1 |
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states
|
期刊论文 |
Yang, Wei|Huang, Liu-sheng|Zhong, Hong|Shi, Run-hua| |
2 |
Privacy preserving computation of trust-value in wireless sensor networks
|
会议论文 |
Huang, Liusheng|Yuan, Xing|Yangt, Wei| |
3 |
Efficient Collusion-Resisting Secure Sum Protocol
|
期刊论文 |
Huang Liusheng|Yang Wei|Zhu Youwen|Yuan Xing| |
4 |
A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements
|
期刊论文 |
Zhong Hong|Huang Liu-Sheng|Shi Run-Hua|Yang Wei| |
5 |
A new steganography method via combination in PowerPoint files
|
会议论文 |
Meng, Peng|Ye, Yun|Huang, Liu-Sheng|Zhang, Hao-Ran| |
6 |
Steganalysis against substitution-based linguistic steganography based on context clusters
|
期刊论文 |
Huang, Liusheng|Yang, Wei|Chen, Zhili|Meng, Peng|Miao, Haibo| |
7 |
Efficient Symmetric Five-Party Quantum State Sharing of an Arbitrary m-Qubit State
|
期刊论文 |
Yang, Wei|Huang, Liu-sheng|Zhong, Hong|Shi, Run-hua| |
8 |
Quantum group blind signature scheme without entanglement
|
期刊论文 |
He, Libao|Yang, Wei|Huang, Liusheng|Xu, Rui| |
9 |
INFEASIBILITY OF QUANTUM CRYPTOGRAPHY WITHOUT EAVESDROPPING CHECK
|
期刊论文 |
Yang, Wei|Song, Fang|Huang, Liusheng|Wang, Qiyan| |
10 |
Analysis and detection of text steganographic tool-Stegparty
|
期刊论文 |
Chen, Zhi-Li|Huang, Liu-Sheng|Miao, Hai-Bo|Yang, Wei| |
11 |
Quantum bit commitment based on qubit oblivious transfer
|
期刊论文 |
Wang, Qiyan|Huang, Liusheng|Luo, Yonglong|Yang, Wei| |
12 |
Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements
|
期刊论文 |
Huang, Liusheng|Shi, Runhua|Zhong, Hong|Yang, Wei| |
13 |
Efficient Secure protocols to determine whether a point is inside a convex hull
|
会议论文 |
Zhengyou, Zhou|Yun, Ye|Wei, Yang|Liusheng, Huang| |
14 |
An Efficient Scheme for Multiparty Multi-particle State Sharing
|
期刊论文 |
Huang Liu-Sheng|Yang Wei|Zhong Hong|Shi Run-Hua| |
15 |
保护私有信息的文本信息隐藏检测算法
|
期刊论文 |
朱友文|黄刘生|杨威|李栋| |
16 |
Cryptanalysis of fair quantum blind signatures
|
期刊论文 |
He Li-Bao|Yang Wei|Huang Liu-Sheng|Xu Rui| |
17 |
基于翻译的信息隐藏分析检测
|
期刊论文 |
陈志立|杨明|黄刘生|杨威|孟朋| |
18 |
LinL:Lost in n-best list
|
会议论文 |
Meng, Peng|Huang, Liusheng|Desoky, Abdelrahman|Chen, Zhili|Yang, Wei|Shi, Yun-Qing| |
19 |
Controlled quantum perfect teleportation of multiple arbitrary multi-qubit states
|
期刊论文 |
Shi RunHua|Huang LiuSheng|Zhong Hong|Yang Wei| |
20 |
一种高效的集中信任模型下的共谋检测算法
|
期刊论文 |
黄刘生|王剑锋|杨威|朱友文|董凡| |
21 |
Relation of PPAtMP and scalar product protocol and their applications
|
会议论文 |
Yang, Wei|Huang, Liusheng|Zhu, Youwen| |
22 |
Cryptanalysis and melioration of secure sealed-bid auction with post-confirmation
|
期刊论文 |
Dian-qi Han|Liu-Sheng Huang|Li-Bao He|Rui Xu|Wei Yang| |
23 |
Efficient protocols for point-convex hull inclusion decision problems
|
期刊论文 |
Yun, Ye|Youwen, Zhu|Wei, Yang|Liusheng, Huang| |
24 |
Hiding information by context-based synonym substitution
|
会议论文 |
Yu, Zhenshan|Chen, Zhili|Huang, Liusheng|Zheng, Xueling|Yang, Wei| |
25 |
An improved trusted cloud computing platform model based on DAA and Privacy CA scheme
|
会议论文 |
Wang, Han-Zhang|Huang, Liu-Sheng| |
26 |
Efficient multi-party quantum state sharing of an arbitrary two-qubit state
|
期刊论文 |
Yang, Wei|Shi, Run-hua|Zhong, Hong|Huang, Liu-sheng| |
27 |
基于双文本段的信息隐藏算法
|
期刊论文 |
陈志立|黄刘生|陈国良|杨威|余振山| |
28 |
AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS
|
期刊论文 |
Zhong, Hong|Huang, Liusheng|Chang, Chinchen|Cui, Jie|Yang, Wei| |
29 |
Privacy preserving density-based outlier detection
|
会议论文 |
Dai, Zaisheng|Yang, Wei|Zhu, Youwen|Huang, Liusheng| |
30 |
Efficient collusion-resisting data aggregation protocol
|
期刊论文 |
Zhu, You-Wen|Huang, Liu-Sheng|Yang, Wei|Tian, Miao-Miao| |
31 |
Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state
|
期刊论文 |
Yang, Wei|Huang, Liu-Sheng|Shi, Run-hua|Zhong, Hong| |
32 |
STBS: A statistical algorithm for steganalysis of translation-based steganography
|
会议论文 |
Hang, Liusheng|Meng, Peng|Yang, Wei|Chen, Zhili|Hu, Yuchong| |
33 |
Privacy preserving aggregate query of OLAP for accurate answers
|
期刊论文 |
Dong, Fan|Huang, Liusheng|Zhu, Youwen|Yang, Wei| |
34 |
分布式计算环境下的动态可信度评估模型
|
期刊论文 |
杨威|陈国良|黄刘生|朱友文| |
35 |
一种采用嵌套虚拟机的软件保护方案
|
期刊论文 |
黄刘生|杨明| |
36 |
Asymmetric five-party quantum state sharing of an arbitrary m-qubit state
|
期刊论文 |
Huang, L. S.|Zhong, H.|Shi, R. H.|Yang, W.| |
37 |
Incentive compatible quantum secure division
|
期刊论文 |
Yun Ye|Youwen Zhu|Wei Yang|Fang Song|Peng Meng|Liusheng Huang|Qiyan Wang| |
38 |
Quantum Two-prover Bit Commitment
|
期刊论文 |
Huang, Liusheng|Wang, Yang|Luo, Yonglong|Yang, Wei| |
39 |
Multiparty quantum secret sharing with Bell states and Bell measurements
|
期刊论文 |
Yang, Wei|Huang, Liu-sheng|Shi, Run-hua|Zhong, Hong| |
40 |
Detection of substitution-based linguistic steganography by relative frequency analysis
|
期刊论文 |
Yang, Wei|Chen, Zhili|Huang, Liusheng| |