298 results on '"Yang, Yanjiang"'
Search Results
2. Medium to long term of self-report outcomes of high tibial osteotomy in advanced age patients
3. Blockade of aryl hydrocarbon receptor restricts omeprazole-induced chronic kidney disease
4. The association of normal-range serum phosphorus with immunoglobulin A nephropathy progression: a retrospective cohort study
5. Finite element analysis of basicervical femoral neck fracture treated with proximal femoral bionic nail
6. Ramp Hyper-invertible Matrices and Their Applications to MPC Protocols
7. Partial femoral head replacement: a new innovative hip-preserving approach for treating osteonecrosis of the femoral head and its finite element analysis
8. Socioeconomic status, obesity, individual behaviors, diabetes, and risk for frozen shoulder: A Mendelian randomization study
9. Incidence and associated factors of delirium after orthopedic surgery in elderly patients: a systematic review and meta-analysis
10. Finite element analysis of basicervical femoral neck fracture treated with proximal femoral bionic nail
11. Obesity and risk for respiratory diseases: a Mendelian randomization study
12. Nomogram for predicting survival after lymphatic metastasis in esophageal cancer: A SEER analysis
13. Nomogram for predicting the likelihood of liver metastases at initial diagnosis in patients with Siewert type II gastroesophageal junction adenocarcinoma
14. IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)
15. Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud
16. AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo
17. Secure server-aided top-k monitoring
18. V2X security: A case study of anonymous authentication
19. A systematic review and meta-analysis of fall incidence and risk factors in elderly patients after total joint arthroplasty
20. APOC1 exacerbates renal fibrosis through the activation of the NF-κB signaling pathway in IgAN
21. Surgery and postoperative radiotherapy affect the prognosis of esophageal cancer: A SEER analysis
22. Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database
23. Towards Lightweight Anonymous Entity Authentication for IoT Applications
24. On Lightweight Security Enforcement in Cyber-Physical Systems
25. Authenticated CAN Communications Using Standardized Cryptographic Techniques
26. Efficient outsourcing of secure k-nearest neighbour query over encrypted database
27. Risk factors for dislocation after revision total hip arthroplasty: A systematic review and meta-analysis
28. Security of Scalable Video Coding: Encryption and Authentication
29. Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data
30. Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices
31. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data
32. HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive
33. Dietary factors and risk for asthma: A Mendelian randomization analysis
34. Radiation therapy should not be administered to patients with lung adenocarcinoma with intrapulmonary metastases
35. Preoperative radiotherapy affects the prognosis of patients with stage T1-3N0-1M0 gastroesophageal junction adenocarcinoma
36. Cloud based data sharing with fine-grained proxy re-encryption
37. Panel Data Analysis Via Variable Selection and Subject Clustering
38. Dynamic Workflow Adjustment with Security Constraints
39. Fine-Grained Conditional Proxy Re-Encryption and Application
40. Adaptable Ciphertext-Policy Attribute-Based Encryption
41. A note on the security of KHL scheme
42. Identification and validation of P4HB as a novel autophagy-related biomarker in diabetic nephropathy
43. Risk factors for postoperative delirium following hip fracture repair in elderly patients: a systematic review and meta-analysis
44. Towards User-Oriented RBAC Model
45. A Generic Approach for Providing Revocation Support in Secret Handshake
46. Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing
47. Modeling TCG-Based Secure Systems with Colored Petri Nets
48. Optionally Identifiable Private Handshakes
49. Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data
50. Efficient Unidirectional Proxy Re-Encryption
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.