Search

Your search keyword '"Xiangxue Li"' showing total 62 results

Search Constraints

Start Over You searched for: Author "Xiangxue Li" Remove constraint Author: "Xiangxue Li" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
62 results on '"Xiangxue Li"'

Search Results

1. Development of oxidative stress- and ferroptosis-related prognostic signature in gastric cancer and identification of CDH19 as a novel biomarker

2. How to Consider Human Footprints to Assess Human Disturbance: Evidence from Urban Agglomeration in the Yellow River Basin

3. HIGD1B, as a novel prognostic biomarker, is involved in regulating the tumor microenvironment and immune cell infiltration; its overexpression leads to poor prognosis in gastric cancer patients

4. Development and verification of a manganese metabolism- and immune-related genes signature for prediction of prognosis and immune landscape in gastric cancer

5. Mechanism of smart city policy on the carbon emissions of construction enterprises in the Yangtze River Economic Belt: a perspective of the PESTEL model and the pollution halo hypothesis

6. How does the Belt and Road policy affect the level of green development? A quasi-natural experimental study considering the CO2 emission intensity of construction enterprises

7. The association between oral and gut microbiota in male patients with alcohol dependence

8. Diurnal changes of the oral microbiome in patients with alcohol dependence

9. Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model

10. Quantum-Resistant Lightweight Authentication and Key Agreement Protocol for Fog-Based Microgrids

11. Oncolytic Viro-Immunotherapy: An Emerging Option in the Treatment of Gliomas

12. Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform

13. Static Bearing Capacity Investigation of a Novel Prefabricated Light-Steel Beam–Column Connection

14. (Semi-)Automatically Parsing Private Protocols for In-Vehicle ECU Communications

15. Anonymity for Bitcoin From Secure Escrow Address

16. Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through Lightweight Machine Learning

17. An Efficient Distributed Forensic System Based on Hadoop:Principle and Method

19. Quantum-Resistant Lightweight Authentication and Key Agreement Protocol for Fog-Based Microgrids

20. Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model

22. Oncolytic Viro-Immunotherapy: An Emerging Option in the Treatment of Gliomas

23. Maf1 ameliorates cardiac hypertrophy by inhibiting RNA polymerase III through ERK1/2

25. Constructing Odd‐Variable Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity and High Nonlinearity

26. Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform

27. Connected Vehicles' Security from the Perspective of the In-Vehicle Network

28. Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens

29. 1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity

30. Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing

31. New application of partitioning methodology: identity-based dual receiver encryption

32. Building a new secure variant of Rainbow signature scheme

33. Signcryption KEM/tag-KEM, revisited

34. Pseudorandom generators from regular one-way functions: New constructions with improved parameters

35. Notes on a group-oriented setting’s multisigncryption scheme with threshold designcryption

36. Optimal assignment schemes for general access structures based on linear programming

37. Balanced2p-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree

38. Robust password changing and DoS resilience for human-centric password authentication

39. Identity-Based Key-Insulated Signcryption

40. Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model

41. Cryptanalysis of a certificateless signcryption scheme in the standard model

42. Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards

43. Democratic group signatures with collective traceability

44. Simulatability and security of certificateless threshold signatures

45. Analysis on the sequence of the whole genome of an isolated enterovirus 71 strain

46. Pitfalls in identity based encryption using an elliptic curve combined public key

47. The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions

48. CLKS: Certificateless Keyword Search on Encrypted Data

49. Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters

50. Linkable Ring Signatures from Linear Feedback Shift Register

Catalog

Books, media, physical & digital resources