725 results on '"Zhang, Mingwu"'
Search Results
2. Controlled Multi-client Functional Encryption for Flexible Access Control
3. A Secure Incentive Mechanism in Blockchain-Based Mobile Crowdsensing
4. OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT
5. Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network
6. Identity-Based Key Verifiable Inner Product Functional Encryption Scheme
7. An Inner Product Function Encryption Scheme for Secure Distance Calculation
8. Efficient Non-interactive Zero-Knowledge Proof for Graph 3-Coloring Problem
9. Efficient and Secure Count Queries on Encrypted Genomic Data
10. Leakage-resilient identity-based cryptography from minimal assumptions
11. Homomorphic Witness Encryption from Indistinguishable Obfuscation
12. Genomic and spatial analysis reveal the transmission dynamics of tuberculosis in areas with high incidence of Zhejiang, China: A prospective cohort study
13. Adaptive personalized privacy-preserving data collection scheme with local differential privacy
14. L-Net: A lightweight convolutional neural network for devices with low computing power
15. APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing
16. Spectator electron effects on the two-electron one-photon radiative transition process of double K hole state of Xe$^{q+}$ ion($47\!\leq\!q\!\leq\!52$)
17. A secure and lightweight batch authentication scheme for Internet of Drones environment
18. Energy levels and radiative transition properties of the 2s2p double K-shell vacancy state in He-like ions ([formula omitted])
19. Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system
20. A redesigned secure and efficient data transaction protocol for mobile payment system
21. The effects of electron correlation and the Breit interaction on one- and two-electron one-photon transitions in double K hole states of He-like ions ($10\!\leq\!Z\!\leq\!47$)
22. The influence of relativistic, Breit interaction, and QED effects on the 1s22p22s2p34≤Z≤74 and 1s22p22s2p34≤Z≤74 energy levels of Be-like (1s22p22s2p34≤Z≤74) isoelectronic sequence
23. Data release for machine learning via correlated differential privacy
24. A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things
25. PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption
26. Homomorphic Witness Encryption from Indistinguishable Obfuscation
27. A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks
28. Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing
29. Witness Encryption from Smooth Projective Hashing System
30. SVFLS: A Secure and Verifiable Federated Learning Training Scheme
31. Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace
32. A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces
33. A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption
34. Linear Policy Recommender Scheme for Large-Scale Attribute-Based Access Control
35. Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids
36. A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
37. A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks
38. A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates
39. A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption
40. Direct wavelength measurement of the [formula omitted][formula omitted] highly charged ion clock transition in Rh[formula omitted]
41. SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain
42. Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption
43. Identification and characterization of nontuberculous mycobacteria isolated from suspected pulmonary tuberculosis patients in eastern china from 2009 to 2019 using an identification array system
44. Production and decay of K-shell hollow krypton in collisions with 52 - 197 MeV/u bare xenon ions
45. Key Exposure Resistant Group Key Agreement Protocol
46. A Verifiable Combinatorial Auction with Bidder’s Privacy Protection
47. An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System
48. Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing
49. An Abnormal Account Identification Method by Topology Feature Analysis for Blockchain-Based Transaction Network
50. An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.