Showing 1 - 19 results of 19 for search 'Yongli Tang', query time: 0.06s
Refine Results
-
1
Mapping the field: A bibliometric literature review on technology mining by Xinyue Hu, Huiming Gu, Yongli Tang, Bo Wang
Published 2024-01-01
Article -
2
-
3
Lattice-Based Group Signature with Message Recovery for Federal Learning by Yongli Tang, Deng Pan, Panke Qin, Liping Lv
Published 2023-08-01
Article -
4
Blockchain-Based Searchable Encryption Scheme With Fair Payment by Xixi Yan, Xiaohan Yuan, Qing Ye, Yongli Tang
Published 2020-01-01
Article -
5
A remote sensing encrypted data search method based on a novel double-chain by Xixi Yan, Pei Yin, Yongli Tang, Suwei Feng
Published 2023-12-01
Article -
6
Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment by Xixi Yan, Xiaohan Yuan, Qichao Zhang, Yongli Tang
Published 2020-01-01
Article -
7
Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network by Xixi Yan, Pei Yin, Yongli Tang, Suwei Feng
Published 2022-12-01
Article -
8
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment by Xixi Yan, Xu He, Jinxia Yu, Yongli Tang
Published 2019-01-01
Article -
9
Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme by Yongli Tang, Minglu Jin, Hui Meng, Li Yang, Chengfu Zheng
Published 2023-05-01
Article -
10
A Randomness Detection Method of ZigBee Protocol in a Wireless Sensor Network by Yongli Tang, Huanhuan Lian, Lixiang Li, Xiaojun Wang, Xixi Yan
Published 2018-11-01
Article -
11
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden by Jinxia Yu, Guanghui He, Xixi Yan, Yongli Tang, Rongxia Qin
Published 2020-05-01
Article -
12
A Novel Edge Cache-Based Private Set Intersection Protocol via Lightweight Oblivious PRF by Jing Zhang, Li Yang, Yongli Tang, Minglu Jin, Shujing Wang
Published 2023-09-01
Article -
13
Cloud‐edge collaboration based peer to peer services redirection strategy for passive optical network by Yongli Tang, Junru You, Panke Qin, Yanyan Fu, Wenke Wang
Published 2022-05-01
Article -
14
-
15
Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform. by Jing Zhang, Lixiang Li, Yongli Tang, Shoushan Luo, Yixian Yang, Yang Xin
Published 2019-01-01
Article -
16
-
17
-
18
-
19
Development and validation of a novel necroptosis-related gene signature for predicting prognosis and therapeutic response in Ewing sarcoma by Runhan Zhao, Runhan Zhao, Yu Jiang, Jun Zhang, Jun Zhang, Yanran Huang, Yanran Huang, Chuang Xiong, Chuang Xiong, Zenghui Zhao, Zenghui Zhao, Tianji Huang, Tianji Huang, Wei Liu, Wei Liu, Nian Zhou, Nian Zhou, Zefang Li, Zefang Li, Xiaoji Luo, Xiaoji Luo, Yongli Tang
Published 2023-08-01
Article