Search

Your search keyword '"Dai, Yiqi"' showing total 141 results

Search Constraints

Start Over You searched for: Author "Dai, Yiqi" Remove constraint Author: "Dai, Yiqi"
141 results on '"Dai, Yiqi"'

Search Results

1. A Broadband Algorithm for Adiabatic Mode Evolution and its Application on Polarization Splitter-Rotator on LNOI Platform

3. Origin of magnetic particles in speleothems: A review

4. Determinants of Creativity in Migrant versus Urban Children: A Case Study in China.

6. On the Analysis and Generalization of Extended Visual Cryptography Schemes

10. New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA

11. Cryptanalysis of General Lu-Lee Type Systems

12. A Soft Real-Time Web News Classification System with Double Control Loops

13. Using Trust for Restricted Delegation in Grid Environments

14. Skyeye: An Instruction Simulator with Energy Awareness

15. Apply Feedback Control Theory to Design Soft Real-Time Search Engine System

35. Secure multiparty computation of solid geometric problems and their applications

36. Symmetric cryptographic solution to Yao’s millionaires’ problem and an evaluation of secure multiparty computations

37. A text categorization system with soft real-time guarantee

38. Secure multi-party computation solution to Yao's millionaires' problem based on set-inclusion

39. Addition sequence method of scalar multiplication of elliptic curve over OEF

40. Generalized group signature scheme

41. Network Survivability Analysis Based on Stochastic Game Model

42. Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making

43. National Critical Infrastructure Modeling and Analysis Based on Complex System Theory

44. A software vulnerability analysis environment based on virtualization technology

45. Towards a Unified Framework for Network Survivability Measurement

46. An Enterprise Computing System Based on Software-Enrollment Strategy

47. An efficient control flow security analysis approach for binary executables

48. Symmetric Encryption Solutions to Millionaire's Problem and Its Extension

49. Semi-fragile watermarking for image content authentication

50. A new micro-payment protocol based on P2P networks

Catalog

Books, media, physical & digital resources