SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Xin Huang) srt2:(2010-2014)"

Sökning: WFRF:(Xin Huang) > (2010-2014)

  • Resultat 1-10 av 16
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Cai, Shengyun, et al. (författare)
  • Photo-stable substituted dihydroindolo[2,3-b]carbazole-based organic dyes : tuning the photovoltaic properties by optimizing the pi structure for panchromatic DSSCs
  • 2014
  • Ingår i: Tetrahedron. - : Elsevier BV. - 0040-4020 .- 1464-5416. ; 70:43, s. 8122-8128
  • Tidskriftsartikel (refereegranskat)abstract
    • Three dihydroindolo[2,3-b]carbazole (DDC) donor based organic dyes (DDC6-DDC8) with long conjugated systems were successfully synthesized and characterized by optical, electrochemical, computational analysis, and photovoltaic methods. It was found that the elongated pi system as well as the high molar extinction coefficients (4.2-5.3 M-1 cm(-1)) sufficiently reinforced the light harvesting ability with the IPCE response of one dye DDC8 extended to 850 nm, which resulted in large J(sc) of these dyes based devices (high as 16.41 mA cm(-2)). The attached alkyl chains suppress the dark current to some extent, resulting the DDC6 and DDC7 devices in high V-oc, while DDC8 displayed low V-oc, because BTD in DDC8 could attract the iodine ion, which could accelerate the charge recombination. Among the three dyes, DDC7 displayed the best performance with an eta value 6.53% under 4 mu m thick scattering layer (condition 1+1), which was boosted to 7.49% under 8 mu m thick scattering layer (condition 1+2). The photo-stability measurements indicated that all the three dyes are fairly photo-stable.
  •  
2.
  •  
3.
  • Huang, Xin, et al. (författare)
  • Human interactive secure key and ID exchange protocols in body sensor networks
  • 2013
  • Ingår i: IET Information Security. - 1751-8709 .- 1751-8717. ; 7:1, s. 30-38
  • Tidskriftsartikel (refereegranskat)abstract
    • A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.
  •  
4.
  • Huang, Xin, et al. (författare)
  • Human interactive secure key and ID exchange protocols in body sensor networks
  • 2013
  • Ingår i: IET Information Security. - : Institution of Engineering and Technology. - 1751-8709 .- 1751-8717. ; 7:1, s. 30-38
  • Tidskriftsartikel (refereegranskat)abstract
    • A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.
  •  
5.
  • Huang, Xin, 1982-, et al. (författare)
  • Outer System Flow Privacy Protection
  • 2010
  • Ingår i: 2010 IEEE International Systems Conference Proceedings, SysCon 2010. - : IEEE conference proceedings. - 9781424458820 ; , s. 117-120
  • Konferensbidrag (refereegranskat)abstract
    • Nowadays, social networks, information networks and technological networks have already become main media of information publication and exchange. Meanwhile, the information diffusion in these networks is well studied. However, most privacy protection technologies, e.g., access control, have not considered the influence of these networks systematically. In this paper, a concept of outer system flow privacy control is proposed. In addition, system privacy requirements are reconsidered. Furthermore, in user case, role base access control (RBAC) is analyzed and improved based on the outer system flow control
  •  
6.
  • Huang, Xin, 1982-, et al. (författare)
  • Privacy and Security Aware Home Sensor System
  • 2010
  • Ingår i: 2010 Cross-Strait Conference on Information Science and Technology, CSCIST 2010, Qinghuangdao, China, July, 2010. - : Scientific Research Publishing.
  • Konferensbidrag (refereegranskat)
  •  
7.
  • Huang, Xin, et al. (författare)
  • Privacy for mHealth Presence
  • 2010
  • Ingår i: International Journal of Next-Generation Networks. - : Academy and Industry Research Collaboration Center (AIRCC). - 0975-7252 .- 0975-7023. ; 2:4, s. 33-44
  • Tidskriftsartikel (refereegranskat)abstract
    • mHealth data provision focuses on providing health services to patients via mobile devices and presence technologies. It has great influence to the healthcare business today, especially in the developing countries. However, the mHealth presence might be sensitive; and it brings potential privacy issues. For controlling what presence information can be given to which watcher, and when in mHealth presence service, XML Configuration Access Protocol (XCAP) is introduced. Nevertheless, it is not enough if only XCAP is applied. It just controls the direct privacy leakage; indirect flow might still leak the privacy information. Thus, presence authorization policy and privacy filter, which are components of XCAP, are improved based on k-anonymity for stopping indirect privacy leakage.
  •  
8.
  • Huang, Xin, 1982-, et al. (författare)
  • Sensor Aided Authentication
  • 2010
  • Ingår i: Communications in Computer and Information Science Volume 76 CCIS, 2010. - Berlin, Heidelberg : Springer. - 3642133649 - 9783642133640 ; , s. 265-277
  • Konferensbidrag (refereegranskat)abstract
    • The sharing of sensor data globally becomes possible by the development of wireless sensor network, cloud computing, and other related technologies. These new trends can also benefit information security. In this paper, the sensor data is involved in the authentication procedure which is one main component of security systems. Sensor aided password is proposed. In addition, the architecture for sensor aided authentication corresponding to the simple authentication scenario is also designed. Sensor data aided password generation and utilization bring convenience to users without weakening the password strength.
  •  
9.
  •  
10.
  • Li, Xin, et al. (författare)
  • Research on the permeability of ink in offset paper
  • 2014
  • Ingår i: Applied Mechanics and Materials. - 1660-9336 .- 1662-7482. ; 469, s. 313-317
  • Tidskriftsartikel (refereegranskat)abstract
    • First, the study chooses ten kinds of offset paper. By using a dynamic penetration analyzer (HVL-PDA) and water as test fluid, the dynamic absorption characteristics of the ten kinds of offset paper are measured. At the same time, proofs of offset printing patterns of these ten kinds of offset paper are made by using a printability tester. Then the depths of ink penetration in ten kinds of offset paper are measured by the Three-dimensional video microscopy system and the study analyzes the effect of paper dynamic absorption property on penetration depth of ink. The results of the analyses show that the penetration depth of ink is closely related to dynamic liquid absorption, thus the permeability of ink in offset paper can be predicted from the dynamic liquid absorption of offset paper.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 16

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy