Electrochemical preparation system for unique mesoporous hemisphere gold nanoparticles using block copolymer micelles

© 2020 The Royal Society of Chemistry. Gold nanoparticles (AuNPs) are widely used in various applications, such as biological delivery, catalysis, and others. In this report, we present a novel synthetic method to prepare mesoporous hemisphere gold nanoparticles (MHAuNPs) via electrochemical reduction reaction with the aid of polymeric micelle assembly as a pore-directing agent. Disciplines Engineering | Physical Sciences and Mathematics Publication Details Lim, H., Nagaura, T., Kim, M., Kani, K., Kim, J., Bando, Y., Alshehri, S., Ahamad, T., You, J., Na, J. & Yamauchi, Y. (2020). Electrochemical preparation system for unique mesoporous hemisphere gold nanoparticles using block copolymer micelles. RSC Advances, 10 (14), 8309-8313. Authors Hyunsoo Lim, Tomota Nagaura, Minjun Kim, Kenya Kani, Jeonghun Kim, Yoshio Bando, Saad Alshehri, Tansir Ahamad, Jungmok You, Jongbeom Na, and Yusuke Yamauchi This journal article is available at Research Online: https://ro.uow.edu.au/aiimpapers/4067

[1]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[2]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[3]  Sheila Frankel,et al.  The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.

[4]  David Pointcheval,et al.  Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.

[5]  David von Oheimb The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .

[6]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[7]  K. Takeda,et al.  A Product Based Security Model for Smart Home Appliances , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[8]  Kim-Kwang Raymond Choo Key establishment : proofs and refutations , 2006 .

[9]  Elisa Bertino,et al.  An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting , 2008, IEEE Transactions on Dependable and Secure Computing.

[10]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[11]  Jongpil Jeong,et al.  Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[12]  Athina Lazakidou Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications , 2010 .

[13]  Palash Sarkar,et al.  A Simple and Generic Construction of Authenticated Encryption with Associated Data , 2010, TSEC.

[14]  Carles Gomez,et al.  Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.

[15]  Dimitrios Makrakis,et al.  Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[16]  Hyun Jung Kim,et al.  AUTHHOTP - HOTP Based Authentication Scheme over Home Network Environment , 2011, ICCSA.

[17]  Kefei Chen,et al.  An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.

[18]  Jong Hyuk Park,et al.  Robust one-time password authentication scheme using smart card for home network environment , 2011, Comput. Commun..

[19]  Sanjay Singh,et al.  Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication , 2012, 2012 International Conference on Innovations in Information Technology (IIT).

[20]  Daniel Mossé,et al.  Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes , 2012, 2012 Eighth International Conference on Intelligent Environments.

[21]  Taeshik Shon,et al.  A novel secure key paring protocol for RF4CE ubiquitous smart home systems , 2012, Personal and Ubiquitous Computing.

[22]  Cheng-Chi Lee,et al.  Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices , 2013, IET Comput. Digit. Tech..

[23]  Yue Li,et al.  Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[24]  Li Xu,et al.  Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.

[25]  Vanga Odelu,et al.  A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Freddy K. Santoso,et al.  Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).

[27]  Ashok Kumar Das,et al.  A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems , 2015, Journal of Medical Systems.

[28]  Yasir Saleem,et al.  Network Simulator NS-2 , 2015 .

[29]  David Thaler,et al.  Architectural Considerations in Smart Object Networking , 2015, RFC.

[30]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[31]  Chin-Chen Chang,et al.  A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[32]  Xiong Li,et al.  Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.

[33]  Ashok Kumar Das,et al.  A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..

[34]  Vanga Odelu,et al.  SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms , 2016, IEEE Transactions on Consumer Electronics.

[35]  Kirti Kamthe,et al.  Enhanced Three-Factor Security Protocol For Consumer USB Mass Storage Devices , 2017 .

[36]  Ashok Kumar Das,et al.  A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..

[37]  Athanasios V. Vasilakos,et al.  Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment , 2018, IEEE Transactions on Dependable and Secure Computing.

[38]  By Ciarán Morrison What is a ‘ Smart Home ’ ? , 2019 .