94 results on '"Hu, Mingsheng"'
Search Results
2. Potential risks in the easy market access: A perspective from corporate asset-debt maturity mismatch
3. Dig the treasure nearby: The impact of local supplier preference on trade credit financing
4. The effect of urban–rural construction land transition on ecosystem services: A theoretical framework and empirical evidence for China
5. Anonymous Traceability protocol based on Group Signature for Blockchain
6. A Secure Multi-party Signature Scheme Based on Trust Mechanism
7. Provably Secure Server-Assisted Verification Threshold Proxy Re-signature Scheme
8. Identity-Based Threshold Group Signature Scheme of Blockchain Verification
9. A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet
10. A Voting Scheme in Blockchain Based on Threshold Group Signature
11. SStore: an efficient and secure provable data auditing platform for cloud
12. Dynamic simulation and assessment of the coupling coordination degree of the economy–resource–environment system: Case of Wuhan City in China
13. Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing
14. An Association Ring Signature for Block Chain E-Money Transactions
15. The Hybrid Trip Destination Prediction Model of Vehicles Based on Autoencoder and High-Order Interaction Features
16. A Robust Reversible Data Hiding Scheme for H.264 Based on Secret Sharing
17. Dig the Treasure Nearby: The Impact of Local Supplier Preference on Trade Credit Financing
18. A new robust data hiding method for H.264/AVC without intra-frame distortion drift
19. A robust reversible data hiding scheme for H.264 without distortion drift
20. Anonymous Traceability protocol based on Group Signature for Blockchain
21. The Analysis of Epidemic Disease Propagation in Competition Environment
22. The Resilience Framework for Interdependent Infrastructure Systems Using the Dynamic Inoperability Input-Output Model
23. The Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus Intrusion Detection in the In-Vehicle Network
24. Web Text Categorization for Enterprise Decision Support Based on SVMs – An Application of GBODSS
25. Multi-receiver signcryption scheme with multiple key generation centers through public channel in edge computing
26. A Novel E-payment Protocol Implented by Blockchain and Quantum Signature
27. A Robust Reversible Data Hiding Scheme for H.264 Based on Secret Sharing
28. A Deep Learning-Based Trust Assessment Method for Cloud Users
29. Identity-Based Threshold Group Signature Scheme of Blockchain Verification
30. A Secure Multi-party Signature Scheme Based on Trust Mechanism
31. The Resilience Framework for Interdependent Infrastructure Systems Using the Dynamic Inoperability Input-Output Model
32. Machine Learning Empowered Trust Evaluation Method for IoT Devices
33. More Stable, More Sustainable:Does TMT Stability Affect Sustainable Corporate Social Responsibility?
34. More Stable, More Sustainable: Does TMT Stability Affect Sustainable Corporate Social Responsibility?
35. Web Text Categorization for Enterprise Decision Support Based on SVMs – An Application of GBODSS
36. Integrating ecosystem services value and uncertainty into regional ecological risk assessment: A case study of Hubei Province, Central China
37. Keyword Searchable Encryption Scheme based on Blockchain in Cloud Environment
38. A New Signcryption Scheme without Hash or Redundant functions
39. A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing
40. A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet
41. A New Signcryption Scheme Based on Elliptic Curves
42. A Signature Scheme Applying on Blockchain Voting Scene Based on the Asmuth-Bloom Algorithm
43. A Signature Scheme Applying on Blockchain Voting Scene Based on the Asmuth-Bloom Algorithm
44. Search engine advertising optimization strategy based on Ontology and multi-attribute entropy weight fuzzy comprehensive evaluation
45. A semantic trust model of large scale distributed system based on Ontology
46. A reversible data hiding method for H.264 with Shamir’s (t, n)-threshold secret sharing
47. A new data hiding method for H.264 based on secret sharing
48. The application of TSVM in teaching quality evaluation
49. An approach for text extraction from web news page
50. Local fractional differential equations by the Exp-function method
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.