Search

Your search keyword '"Xin-xin NIU"' showing total 104 results

Search Constraints

Start Over You searched for: Author "Xin-xin NIU" Remove constraint Author: "Xin-xin NIU"
104 results on '"Xin-xin NIU"'

Search Results

1. A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain

2. Moving target defense solution on network layer based on OpenFlow

3. Survey of security for Android smart terminal

4. Blind audio watermarking mechanism based on variational Bayesian learning

5. New solution scheme for the member revocation in group signature

6. Privacy-preserving digital rights management scheme in cloud computing

7. Design and implementation of a novel general format multimedia digital rights management system

8. Efficient chosen-ciphertext secure proxy re-encryption scheme

9. Provable secure mutual authentication protocol for RFID in the standard model

10. Distributed trust model based on parameter modeling

11. Smart Fuzzing method based on comparison algorithm of control flow sequences

12. Identity-based domain key distribution protocol in the E-document security management

13. Robust video watermarking algorithm for H.264/AVC based on texture feature

14. PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs

16. Searching for optimal quantum secret sharing scheme based on local distinguishability

17. Controlled Secure Direct Communication Protocol via the Three-qubit Partially Entangled Set of States

18. SMOTETomek-Based Resampling for Personality Recognition

19. Generating facial expression adversarial examples based on saliency map

21. A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain

22. Adv-Emotion: The Facial Expression Adversarial Attack

23. A method to estimate the steganographic capacity in DCT domain based on MCUU model

24. A Spatial Domain Quantum Watermarking Scheme

25. Research on watermarking payload under the condition of keeping JPEG image transparency

26. SLBRS: Network Virus Propagation Model based on Safety Entropy

27. Efficient quantum state transmission via perfect quantum network coding

28. A Privacy Measurement Framework for Multiple Online Social Networks against Social Identity Linkage

29. Rational protocol of quantum secure multi-party computation

30. EABDS: Attribute‐Based Secure Data Sharing with Efficient Revocation in Cloud Computing

31. The Quantum Steganography Protocol via Quantum Noisy Channels

32. The solvability of quantum k-pair network in a measurement-based way

33. Two Quantum Direct Communication Protocols Based on Quantum Search Algorithm

34. Attribute based DRM scheme with dynamic usage control in cloud computing

35. Encrypted data sharing with multi-owner based on digital rights management in online social networks

36. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

37. High-efficiency quantum steganography based on the tensor product of Bell states

38. A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme

39. Experimental architecture of joint remote state preparation

40. CLASSICAL COMMUNICATION COSTS IN QUANTUM INFORMATION PROCESSING

41. Research of Key Nodes of Botnet Based on P2P

43. Quantum steganography with large payload based on entanglement swapping of χ-type entangled states

45. Joint remote preparation of an arbitrary three-qubit state

46. Network traffic classification based on semi-supervised clustering

47. Secure network coding in the presence of eavesdroppers

48. Conjugate adjoining problem in braid groups and new design of braid-based signatures

49. High survival of mouse oocytes using an optimized vitrification protocol

50. C-phycocyanin protects against low fertility by inhibiting reactive oxygen species in aging mice

Catalog

Books, media, physical & digital resources