240 results on '"Wang, Lianhai"'
Search Results
2. A lightweight delegated private set intersection cardinality protocol
3. A regulated anonymous cryptocurrency with batch linkability
4. A Method of Traceless File Deletion for NTFS File System
5. Efficient certificateless designated verifier proxy signature scheme using UAV network for sustainable smart city
6. A Method of Traceless File Deletion for NTFS File System
7. A reputation-based dynamic reorganization scheme for blockchain network sharding
8. Research on Task Allocation and Resource Scheduling Method in Cloud Environment
9. The Design of a Cloud Forensics Middleware System Base on Memory Analysis
10. A privacy protection scheme for telemedicine diagnosis based on double blockchain
11. The robustness of interdependent networks under the interplay between cascading failures and virus propagation
12. The robustness of multiplex networks under layer node-based attack
13. A Method for User Avatar Authenticity Based on Multi-feature Fusion
14. Incentive mechanism for cooperative authentication: An evolutionary game approach
15. PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints
16. Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE
17. Cross-Chain Asset Transaction Method Based on Ring Signature for Identity Privacy Protection
18. Felix: A Model of Detecting Off-chain Abnormal States in Decentralized Applications
19. Recognizing roles of online illegal gambling participants: An ensemble learning approach
20. The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude
21. Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data
22. Improving Security in the Internet of Vehicles: A Blockchain-Based Data Sharing Scheme.
23. A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
24. HETEROGENEOUS MULTISCALE METHOD FOR OPTIMAL CONTROL PROBLEM GOVERNED BY ELLIPTIC EQUATIONS WITH HIGHLY OSCILLATORY COEFFICIENTS
25. Research on Task Allocation and Resource Scheduling Method in Cloud Environment
26. Research on Linux Kernel Version Diversity for Precise Memory Analysis
27. The Categories of Quantum Information Hiding Protocol
28. A Sparse Grid Stochastic Collocation Upwind Finite Volume Element Method for the Constrained Optimal Control Problem Governed by Random Convection Diffusion Equations
29. Vital layer nodes of multiplex networks for immunization and attack
30. A lightweight delegated private set intersection cardinality protocol
31. Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU
32. Virtual Machine Security Monitoring Method Based on Physical Memory Analysis
33. Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics
34. A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
35. The Design of a Cloud Forensics Middleware System Base on Memory Analysis
36. Decryption and Forensic System for Encrypted iPhone Backup Files Based on Parallel Random Search
37. A Malware Detection Approach Based on Deep Learning and Memory Forensics
38. An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT
39. A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
40. Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics
41. Research of Password Recovery Method for RAR Based on Parallel Random search
42. Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data
43. Finding another yourself in multiplex networks
44. A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles
45. IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search
46. An adaptive approach for Linux memory analysis based on kernel code reconstruction
47. Cancelable Palm Print Templates Using Gabor Representations and Random Measure
48. Robust Palmprint Recognition Based on Directional Representations
49. Network Connections Information Extraction of 64-Bit Windows 7 Memory Images
50. Live Memory Acquisition through FireWire
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.