedt Group Key Exchange Protocol and Its Countermeasure
18. Therapeutic effect of Jinlongshe Granule (金龙蛇颗粒) on quality of life of stage IV gastric cancer patients using EORTC QLQ-C30: A double-blind placebo-controlled clinical trial
19. Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3
20. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
21. Security and Privacy Analysis of Vinoth et al.’s Authenticated Key Agreement Scheme for Industrial IoT
22. Tumor interstitial fluid and gastric cancer metastasis: An experimental study to verify the hypothesis of “tumor-phlegm microenvironment”
23. Tumor interstitial fluid and postoperative recurrence of tumors: An experimental study for verifying hypothesis of “tumor-phlegm microenvironment”
24. Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
25. Study of nitrogen doping behavior in diamond film
26. A note on Chang–Lai’s modular square algorithm based on the generalized Chinese remainder theorem
27. Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
28. Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing
29. How to compute modular exponentiation with large operators based on the right-to-left binary algorithm
30. On Multi-Scalar Multiplication Algorithms for Register-Constrained Environments
31. Xiaotan Jieyu Prescription Alleviates Breast Precancerous Lesions through PI3K/Akt Signaling Pathway
32. Stabilization Effect in BaTiO3 Single Crystal during Aging below Tc
33. Improvement of Lee-Kim-Yoo’s Remote User Authentication Scheme Using Smart Cards
34. Effect of rare earth additives on the microstructure and dielectric properties of 0.67Pb(Mg 1/3Nb 2/3)O 3–0.33PbTiO 3 ceramics
35. Weakness and improvement on Wang–Li–Tie’s user-friendly remote authentication scheme
36. Improved public key authentication scheme for non-repudiation
37. Remarks on a new key authentication scheme based on discrete logarithms
38. Comment: cryptanalysis of Lee–Hwang–Li’s key authentication scheme
39. A new design of wearable token system for mobile device security
40. An efficient modular exponentiation algorithm against simple power analysis attacks
41. Electrical properties of Pb(Mg 1/3Nb 2/3)O 3–PbTiO 3 ceramics modified with WO 3
42. An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map
43. On the Security of Symmetric Encryption Against Mass Surveillance
44. Advanced encryption standard based on key dependent S‐Box cube
45. Efficient oblivious transfer with membership verification
46. On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy
47. On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications
48. One‐round provably secure yoking‐proof for RFID applications
49. Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems
50. Pyroelectric properties of Mn-doped Aurivillius ceramics with different pseudo-perovskite layers
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.