196 results on '"Haibo Tian"'
Search Results
52. Monitoring and evaluation of gully erosion in China's largest loess tableland based on SBAS-InSAR
53. Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible.
54. The circ_FAM53B-miR-183-5p-CCDC6 axis modulates the malignant behaviors of papillary thyroid carcinoma cells
55. Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.
56. A lattice-based partially blind signature.
57. Identity Based Threshold Ring Signature from Lattices.
58. Dual Fast Marching Tree Algorithm for Human-Like Motion Planning of Anthropomorphic Arms With Task Constraints
59. The Impact of Cycling Specialization on Successful Aging and the Mediating Role of Loneliness
60. A lattice-based designated verifier signature for cloud computing.
61. On Security Model of One-Round Authenticated Key Exchange.
62. General Certificateless Strong Designated Verifier Signature Schemes.
63. A Hybrid System for Authentication Service.
64. Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies.
65. Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
66. A Non-delegatable Strong Designated Verifier Signature without Random Oracles.
67. A Short Non-delegatable Strong Designated Verifier Signature.
68. An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
69. A New Strong Multiple Designated Verifiers Signature for Broadcast Propagation.
70. Non-interactive Deniable Authentication Protocols.
71. Non-delegatable Strong Designated Verifier Signature on Elliptic Curves.
72. Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring.
73. Identity-Based Chameleon Hash Scheme without Key Exposure.
74. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
75. A Searchable Symmetric Encryption Scheme using BlockChain.
76. A Deep Copy Protection Framework for Electronic Devices within Home.
77. Identity-based chameleon hashing and signatures without key exposure.
78. Deniability and forward secrecy of one-round authenticated key exchange.
79. Toward quantum-resistant strong designated verifier signature.
80. A short non-delegatable strong designated verifier signature.
81. Security Analysis of the Digital Transmission Copy Protection Specification.
82. A Virtual Bridge Certificate Authority Model.
83. A systematic method to design strong designated verifier signature without random oracles.
84. A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
85. Selectively unforgeable but existentially forgeable signature schemes and applications.
86. Security Analysis of a Suite of Deniable Authentication Protocols.
87. A Proposal to Enhance High-Frequency Optical MEMS Accelerometer Sensitivity Based on a One-Dimensional Photonic Crystal Wavelength Modulation System
88. Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem
89. Deniable message transmission authenticator based on weak signature schemes.
90. A new strong multiple designated verifiers signature.
91. New receipt-free voting scheme using double-trapdoor commitment.
92. Dynamic asymmetric group key agreement for ad hoc networks.
93. Discrete logarithm based chameleon hashing and signatures without key exposure.
94. Identity-based trapdoor mercurial commitments and applications.
95. Analysis of Two Types Deniable Authentication Protocols.
96. Incentive compatible and anti-compounding of wealth in proof-of-stake
97. Personality and Subjective Well-Being among Elder Adults: Examining the Mediating Role of Cycling Specialization
98. The Expression of GLAST and GLT1 in a Transient Cerebral Ischemia Mongolian Gerbil Model
99. ‘Why do people commit to long distance running’: serious leisure qualities and leisure motivation of marathon runners
100. Efficient generic on-line/off-line (threshold) signatures without key exposure.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.