1,077 results on '"Yang, Yixian"'
Search Results
102. Minimum length key in MST cryptosystems
103. Minimal logarithmic signatures for one type of classical groups
104. An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
105. Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay
106. A Digital Watermarking Method Based on Particle Swarm Optimization and Contourlet Transform
107. A Random Indexing Approach for Web User Clustering and Web Prefetching
108. Research on Secure Multi-party Computational Geometry
109. MPoR: A Modified Consensus for Blockchain-Based Internet of Vehicles
110. Synchronization control of memristor-based recurrent neural networks with perturbations
111. Asymptotic stability of cellular neural networks with multiple proportional delays
112. ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG
113. Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation
114. A Special Proxy Signature Scheme with Multi-warrant
115. An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme
116. Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle
117. Chaos–order transition in foraging behavior of ants
118. A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus
119. Using Three Layer Neural Network to Compute Multi-valued Functions
120. Transitive Signatures from Braid Groups
121. On development of security monitoring system via wireless sensing network
122. A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm
123. Finite-time stability and synchronization for memristor-based fractional-order Cohen-Grossberg neural network
124. Quantum network coding for multi-unicast problem based on 2D and 3D cluster states
125. A secure and efficient mutual authentication scheme for session initiation protocol
126. Anti-synchronization of coupled memristive neutral-type neural networks with mixed time-varying delays via randomly occurring control
127. Finite-time synchronization of complex dynamical networks with multi-links via intermittent controls
128. Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations
129. Impulsive control for synchronization and parameters identification of uncertain multi-links complex network
130. Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays
131. An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model
132. P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing
133. Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks
134. Constructing the three-qudit unextendible product bases with strong nonlocality
135. Constructions and Weight Distributions of Optimal Locally Repairable Codes
136. Effect of spatial distribution on the synchronization in rings of coupled oscillators
137. Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional Fourier domain
138. Minimal logarithmic signatures for the unitary group U n ( q )
139. Novel color image encryption algorithm based on the reality preserving fractional Mellin transform
140. Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps
141. Anti-synchronization for stochastic memristor-based neural networks with non-modeled dynamics via adaptive control approach
142. Stochastic synchronization of complex networks via a novel adaptive composite nonlinear feedback controller
143. An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem
144. Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay
145. Mean square modified function projective synchronization of uncertain complex network with multi-links and stochastic perturbations
146. Chaotic ant swarm approach for data clustering
147. A secret sharing scheme with a short share realizing the [formula omitted] threshold and the adversary structure
148. Optimum design of fractional order PIλDμ controller for AVR system using chaotic ant swarm
149. Public key distribution scheme for delay tolerant networks based on two-channel cryptography
150. Multiple-File Remote Data Checking for cloud storage
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.