Search

Your search keyword '"Yang, Yixian"' showing total 32 results

Search Constraints

Start Over You searched for: Author "Yang, Yixian" Remove constraint Author: "Yang, Yixian" Database Supplemental Index Remove constraint Database: Supplemental Index
32 results on '"Yang, Yixian"'

Search Results

2. Controlled node dialogue in IoT networks based on nonlocal orthogonal product states

3. One-step preparation of N-doped porous carbon materials with excellent microwave absorption properties based on methylene blue saturated wood-based activated carbon

4. Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation

5. A novel lipid droplets‐targeting fluorescent probe based on dicyanisophorone and carbazole for Cu2+and its application

6. An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model

7. A secure and efficient privacy-preserving data aggregation algorithm

8. Particle swarm optimizer with two differential mutation.

9. Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks

10. Primitives towards verifiable computation: a survey

11. High Quality Data Hiding in Halftone Image Based on Block Conjugate

12. Minimum length key in MST cryptosystems

13. An overview of general theory of security

14. Robust Audio Watermarking Algorithm Based on Empirical Mode Decomposition

15. Guest editorial: Blockchain technologies and applications

16. Quantum network coding for multi-unicast problem based on 2D and 3D cluster states

17. EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing

18. Input Generation via Taintdata Identification: Finding Hidden Path in the Environment-Intensive Program

19. Compressive Sensing-Based Audio Semi-fragile Zero-Watermarking Algorithm

20. Typical universal entanglers

21. Chaotic ant swarm approach for data clustering.

22. Novel way to research nonlinear feedback shift register

23. Attribute based DRM scheme with dynamic usage control in cloud computing

24. Hierarchical identity-based broadcast encryption scheme from LWE

26. A blind quantum signature protocol using the GHZ states

27. High-efficiency quantum steganography based on the tensor product of Bell states

28. Quantum proxy signature scheme with public verifiability

29. Conjugate adjoining problem in braid groups and new design of braid-based signatures

30. Secure network coding in the presence of eavesdroppers

Catalog

Books, media, physical & digital resources