Showing 21 - 40 results of 73 for search 'Yao’s protocol', query time: 0.07s Refine Results
  1. 21
  2. 22
  3. 23

    The Efficacy and Brain Network Mechanism of Acupuncture for Knee Osteoarthritis: A Study Protocol for Randomized Controlled Neuroimaging Trial by Sun YY, Wang ML, Zhao RH, Hao MY, Song S, Zhou Y, Zhang N

    Published 2025-01-01
    “…Yi-Yang Sun,1 Ming-Lin Wang,2 Ruo-Han Zhao,1 Ming-Yao Hao,3 Shuai Song,3 Yue Zhou,3 Na Zhang1 1Department of Acupuncture-Moxibustion and Tuina, Shandong University of Traditional Chinese Medicine, Jinan, Shandong, People’s Republic of China; 2Traditional Chinese Medicine Comprehensive Treatment Center, Shengli Oilfield Central Hospital, Jinan, Shandong, People’s Republic of China; 3External Treatment Center of Traditional Chinese Medicine, Affiliated Hospital of Shandong University of Traditional Chinese Medicine, Jinan, Shandong, People’s Republic of ChinaCorrespondence: Na Zhang, Email zhangna2008zhentui@163.comPurpose: Knee osteoarthritis (KOA) is a prevalent degenerative bone and joint disease observed in clinical practice. …”
    Get full text
    Article
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32

    Analysis and improvement of the BACnet/IP based on identity authentication by Pengshou XIE, Jiafeng ZHU, Yongping KANG, Tao FENG, Wei LI, Yuxiang RAN

    Published 2024-03-01
    “…To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the protocol and modeling it using colored Petri net theory and CPN Tools, vulnerabilities in the security of BACnet/IP were identified.An improvement scheme was proposed based on the Dolev-Yao attacker model and formal analysis method.The BACnet/IP-SA protocol utilized the device’s pseudo-identity to safeguard the actual identity information.It emploied the PUF response for authentication and verified the authenticity of the counterparty’s identity.The session key was generated through the authentication value of the multi-information set.The protocol’s security was demonstrated by combining BAN logic and non-formal methods.The experimental results indicate that the proposed scheme can effectively resist security threats from multi-class attacks and key leakage, enhancing the security of the protocol authentication while reducing computational overhead.…”
    Get full text
    Article
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40