4.6 Article

Theoretical modeling coupled with experimental study on the preparation and characterization comparison of fluorinated copolymers: Effect of chain structure on copolymer properties

期刊

AICHE JOURNAL
卷 59, 期 8, 页码 3019-3033

出版社

WILEY-BLACKWELL
DOI: 10.1002/aic.14057

关键词

atom transfer radical polymerization; theoretical modeling coupled with experimental approachest; fluorinated copolymers; thermal property; micellization; surface property

资金

  1. National Ministry of Science and Technology of China [2012CB21500402]
  2. National Natural Science Foundation of China [21076171, 21276213]
  3. State-Key Laboratory of Chemical Engineering of Tsinghua University [SKL-ChE-10A03]

向作者/读者索取更多资源

Theoretical modeling coupled with an experimental study is presented for the preparation and characterization comparison of the amphiphilic copolymers of 2, 2, 3, 3, 4, 4, 4-heptafluorobutyl methacrylate (HFBMA) and 2-hydroxyethyl methacrylate (HEMA) to achieve a multiscale generalization of the polymeric system. A series of amphiphilic copolymers having different chain structures with HFBMA as the hydrophobic component and HEMA as the hydrophilic component was first synthesized through atom transfer radical copolymerization (ATRcoP) or model-based semibatch ATRcoP. Theoretical modeling is used to optimize the macromolecular structure and experimental approaches that are used to prepare copolymers of HFBMA and HEMA with some tailor-made polymer properties. Furthermore, a systematic comparison of major properties (i.e., thermal, micellization, and surface properties) of these fluorinated copolymers (i.e., random, block, linear gradient, and inverse linear gradient copolymers) was carried out. The results show that these fluorinated copolymers with different chain structures have dissimilar properties. The results also demonstrate that the approach of coupling theoretical modeling with an experimental study can be used to guide a multiscale generalization of the polymeric system for practical application. (c) 2013 American Institute of Chemical Engineers AIChE J, 59: 3019-3033, 2013

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices

Qingxuan Wang, Ding Wang, Chi Cheng, Debiao He

Summary: This article presents a quantum-resistant smart-card-based password authentication scheme that utilizes lattice-based key exchange and fuzzy-verifier + honeywords technique to effectively protect against quantum attacks. The scheme is proven to be secure under the random oracle model and demonstrates better computation efficiency compared to the state-of-the-art conventional 2FA schemes.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Hardware & Architecture

High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU

Xinyi Hu, Debiao He, Min Luo, Cong Peng, Qi Feng, Xinyi Huang

Summary: In this article, the identity-based signature scheme is implemented on a modern NVIDIA RTX 3060 card to address the certificate management issue in traditional public-key cryptography. The performance is improved through converting pairing computation, employing precomputation technique, and applying PTX ISA.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2023)

Article Computer Science, Theory & Methods

AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services

Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang

Summary: Edge computing is a distributed computing concept that allows edge servers to provide on-demand services to authorized consumers. However, security concerns such as unauthorized access and data manipulation have hindered the development of edge computing. This paper proposes AADEC, an anonymous and auditable distributed access control framework, to address these issues.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Electrical & Electronic

An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs

Xiaotong Zhou, Debiao He, Muhammad Khurram Khan, Wei Wu, Kim-Kwang Raymond Choo

Summary: Vehicular Ad-hoc Networks (VANETs) have potential applications in improving the efficiency and safety for intelligent transportation systems. The paper proposes an efficient blockchain-based CPPA (EBCPPA) scheme to address the limitations of existing schemes. Security and performance analyses show that EBCPPA is more efficient than other state-of-the-art solutions in terms of signing, verification, and bandwidth requirement.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles

Biwen Chen, Tao Xiang, Xiaoguo Li, Mingwu Zhang, Debiao He

Summary: Internet of Vehicles (IoV) faces security challenges such as authentication and access control due to its heterogeneity, openness, and diversity. We propose an efficient server-aided attribute-based signature scheme with collusion resistance (SAABS-CR) to address the computation overhead and collusion attacks issues in existing schemes.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Polymer Science

On the Precise Determination of Molar Mass and Dispersity in Controlled Chain-Growth Polymerization: A Distribution Function-Based Strategy

Yin-Ning Zhou, Tian-Tian Wang, Zheng-Hong Luo

Summary: Accurate determination of the molar mass of polymers is crucial for polymerization kinetic investigation and precision polymer synthesis. This study proposes a distribution function-based strategy that rectifies the deviation of conventional calibration methods, leading to more accurate results. The strategy has been successfully applied to controlled chain-growth polymerizations, resulting in higher accuracy and minimal errors in molar mass determination.

MACROMOLECULES (2023)

Article Computer Science, Information Systems

Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things

Hong Zhong, Chengdong Gu, Qingyang Zhang, Jie Cui, Chengjie Gu, Debiao He

Summary: The Industrial Internet of Things (IIoT) is crucial for intelligent manufacturing, industrial device management optimization, and productivity improvement. In cross-domain interaction scenarios, where different industries cooperate, the communication of industrial devices across domains poses security and privacy challenges. Current cross-domain authentication schemes often require a trusted third-party centralized authentication, limiting system flexibility. This paper proposes a distributed cross-domain message authentication scheme for IIoT, addressing these limitations by utilizing distributed authentication and secret sharing technology, enabling collaborative production among multiple manufacturers.

AD HOC NETWORKS (2023)

Article Computer Science, Artificial Intelligence

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks

Yulin Liu, Debiao He, Zijian Bao, Huaqun Wang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo

Summary: Vehicle-to-Grid (V2G) networks are potential solutions to energy and environmental challenges, but security is a key concern. To address the issue of private information leakage in V2G networks, we propose an efficient multilayered linkable ring signature scheme called Emularis, along with an anonymous payment scheme. Rigorous security analysis proves that Emularis ensures security and privacy requirements, while also outperforming existing schemes in terms of communication and computation costs.

IEEE TRANSACTIONS ON INTELLIGENT VEHICLES (2023)

Article Computer Science, Hardware & Architecture

Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512

Douwei Lei, Debiao He, Cong Peng, Min Luo, Zhe Liu, Xinyi Huang

Summary: With the development of quantum computing, classical cryptographic schemes are no longer secure. Ideal lattice-based cryptography is emerging as a prime candidate for post-quantum cryptographic schemes. This article presents parallel implementations of polynomial arithmetic and sampling in ideal lattice-based cryptography, using the parallelism of new 512-bit AVX512 instructions, thus significantly improving their performance.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2023)

Article Computer Science, Information Systems

EthereumX: Improving Signature Security With Randomness Preprocessing Module

Peng Jiang, Fuchun Guo, Willy Susilo, Chao Lin, Jiaxi Hu, Zhen Zhao, Liehuang Zhu, Debiao He

Summary: Ethereum leverages ECDSA for transaction validation. This work introduces EthereumX, which achieves better security without compromising the existing signature structure. Experimental results show that EthereumX performs comparably to Ethereum.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Theory & Methods

Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption

Ningbin Yang, Chunming Tang, Quan Zhou, Debiao He

Summary: Data management services provided by the public cloud can save costs for enterprises and enable data sharing. However, concerns about data security and privacy in the public cloud exist. To address these issues, we propose a secure data sharing scheme based on a dynamic consensus committee, which utilizes blockchain technology to eliminate single-key-exposure issues and enables fast keyword search without the need for pairing or dynamic user management.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs

Jing Zhang, Shuangshuang Su, Hong Zhong, Jie Cui, Debiao He

Summary: This study proposes an identity-based broadcast proxy re-encryption scheme to achieve flexible and efficient data sharing in vehicular ad hoc networks. The data sender generates a fixed ciphertext that can be obtained by newly added vehicles through authorized vehicles. Data receivers can decrypt ciphertext directly without knowing the identities of other receivers, and the decryption overhead is constant. In addition, the scheme achieves complete anonymous data sharing to protect vehicle privacy.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT

Tian Li, Huaqun Wang, Debiao He, Jia Yu

Summary: This paper proposes a designated-verifier aggregate signature scheme (DVAS) based on permissioned blockchain to achieve sensitive data privacy. In this scheme, the aggregator can sanitize the sensitive data according to the contract, and convert the original signature of the sensitive data into a valid signature. The security attributes of DVAS include conditional anonymity, unforgeability, immutability and protecting data privacy. The formal security proof, performance evaluation and experiments indicate that DVAS is secure, effective and practical for Industrial Internet of Things.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Artificial Intelligence

Multi-Party Privacy-Preserving Faster R-CNN Framework for Object Detection

Ruonan Wang, Min Luo, Qi Feng, Cong Peng, Debiao He

Summary: In this study, we propose a multi-party privacy-preserving Faster R-CNN framework named SPFR, which achieves high-precision division, exponentiation, and logarithm calculation through blinding and oblivious transfer protocols. We design a series of privacy-preserving protocols that satisfy secure computational requirements and demonstrate their efficiency in Faster R-CNN through experiments.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2023)

Article Computer Science, Hardware & Architecture

EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs

Chao Lin, Xinyi Huang, Debiao He

Summary: In this article, a blockchain-based conditional privacy-preserving authentication (BCPPA) protocol is proposed to balance anonymity, traceability, and key/certificate management in VANETs. The proposed protocol, named EBCPA, is more efficient and can meet the high mobility, low latency, and real-time requirements of VANETs. Implementation and comparison results show that EBCPA can reduce the time cost of traceability by at least 48.95% and verification by at least 42.21%.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

暂无数据