459 results on '"Yang, Yixian"'
Search Results
2. A Blockchain-Based IoT Data Secure Vickery Auction System
3. Controlled node dialogue in IoT networks based on nonlocal orthogonal product states
4. Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences
5. A blind watermarking scheme for TMQIR images
6. PKGS: A Privacy-Preserving Hitchhiking Task Assignment Scheme for Spatial Crowdsourcing
7. General Theory of Information Security
8. A Differential Privacy Protection Protocol Based on Location Entropy
9. VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain
10. General Theory of Information Security
11. A novel lipid droplets/lysosomes-targeting colorimetric and ratiometric fluorescent probe for Cu2+ and its application
12. The construction of sets with strong nonlocality using fewer states
13. pMATE: A Privacy-Preserving Map Retrieval Task Assignment Scheme in Spatial Crowdsourcing
14. Lightweight Voice Spoofing Detection using Improved One-Class Learning and Knowledge Distillation
15. Secure Blockchain-Enabled Internet of Vehicles Scheme with Privacy Protection
16. Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services
17. Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud
18. A Secure Energy Internet Scheme for IoV Based on Post-Quantum Blockchain
19. A novel lipid droplets‐targeting fluorescent probe based on dicyanisophorone and carbazole for Cu 2+ and its application
20. Microstructure and Magnetic Properties Dependence on the Sputtering Power and Deposition Time of TbDyFe Thin Films Integrated on Single-Crystal Diamond Substrate
21. A novel dicyanisophorone-based colorimetric and ratiometric fluorescent probe for the detection of hypochlorite in the environment and living cells
22. Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services
23. MPoR: A Modified Consensus for Blockchain-Based Internet of Vehicles
24. Secure Multi-party Comparison Protocol and Application
25. An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model
26. P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing
27. Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks
28. Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs
29. Constructing the three-qudit unextendible product bases with strong nonlocality
30. Constructions and Weight Distributions of Optimal Locally Repairable Codes
31. A Noninteractive Multireplica Provable Data Possession Scheme Based on Smart Contract
32. Hat problem: a new strategy based on quantum stabilizer codes
33. An Entropy-View Secure Multi-Party Computation Protocol Based on Semi-honest Model
34. A trusted de-swinging k-anonymity scheme for location privacy protection
35. Cyclic preparation of two-qubit state in two noisy environments
36. Effects of different test media on the test results of automobile cabin air filter
37. Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things
38. High dimensional quantum network coding based on prediction mechanism over the butterfly network
39. A Data-Driven Detection strategy of False Data in Cooperative DC Microgrids
40. Is semi‐selfish mining available without being detected?
41. A location data protection protocol based on differential privacy
42. Using information entropy to analyze secure multi-party computation protocol
43. ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra Coding
44. Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
45. A De-swinging Scheme in Location Privacy Protection via Smart Contract
46. ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things
47. How does rumor spreading affect people inside and outside an institution
48. PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs
49. PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs
50. Exchanging registered users’ submitting reviews towards trajectory privacy preservation for review services in Location-Based Social Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.