145 results on '"Su, Shenghui"'
Search Results
2. Pathogen detection in suspected spinal infection: metagenomic next-generation sequencing versus culture
3. A New Rational Approach to the Square Root of 5
4. A New Lever Function with Adequate Indeterminacy
5. Exosomes-loaded electroconductive nerve dressing for nerve regeneration and pain relief against diabetic peripheral nerve injury
6. A New Fast Computation of a Permanent
7. Triple-functional bone adhesive with enhanced internal fixation, bacteriostasis and osteoinductive properties for open fracture repair
8. The Multiphoton Boson Sampling Machine Doesn't Beat Early Classical Computers for Five-boson Sampling
9. Single-cell profiling of healthy human kidney reveals features of sex-based transcriptional programs and tissue-specific immunity
10. A Fast Quantum-safe Asymmetric Cryptosystem Using Extra Superincreasing Sequences
11. Genome-wide identification and expression analysis of protein arginine methyltransferase and JmjC domain-containing family in apple
12. Idology and Its Applications in Public Security and Network Security
13. Enhanced repair of osteoporotic bone defects through gelatin methylacryloyl loaded with exosomes.
14. A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes
15. A New Non-MDS Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
16. Asymptotic Granularity Reduction and Its Application
17. REESSE1+ . Reward . Proof by Experiment . A New Approach to Proof of P != NP
18. The REESSE2+ Public-key Encryption Scheme
19. Refuting the Pseudo Attack on the REESSE1+ Cryptosystem
20. Design and Analysis of the REESSE1+ Public Key Cryptosystem v2.21
21. Idology and Its Applications in Public Security and Network Security
22. A New Non-Merkle-Damgård Structural Hash Function with Provable Security
23. A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security
24. Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities
25. DNA methylation variation is crucial to restore adventitious rooting ability during in vitro shoot culture induced rejuvenation in apple rootstock
26. Engineered electrospun poly(lactic-co-glycolic acid)/Si3N4 nanofiber scaffold promotes osteogenesis of mesenchymal stem cell
27. Design of a Passport Anti-forgery System Based on Digital Signature Schemes
28. The Banknote Anti-forgery System Based on Digital Signature Algorithms
29. Idology and Its Applications in Public Security and Network Security
30. In Vitro Study of Degradation and Cytocompatibility of Ceramics/PLA Composite Coating on Pure Zinc for Orthopedic Application
31. A public key cryptosystem based on three new provable problems
32. Facile Fabrication of 3D-Printed Porous Ti6Al4V Scaffolds with a Sr-CaP Coating for Bone Regeneration
33. Preliminary Investigation on Degradation Behavior and Cytocompatibility of Ca-P-Sr Coated Pure Zinc
34. Comprehensive Genome-Wide Identification and Transcript Profiling of GABA Pathway Gene Family in Apple (Malus domestica)
35. Single-cell profiling of healthy human kidney reveals features of sex-based transcriptional programs and tissue-specific immunity
36. Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities
37. Differential Gene Expression Profiling in HELLP Syndrome Placentas
38. REESSE unified recursive algorithm for solving three computational problems
39. Design of a Passport Anti-forgery System Based on Digital Signature Schemes
40. The Banknote Anti-forgery System Based on Digital Signature Algorithms
41. Genome-wide identification and characterization of Respiratory Burst Oxidase Homolog genes in six Rosaceae species and an analysis of their effects on adventitious rooting in apple
42. A New Fast Computation of a Permanent
43. Design of a Program Identification System for Preventing Malicious Codes
44. Secure Email Login Based on Lightweight Asymmetric Identities
45. Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping
46. Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping.
47. Secure Email Login Based on Lightweight Asymmetric Identities.
48. Quantum Algorithm for Polynomial Root Finding Problem
49. A provably secure non-iterative hash function resisting birthday attack
50. A semantically secure public key cryptoscheme using bit-pair shadows
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.