Feng

Results: 1237



#Item
1Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Computational hardness assumption / Digital signature / Entropy / XTR

Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung1, , Feng-Hao Liu2, , Chi-Jen Lu3 , and Bo-Yin Yang3 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:37
2Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2012-04-04 23:26:12
3Reference / Information science / Mathematical analysis / Google Search / PageRank / Reputation management / Search engine optimization / Knowledge / Citation network / Citation / Cai Gao / Pi

PNCOIRank: Evaluating the Impact of Scholarly Articles with Positive and Negative Citations Xiaomei Bai, Jun Zhang, Hai Cui, Zhaolong Ning and Feng Xia School of Software, Dalian University of Technology, Dalian,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 01:00:13
4

Voting with Their Feet: Inferring User Preferences from App Management Activities Huoran Li1 , Wei Ai2 , ‡ Xuanzhe Liu1 , Jian Tang3 , ‡ Gang Huang1 , Feng Feng4 , ‡ Qiaozhu Mei2 1 Key Lab of High-Confidence Softw

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 01:13:59
    5

    Dynamic Synthesis for Relaxed Memory Models Feng Liu Nayden Nedev Nedyalko Prisadnikov

    Add to Reading List

    Source URL: practicalsynthesis.github.io

    Language: English - Date: 2018-01-15 09:26:26
      6Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

      Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-24 15:44:20
      7Cryptography / Mathematics / Polynomials / Multivariate cryptography / Algebra / Pseudorandom number generator / Computer algebra / Hidden Field Equations / QUAD / Field extension / Cryptographically secure pseudorandom number generator / Mersenne Twister

      Secure PRNGs from Specialized Polynomial Maps over Any Fq Feng-Hao Liu1 , Chi-Jen Lu2 , and Bo-Yin Yang2 1 Department of Computer Science, Brown University, Providence RI, USA

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2012-03-10 01:26:44
      8Economy / Money / Finance / Mobile payments / Payment systems / ISO standards / Mobile telecommunications / Online payments / Near-field communication / EMV / Apple Pay / Payment terminal

      Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom {m.mehrnezh

      Add to Reading List

      Source URL: homepages.cs.ncl.ac.uk

      Language: English - Date: 2015-09-24 14:01:42
      9Microeconomics / Economy / Avionics / Robotics / Unmanned aerial vehicle / Wireless / Pareto efficiency / Workload / Business

      Controller Synthesis for Autonomous Systems Interacting with Human Operators ∗ Lu Feng Clemens Wiltsche

      Add to Reading List

      Source URL: www.prismmodelchecker.org

      Language: English - Date: 2015-05-16 17:33:04
      10

      Compositional Verification of Probabilistic Systems using Learning Lu Feng, Marta Kwiatkowska, David Parker Oxford University Computing Laboratory, Parks Road, Oxford, OX1 3QD Email: {lu.feng, marta.kwiatkowska, david.pa

      Add to Reading List

      Source URL: qav.comlab.ox.ac.uk

      Language: English - Date: 2010-08-20 07:50:57
        UPDATE