Publication | Date of Publication | Type |
---|
Nonstationary online convex optimization with multiple predictions | 2024-02-12 | Paper |
Secure formation control for resilient multi‐agent cyber‐physical systems under <scp>DoS</scp> attacks and faults | 2024-02-06 | Paper |
Two-round quantum homomorphic encryption scheme based on matrix decomposition | 2024-01-16 | Paper |
Adaptively Sparse Transformers Hawkes Process | 2023-10-12 | Paper |
Dynamic full quantum one-way function based on quantum circuit mapping | 2023-09-18 | Paper |
Doubly time-dependent Hawkes process and applications in failure sequence analysis | 2023-08-29 | Paper |
A multi-valued quantum fully homomorphic encryption scheme | 2023-03-01 | Paper |
Secure Quantum Network Coding Theory | 2023-02-01 | Paper |
Quantum network coding reducing decoherence effect | 2023-01-18 | Paper |
Quantum network coding utilizing quantum discord resource fully | 2023-01-05 | Paper |
Universal construction of a full quantum one-way function | 2022-12-06 | Paper |
Instantiation of quantum point obfuscation | 2022-11-28 | Paper |
IND-secure quantum symmetric encryption based on point obfuscation | 2022-11-25 | Paper |
New classes of permutation polynomials with coefficients 1 over finite fields | 2022-07-27 | Paper |
UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module | 2022-07-01 | Paper |
A New Method of Construction of Permutation Trinomials with Coefficients 1 | 2021-12-29 | Paper |
Traceable ring signatures: general framework and post-quantum security | 2021-06-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q5142658 | 2021-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q3307379 | 2020-08-12 | Paper |
Traceable ring signatures with post-quantum security | 2020-08-05 | Paper |
A combined micro-block chain truncation attack on Bitcoin-NG | 2020-05-27 | Paper |
On the obfuscatability of quantum point functions | 2019-03-15 | Paper |
Batch blind signatures on elliptic curves | 2018-12-07 | Paper |
Efficient subtree-based encryption for fuzzy-entity data sharing | 2018-11-27 | Paper |
Provably secure self-extractable encryption | 2018-11-07 | Paper |
Adaptive PID and model reference adaptive control switch controller for nonlinear hydraulic actuator | 2018-11-05 | Paper |
Some new generalized retarded Gronwall-like inequalities and their applications in nonlinear systems | 2018-10-08 | Paper |
Linkable group signature for auditing anonymous communication | 2018-09-26 | Paper |
Auditable hierarchy-private public-key encryption | 2018-09-26 | Paper |
Revisiting the incentive mechanism of Bitcoin-NG | 2018-09-26 | Paper |
Fault-tolerant anti-windup control for hypersonic vehicles in reentry based on ISMDO | 2018-08-17 | Paper |
Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext | 2018-04-20 | Paper |
Continuous-variable quantum homomorphic signature | 2018-02-28 | Paper |
A position-aware Merkle tree for dynamic cloud data integrity verification | 2018-02-27 | Paper |
Robust observer‐based control for uncertain discrete time‐delay systems with nonlinearities electric‐hydraulic system under Hölder condition | 2018-01-05 | Paper |
Quantum coordinated multi-point communication based on entanglement swapping | 2017-11-09 | Paper |
Continuous-variable quantum network coding for coherent states | 2017-10-24 | Paper |
软件定义网络:安全模型、机制及研究进展 | 2017-01-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q2951369 | 2017-01-06 | Paper |
Secure quantum network coding for controlled repeater networks | 2016-10-27 | Paper |
Global robust sliding mode control for time-delay systems with mismatched uncertainties | 2016-10-04 | Paper |
Approximate controllability and optimal controls of fractional dynamical systems of order \(1< q<2\) in Banach spaces | 2016-09-05 | Paper |
Approximate controllability and optimal controls of fractional evolution systems in abstract spaces | 2016-09-01 | Paper |
Accelerating Oblivious Transfer with Batch Multi-exponentiation | 2016-08-31 | Paper |
Secure multi-source network coding scheme with lattice signature | 2016-08-10 | Paper |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts | 2016-07-11 | Paper |
Opportunistic quantum network coding based on quantum teleportation | 2016-06-10 | Paper |
Controllability problem for fractional integrodifferential evolution systems of mixed type with the measure of noncompactness | 2016-03-17 | Paper |
Quantum network coding for general repeater networks | 2015-10-19 | Paper |
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test | 2015-07-27 | Paper |
Practical (fully) distributed signatures provably secure in the standard model | 2015-07-24 | Paper |
Quantum homomorphic signature | 2015-04-13 | Paper |
Iterative reweighted noninteger norm regularizing SVM for gene expression data classification | 2015-03-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5171550 | 2015-02-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q5497954 | 2015-02-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q5499105 | 2015-02-11 | Paper |
迭代再权共轭梯度q范数正则化线性最小二乘–支持 向量机分类算法 | 2014-11-03 | Paper |
Fault diagnosis for linear discrete systems based on an adaptive observer | 2014-10-13 | Paper |
Hierarchical Identity-Based Broadcast Encryption | 2014-07-24 | Paper |
Existence and controllability results for fractional impulsive integrodifferential systems in Banach spaces | 2014-06-23 | Paper |
Practical Distributed Signatures in the Standard Model | 2014-03-28 | Paper |
A Novel Deterministic Secure Quantum Communication Scheme with Einstein—Podolsky—Rosen Pairs and Single Photons | 2013-12-13 | Paper |
Classification Algorithm of Support Vector Machine via <I>p</I>-norm Regularization | 2013-01-24 | Paper |
Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability | 2010-11-26 | Paper |
Comprehensive benefit of flood resources utilization through dynamic successive fuzzy evaluation model: a case study | 2010-08-13 | Paper |
Efficient key management scheme based on CPK for mobile Ad Hoc networks | 2009-11-22 | Paper |
EQUATION OF STATE FOR HOT GLUON PLASMA WITH EFFECTIVE TWO LOOPS | 2008-06-27 | Paper |