Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Privacy-preserving association rule mining based on electronic medical systemXu, Wenju ; Zhao, Qingqing ; Zhan, Yu ; Wang, Baocang ; Hu, YupuWireless networks, 2022, Vol.28 (1), p.303-317 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
|
2 |
Material Type: Artigo
|
Improved key-recovery attacks on reduced-round WEM-8Liu, Jun ; Wang, Dachao ; Hu, Yupu ; Chen, Jie ; Wang, BaocangDesigns, codes, and cryptography, 2022, Vol.90 (10), p.2419-2448 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
|
3 |
Material Type: Artigo
|
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisitedJia, Huiwen ; Hu, Yupu ; Tang, ChunmingIET Information Security, 2022-01, Vol.16 (1), p.41-50 [Periódico revisado por pares]John Wiley & Sons, IncTexto completo disponível |
|
4 |
Material Type: Artigo
|
Improved integral cryptanalysis of SPNbox in digital rights management systemsLiu, Jun ; Wang, Dachao ; Hu, Yupu ; Chen, Jie ; Wang, BaocangIET Information Security, 2023-01, Vol.17 (1), p.147-158 [Periódico revisado por pares]John Wiley & Sons, IncTexto completo disponível |
|
5 |
Material Type: Artigo
|
Dual-Mode Encryption for UC-Secure String OT from Learning with ErrorsLiu, Momeng ; Hu, Yupu ; Lai, Qiqi ; Zhang, Shanshan ; Jia, Huiwen ; Gao, Wen ; Wang, Baocang Moradpoor, NaghmehIET information security, 2024-02, Vol.2024, p.1-16 [Periódico revisado por pares]HindawiTexto completo disponível |
|
6 |
Material Type: Artigo
|
Lattice‐based revocable attribute‐based encryption with decryption key exposure resistanceDong, Xingting ; Hu, Yupu ; Wang, Baocang ; Liu, Momeng ; Gao, WenIET Information Security, 2021-11, Vol.15 (6), p.428-441 [Periódico revisado por pares]John Wiley & Sons, IncTexto completo disponível |
|
7 |
Material Type: Artigo
|
Analysis on Aigis‐Enc: Asymmetrical and symmetricalHu, Yupu ; Dong, Siyue ; Dong, XingtingIET Information Security, 2021-03, Vol.15 (2), p.147-155 [Periódico revisado por pares]John Wiley & Sons, IncTexto completo disponível |
|
8 |
Material Type: Artigo
|
New secondary constructions of Bent functionsZhang, Fengrong ; Carlet, Claude ; Hu, Yupu ; Zhang, WenzhengApplicable algebra in engineering, communication and computing, 2016-11, Vol.27 (5), p.413-434 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
9 |
Material Type: Artigo
|
Verifier-local revocation group signatures with backward unlinkability from latticesZhang, Yanhua ; Liu, Ximeng ; Hu, Yupu ; Gan, Yong ; Jia, HuiwenFrontiers of information technology & electronic engineering, 2022-06, Vol.23 (6), p.876-892 [Periódico revisado por pares]Hangzhou: Zhejiang University PressTexto completo disponível |
|
10 |
Material Type: Artigo
|
Updatable privacy-preserving K-nearest neighbor query in location-based s-erviceWu, Songyang ; Xu, Wenju ; Hong, Zhiyong ; Duan, Pu ; Zhang, Benyu ; Hu, Yupu ; Wang, BaocangPeer-to-peer networking and applications, 2022, Vol.15 (2), p.1076-1089 [Periódico revisado por pares]New York: Springer USTexto completo disponível |