725 results on '"Zhang, Mingwu"'
Search Results
52. Predicting Epipelic Algae Transport in Open Channels: A Flume Study to Quantify Transport Capacity and Guide Flow Management
53. Study on the Suspension Mechanism and Critical Formula of the Epipelic Algae Group on the Side Wall of the Channel
54. Improvement of Attribute-Based Encryption Using Blakley Secret Sharing
55. Provably Secure Group Authentication in the Asynchronous Communication Model
56. Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace
57. A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks
58. A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
59. A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET
60. Novel generic construction of leakage-resilient PKE scheme with CCA security
61. A cloud-aided privacy-preserving multi-dimensional data comparison protocol
62. PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks
63. Spectator electron effects on the two-electron one-photon radiative transition process of double K hole state of Xe[formula omitted] ion([formula omitted])
64. Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks
65. A 128-channel picoammeter system and its application on charged particle beam current distribution measurements
66. An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
67. Development of an Early Warning System for Network Intrusion Detection Using Benford’s Law Features
68. A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying
69. An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol
70. Provably Secure Proactive Secret Sharing Without the Adjacent Assumption
71. A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting
72. Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation
73. Measurement-device-independent quantum secure multiparty summation
74. An efficient aggregation scheme resisting on malicious data mining attacks for smart grid
75. Evaluation of nucleotide MALDI-TOF-MS for the identification of Mycobacterium species
76. Associations of genetic variants within TYK2 with pulmonary tuberculosis among Chinese population
77. Verifiable Quantum Key Exchange with Authentication
78. A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities
79. Guest editorial: Special issue on frontiers in cyber security
80. Quantum private set intersection cardinality based on bloom filter
81. Secure two-party integer comparison protocol without any third party
82. Identification and characterization of nontuberculous mycobacteria isolated from suspected pulmonary tuberculosis patients in eastern china from 2009 to 2019 using an identification array system
83. Quantum Secure Multi-party Private Set Intersection Cardinality
84. Cryptanalysis and Improvement of Quantum Sealed-Bid Auction
85. Reliable Homomorphic Matrix Disguising Scheme
86. An Efficient and Provably Secure Private Polynomial Evaluation Scheme
87. Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing
88. Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems
89. Key Exposure Resistant Group Key Agreement Protocol
90. APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing
91. An Efficient and Provably Secure Identity Authentication Scheme for VANET
92. A Privacy-Preserving Data Aggregation Scheme Based on Chinese Remainder Theorem in Mobile Crowdsensing System
93. Broadcast identity authentication scheme for mobile edge computing
94. Provably Secure Group Authentication in the Asynchronous Communication Model
95. Improvement of Attribute-Based Encryption Using Blakley Secret Sharing
96. Leakage-Resilient Password-Based Authenticated Key Exchange
97. Anonymous quantum voting protocol based on Chinese remainder theorem
98. The Efficacy and Safety of Bedaquiline in the Treatment of Pulmonary Tuberculosis Patients: A Systematic Review and Meta-Analysis
99. Experimental Study of the Hydrodynamics of an Open Channel with Algae Attached to the Side Wall
100. Whole-Genome Sequencing to Predict Mycobacterium tuberculosis Drug Resistance: A Retrospective Observational Study in Eastern China
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.