| Publication | Date of Publication | Type |
|---|
| Beyond volume pattern: storage-efficient Boolean searchable symmetric encryption with suppressed leakage | 2024-06-05 | Paper |
Additive centralized and Stackelberg DEA models for two‐stage system with shared resources International Transactions in Operational Research | 2023-11-17 | Paper |
Towards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme Information Sciences | 2023-11-09 | Paper |
Human-exoskeleton oscillation model and qualitative analysis of interaction and functional practicality of exoskeletons Applied Mathematical Modelling | 2023-10-13 | Paper |
Bayesian mechanism for rational secret sharing scheme Science China Information Sciences | 2022-10-28 | Paper |
Universally composable secure TNC model and EAP-TNC protocol in IF-T Science China Information Sciences | 2022-10-28 | Paper |
Universally composable secure positioning in the bounded retrieval model Science China Information Sciences | 2022-10-28 | Paper |
A rumor spreading model based on two propagation channels in social networks Physica A | 2022-07-26 | Paper |
| scientific article; zbMATH DE number 7478039 (Why is no real title available?) | 2022-02-22 | Paper |
Operating efficiency assessment of commercial banks with Cooperative-Stackelberg hybrid two-stage DEA RAIRO - Operations Research | 2022-02-21 | Paper |
Adversarial link deception against the link prediction in complex networks Physica A | 2022-01-20 | Paper |
| Spectrum privacy preserving for social networks: a personalized differential privacy approach | 2021-12-08 | Paper |
Privacy-preserving Krawtchouk moment feature extraction over encrypted image data Information Sciences | 2021-11-23 | Paper |
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification Information Sciences | 2020-12-10 | Paper |
| scientific article; zbMATH DE number 7267169 (Why is no real title available?) | 2020-10-27 | Paper |
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure Information and Communications Security | 2020-07-20 | Paper |
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud Information Sciences | 2020-02-06 | Paper |
| Advance in TLS 1.3 protocol studies | 2019-09-20 | Paper |
Automated enforcement for relaxed information release with reference points Science China Information Sciences | 2018-11-01 | Paper |
On the control of opinion dynamics in social networks Physica A | 2018-09-20 | Paper |
The postprocessing of quantum digital signatures Quantum Information Processing | 2017-10-24 | Paper |
| scientific article; zbMATH DE number 6719494 (Why is no real title available?) | 2017-05-17 | Paper |
Verifiable Computation over Large Database with Incremental Updates IEEE Transactions on Computers | 2017-05-16 | Paper |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation IEEE Transactions on Computers | 2017-05-16 | Paper |
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains IEEE Transactions on Computers | 2017-05-16 | Paper |
Robust quantum private queries International Journal of Theoretical Physics | 2017-03-28 | Paper |
| Privacy-preserving multi-factor key exchange protocol in the standard model | 2017-01-06 | Paper |
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy Nonlinear Dynamics | 2016-11-02 | Paper |
Towards efficient fully randomized message-locked encryption Information Security and Privacy | 2016-08-31 | Paper |
A rational framework for secure communication Information Sciences | 2015-09-24 | Paper |
| scientific article; zbMATH DE number 6471959 (Why is no real title available?) | 2015-08-10 | Paper |
Verifiable computation over large database with incremental updates Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Stability analysis of an \textit{e-SEIAR} model with point-to-group worm propagation Communications in Nonlinear Science and Numerical Simulation | 2015-01-29 | Paper |
Efficient algorithms for secure outsourcing of bilinear pairings Theoretical Computer Science | 2014-12-02 | Paper |
| A ciphertext-policy weighted attribute based encryption scheme | 2014-02-28 | Paper |
New algorithms for secure outsourcing of modular exponentiations Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
A one-time rational secret sharing scheme based on Bayesian game Wuhan University Journal of Natural Sciences (WUJNS) | 2012-06-01 | Paper |
Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms Pattern Recognition | 2011-11-10 | Paper |
| Constructing polynomials for generating pairing-friendly elliptic curves | 2011-09-29 | Paper |
A study on the flow in helical elliptical pipes with Galerkin method Journal of Hydrodynamics. Ser. B | 2011-03-31 | Paper |
Numerical analysis of the fluid flow in a rotating curved elliptical pipe Journal of Hydrodynamics. Ser. B | 2011-03-10 | Paper |
Laminar developing flow in the entrance region of rotating curved pipes Journal of Hydrodynamics. Ser. B | 2011-01-19 | Paper |
| scientific article; zbMATH DE number 5812648 (Why is no real title available?) | 2010-11-05 | Paper |
Elastoplastic meshless integral method Computer Methods in Applied Mechanics and Engineering | 2010-09-14 | Paper |
| An efficient signcryption scheme with forward secrecy | 2010-07-08 | Paper |
Image analysis by Bessel-Fourier moments Pattern Recognition | 2010-06-08 | Paper |
Local Poincaré Symmetry in Gauge Theory of Gravity Communications in Theoretical Physics | 2009-08-27 | Paper |
Secure Error-Correction Network Coding in a Randomized Setting Advances in Information Security and Assurance | 2009-06-25 | Paper |
Key hierarchies for hierarchical access control in secure group communications Computer Networks | 2009-03-11 | Paper |
A new approach for UC security concurrent deniable authentication Science in China. Series F | 2009-01-26 | Paper |
| scientific article; zbMATH DE number 5259998 (Why is no real title available?) | 2008-04-04 | Paper |
Theoretical analysis of convective heat transfer of Oldroyd-B fluids in a curved pipe International Journal of Heat and Mass Transfer | 2008-03-11 | Paper |
Universally composable anonymous hash certification model Science in China. Series F | 2007-10-12 | Paper |
A meshless integral method based on regularized boundary integral equation Computer Methods in Applied Mechanics and Engineering | 2007-10-04 | Paper |
Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms Pattern Recognition | 2007-09-14 | Paper |
Galerkin method study on flow of Oldroyd-B fluids in curved circular cross-section pipes Journal of Zhejiang University. Science A | 2007-09-03 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Security extension for the Canetti-Krawczyk model in identity-based systems Science in China. Series F | 2007-02-20 | Paper |
| scientific article; zbMATH DE number 5125797 (Why is no real title available?) | 2007-02-13 | Paper |
| Research and implementation of total-ordered multicast protocol considering overlapped groups | 2006-10-04 | Paper |
Computational Science – ICCS 2005 Lecture Notes in Computer Science | 2005-11-30 | Paper |
Theoretical and numerical analysis of convective heat transfer in the rotating helical pipes. International Journal of Heat and Mass Transfer | 2004-05-27 | Paper |
Using transforming matrices to generate DNA clone grids Discrete Applied Mathematics | 2003-09-09 | Paper |