The following pages link to Jian Hua Li (Q1372268):
Displaying 47 items.
- (Q257836) (redirect page) (← links)
- Solving nonlinear programming problems with unbounded non-convex constraint sets via a globally convergent algorithm (Q257838) (← links)
- (Q390245) (redirect page) (← links)
- An improvement of the TYT algorithm for \(\mathrm{GF}(2^m)\) based on reusing intermediate computation results (Q390246) (← links)
- Representing expectation values of projectors as series for evolution reconstruction (Q513857) (← links)
- An alternative class of irreducible polynomials for optimal extension fields (Q543428) (← links)
- Strongly secure identity-based authenticated key agreement protocols (Q553832) (← links)
- Democratic group signatures with collective traceability (Q733294) (← links)
- Nonlinear integral equation of coefficient inversion of acoustic wave equation and iteration (Q909141) (← links)
- Non-interactive identity-based threshold signature scheme without random oracles (Q943088) (← links)
- GL method for solving equations in math-physics and engineering (Q946233) (← links)
- Dynamic characteristics of explicit control protocol (Q954525) (← links)
- An extension of TYT inversion algorithm in polynomial basis (Q991790) (← links)
- New parallel stochastic global integral and local differential equation modeling and inversion (Q992183) (← links)
- Free-riders impact on throughputs of peer-to-peer file-sharing systems (Q1028376) (← links)
- An authenticated group key distribution scheme for wireless sensor networks (Q1028398) (← links)
- Computing the singular behavior of solutions of Cauchy singular integral equations with variable coefficients (Q1372269) (← links)
- Combining trigram and automatic weight distribution in Chinese spelling error correction (Q1433995) (← links)
- Approximately nearest neighborhood image search using unsupervised hashing via homogeneous kernels (Q1649549) (← links)
- Enhanced-bivium algorithm for RFID system (Q1666150) (← links)
- A general solution to least squares problems with box constraints and its applications (Q1793094) (← links)
- Speedup of bit-parallel Karatsuba multiplier in \(\mathrm{GF}(m^2)\) generated by trinomials (Q1944906) (← links)
- Strongly secure identity-based authenticated key agreement protocols without bilinear pairings (Q2282019) (← links)
- Vectorial resilient \(\mathrm{PC}(l)\) of order \(k\) Boolean functions from AG-codes (Q2430342) (← links)
- The generalized Goertzel algorithm and its parallel hardware implementation (Q2481284) (← links)
- Security analysis and improvement of a user-friendly remote authentication protocol (Q2572652) (← links)
- Evolution reconstruction of deviate Bell states by extending the novel Fourier-based method (Q2681555) (← links)
- Optimizing the post-processing of online evolution reconstruction in quantum communication (Q2684357) (← links)
- Iterative CT reconstruction based on ADMM using shearlet sparse regularization (Q2694038) (← links)
- (Q2824652) (← links)
- (Q2886917) (← links)
- (Q2951389) (← links)
- A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems (Q2980855) (← links)
- Compiler-Assisted Refresh Minimization for Volatile STT-RAM Cache (Q2982137) (← links)
- (Q2987247) (← links)
- (Q2992827) (← links)
- Analysis and synthesis of a class of neural networks: linear systems operating on a closed hypercube (Q3032190) (← links)
- (Q3061857) (← links)
- Broadcast group-oriented encryption secure against chosen ciphertext attack (Q3087667) (← links)
- Bearing dynamic parameters identification for a sliding bearing-rotor system with uncertainty (Q3122023) (← links)
- (Q3212231) (← links)
- (Q3371892) (← links)
- (Q3402730) (← links)
- Family genetic algorithms based on gene exchange and its application (Q3423673) (← links)
- (Q3437672) (← links)
- Strongly secure identity-based authenticated key agreement protocols in the escrow mode (Q5018267) (← links)
- A simple protocol for deniable authentication based on ElGamal cryptography (Q5463667) (← links)