1,986 results on '"Chen, Liqun"'
Search Results
252. Enforcing Sticky Policies with TPM and Virtualization
253. Revocation of Direct Anonymous Attestation
254. Trusted Integrity Measurement and Reporting for Virtualized Platforms : (Work-in-Progress)
255. Attribute-Based Signatures with User-Controlled Linkability
256. A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost
257. A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining
258. Cr(VI)-contaminated groundwater remediation with simulated permeable reactive barrier (PRB) filled with natural pyrite as reactive material: Environmental factors and effectiveness
259. Certificateless Public Key Signature Schemes from Standard Algorithms
260. Anonymous Single-Sign-On for n Designated Services with Traceability
261. A novel feature combination screening method for Li-ion battery state of health prediction
262. Progress in research on paclitaxel and tumor immunotherapy
263. Nanoheterojunction‐Mediated Thermoelectric Strategy for Cancer Surgical Adjuvant Treatment and β‐elemene Combination Therapy
264. Crises and chaotic transients of a tristable magnetoelastic oscillator
265. Global bifurcations of a multi-stable nonlinear oscillator
266. High-Fidelity Variable-Rate Image Compression via Invertible Activation Transformation
267. 18.5: High Performance Transparent Micro‐LED Display
268. Optimal control of attitude for coupled-rigid-body spacecraft via Chebyshev-Gauss pseudospectral method
269. Solar sail chaotic pitch dynamics and its control in Earth orbits
270. Integration of a nonlinear energy sink and a piezoelectric energy harvester
271. Vibration of axially moving beam supported by viscoelastic foundation
272. Primary resonance of traveling viscoelastic beam under internal resonance
273. Fair Private Set Intersection with a Semi-trusted Arbiter
274. Group Signatures on Mobile Devices: Practical Experiences
275. Catheter-directed thrombolysis for patients with acute lower extremity deep vein thrombosis: a meta-analysis
276. A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes
277. CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
278. Security of the Enhanced TCG Privacy-CA Solution
279. Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes
280. The n-Diffie-Hellman Problem and Its Applications
281. The Twin Bilinear Diffie-Hellman Inversion Problem and Applications
282. Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
283. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
284. On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation
285. Edge modification facilitated heterogenization and exfoliation of two-dimensional nanomaterials for cancer catalytic therapy
286. A study of Hybrid reactive Compensation
287. DICER1-associated sarcoma of the aortic arch – a case report and literature review
288. Learning populations with hubs govern the initiation and propagation of spontaneous bursts in neuronal networks after learning
289. Clinical Characteristics and Outcomes in Chronic Kidney Disease Patients with Tuberculosis in China: A Retrospective Cohort Study
290. Effects of Self-Care plus Forecasting Nursing on the Treatment Outcomes and Emotions in Patients with Nasopharyngeal Carcinoma after Radiotherapy
291. Effects of intestinal bacteria on cardiovascular disease
292. Anonymous Authentication for RFID Systems
293. Public-Key Encryption with Registered Keyword Search
294. A DAA Scheme Requiring Less TPM Resources
295. A DAA Scheme Using Batch Proof and Verification
296. On the Design and Implementation of an Efficient DAA Scheme
297. Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
298. End-to-end policy based encryption techniques for multi-party data management
299. Sulindac-Derived RXRα Modulators Inhibit Cancer Cell Growth by Binding to a Novel Site
300. Certificate-Free Attribute Authentication
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.