Huang, Liu-Sheng
67161  Ergebnisse:
Personensuche X
?
1

A Blockchain-Based Protocol for Malicious Price Discriminat..:

Xue, Li-De ; Liu, Ya-Jun ; Yang, Wei..
Journal of Computer Science and Technology.  37 (2022)  1 - p. 266-276 , 2022
 
?
2

Emerging Applications for Cyber Transportation Systems:

Wagh, Aditya ; Hou, Yunfei ; Qiao, Chunming...
Journal of Computer Science and Technology.  29 (2014)  4 - p. 562-575 , 2014
 
?
3

Quantum state sharing against the controller's cheating:

Shi, Run-hua ; Zhong, Hong ; Huang, Liu-sheng
Quantum Information Processing.  12 (2013)  8 - p. 2889-2899 , 2013
 
?
 
?
 
?
7

Cryptanalysis and melioration of secure quantum sealed-bid ..:

He, Li-Bao ; Huang, Liu-Sheng ; Yang, Wei..
Quantum Information Processing.  11 (2011)  6 - p. 1359-1369 , 2011
 
?
8

Efficient Symmetric Five-Party Quantum State Sharing of an ..:

Shi, Run-hua ; Huang, Liu-sheng ; Yang, Wei.
International Journal of Theoretical Physics.  50 (2011)  11 - p. 3329-3336 , 2011
 
?
 
?
 
?
11

Asymmetric multi-party quantum state sharing of an arbitrar..:

Shi, Run-hua ; Huang, Liu-sheng ; Yang, Wei.
Quantum Information Processing.  10 (2010)  1 - p. 53-61 , 2010
 
?
12

Multi-party quantum state sharing of an arbitrary two-qubit..:

Shi, Run-hua ; Huang, Liu-sheng ; Yang, Wei.
Quantum Information Processing.  10 (2010)  2 - p. 231-239 , 2010
 
?
13

Leapfrog: Optimal Opportunistic Routing in Probabilisticall..:

Xiao, Ming-Jun ; Huang, Liu-Sheng ; Dong, Qun-Feng..
Journal of Computer Science and Technology.  24 (2009)  5 - p. 975-986 , 2009
 
?
14

Constraints-Aware Scheduling for Transactional Services Com..:

Liu, An ; Liu, Hai ; Li, Qing..
Journal of Computer Science and Technology.  24 (2009)  4 - p. 638-651 , 2009
 
?
15

Effective Linguistic Steganography Detection:

, In: 2008 IEEE 8th International Conference on Computer and Information Technology Workshops,
 
1-15