Time filter

Source Type

Shanghai, China

Ma H.,Jilin University | Yao L.,Jilin University | Li P.,Jilin University | Ablikim O.,Jilin University | And 2 more authors.
Chemistry - A European Journal

A novel electro-active compound, TCAC, is synthesized and its electrochemical polymerized film is used to detect 2,4,6-trinitrotoluene (TNT) and 2,4-dinitrotoluene (DNT) explosives through a fluorometric/electrochemical dual-channel sensor with high sensitivity and selectivity. In particular, the electrochemical sensor for the analysis of TNT had an enhanced sensitivity of 0.5μM. The detection limit of the sensor was calculated to be 15nM. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim. Source

Huang D.,A+ Network | Huang D.,3rd Research Institute | Hao Y.,Jiangsu Zhuhui Law Office | Xi X.,Administrative Center for Chinas Agenda 21
Proceedings of the 2012 International Conference on Industrial Control and Electronics Engineering, ICICEE 2012

Current cloud computing services lack comprehensive management and legal constraints, which lead cause a series of development issues including information security. This paper analyzes eight (potential/possible) security risks of typical cloud computing services, proposing risk control strategies and legal regulation proposals for safety supervision. © 2012 IEEE. Source

Zou X.,3rd Research Institute | Chen B.,3rd Research Institute | Chen B.,Tongji University | Jin B.,3rd Research Institute
Proceedings 2011 International Conference on Transportation, Mechanical, and Electrical Engineering, TMEE 2011

With the cyber society booming rapidly, cyber trusted service and privacy protection have been more and more focused on. The paper presents a new method for user identity attribute service in cyberspace, and the method based on the service model of multilevel cyber identity management provides user identity attribute service for cyber applications, and implements the descriptive mechanism of multilevel privacy protection policy, which permits users, identity service provider, and identity service relying party to prescribe attribute privacy protection policy, attribute disclosure policy and attribute request policy individually. As a result, security of web applications along with user privacy is protected by providing fine-grained access control with user identity attribute and strong authentication services. © 2011 IEEE. Source

Huang J.,A+ Network | Huang J.,3rd Research Institute | Ni L.,A+ Network | Ni L.,3rd Research Institute
Proceedings of 2013 3rd International Conference on Computer Science and Network Technology, ICCSNT 2013

Because of the openness and anonymity of the Internet, there are inevitably many security risks on the Internet. The security core of WEB services is identity authentication and data security. Traditional WEB services are built on IPSec and SSL, which could not fully meet the security needs of WEB services. This paper firstly introduces the relevant circumstances of eID, and then proposes a security mechanism of WEB services, which is based on eID. Through the use of eID authentication technology as well as data encryption and decryption technology, this security mechanism achieved real-name authentication of the user's identity and security handling of data transmission, which guarantees the security of WEB services, effectively making up the security deficiencies of traditional WEB services. © 2013 IEEE. Source

Jin B.,A+ Network | Jin B.,3rd Research Institute | Huang D.,A+ Network | Huang D.,3rd Research Institute | And 2 more authors.
Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010

This paper combines the request of electronic data authentication practice and laboratory management Based on analysis of the status of domestic and international standardization of electronic data authentication, proposed the overall framework and its components of standard system of electronic data authentication, and analyzes the key technology problem of standards developed. © 2010 IEEE. Source

Discover hidden collaborations