26 results on '"Shiyuan Xu"'
Search Results
2. TurboFed: A Federated Learning Approach to The PHM of Distributed Wind Turbines.
3. Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.
4. An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET.
5. A blockchain-based log storage model with efficient query.
6. RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage.
7. Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage.
8. Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things.
9. SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios.
10. VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain.
11. CA-Free Real-Time Fuzzy Digital Signature Scheme.
12. LFS-AS: Lightweight Forward Secure Aggregate Signature for e-Health Scenarios.
13. ShoeMaster: A Benchmark for Sketch2Image Translation of Shoes.
14. AQ-ABS: Anti-Quantum Attribute-based Signature for EMRs Sharing with Blockchain.
15. EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET.
16. A Novel Post-Quantum Blind Signature for Log System in Blockchain.
17. A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking.
18. LPPA: A Lightweight Privacy-Preserving Authentication Scheme for the Internet of Drones.
19. Securer and Faster Privacy-Preserving Distributed Machine Learning.
20. AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios.
21. Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications.
22. Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications.
23. AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain.
24. A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios.
25. The risk scenario analysis of typhoon gale in eastern coastal area of China.
26. Vulnerability assessment of combined impacts of sea level rise and coastal flooding for China's coastal region using remote sensing and GIS.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.