SP1 regulates BMSC osteogenic differentiation through the miR-133a-3p/MAPK3 axis
Zhong, Liying, Sun, Yehai, Wang, Cong, Liu, Runzhi, Ru, Wenjuan, Dai, Wei, Xiong, Ting, Zhong, Aimin, Li, Shundong
Published in Journal of orthopaedic surgery and research (09.07.2024)
Published in Journal of orthopaedic surgery and research (09.07.2024)
Get full text
Journal Article
MiR-3646 accelerates inflammatory response of Ang II-induced hVSMCs via CYP2J2/EETs axis in hypertension model
Liu, Runzhi, Zhong, Liying, Wang, Cong, Sun, Yehai, Ru, Wunjuan, Dai, Wei, Yang, Shengnan, Zhong, Aimin, Xie, XiuMei, Chen, XiaoBin, Li, Shundong
Published in Clinical and experimental hypertension (1993) (31.12.2023)
Published in Clinical and experimental hypertension (1993) (31.12.2023)
Get full text
Journal Article
Efficient Solutions to Two-Party and Multiparty Millionaires’ Problem
Zhang, Xiaolin, Xu, Gang, Chen, XiuBo, Li, Shundong, Liu, Xin, Zhou, Yong
Published in Security and communication networks (01.01.2017)
Published in Security and communication networks (01.01.2017)
Get full text
Journal Article
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
Gong, Linming, Wang, Mingming, Zuo, Xiangjian, Li, Shundong, Wang, Daoshun
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
Efficient Protocols for the General Millionaires' Problem
Li, Shundong, Guo, Yimin, Zhou, Sufang, Dou, Jiawei, Wang, Daoshun
Published in Chinese Journal of Electronics (01.07.2017)
Published in Chinese Journal of Electronics (01.07.2017)
Get full text
Journal Article
Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems
Yimin, Guo, Shundong, Li, Jiawei, Dou, Sufang, Zhou
Published in IET information security (01.01.2016)
Published in IET information security (01.01.2016)
Get full text
Journal Article
A distributed secret share update scheme with public verifiability for ad hoc network
Zhenhua, Chen, Shundong, Li, Qianhong, Wu, Qiong, Huang
Published in Security and communication networks (25.05.2015)
Published in Security and communication networks (25.05.2015)
Get full text
Journal Article
(2,n) secret sharing scheme for gray and color images based on Boolean operation
Dong, Lin, Wang, DaoShun, Li, ShunDong, Dai, YiQi
Published in Science China. Information sciences (01.05.2012)
Published in Science China. Information sciences (01.05.2012)
Get full text
Journal Article
Symmetric cryptographic protocols for extended millionaires’ problem
Li, ShunDong, Wang, DaoShun, Dai, YiQi
Published in Science China. Information sciences (01.06.2009)
Published in Science China. Information sciences (01.06.2009)
Get full text
Journal Article
Comparing two sets without disclosing them
Li, ShunDong, Dai, YiQi, Wang, DaoShun, Luo, Ping
Published in Science China. Information sciences (01.09.2008)
Published in Science China. Information sciences (01.09.2008)
Get full text
Journal Article