Huang, Liu-sheng
61630  results:
Search for persons X
?
1

A Blockchain-Based Protocol for Malicious Price Discriminat..:

Xue, Li-De ; Liu, Ya-Jun ; Yang, Wei..
Journal of Computer Science and Technology.  37 (2022)  1 - p. 266-276 , 2022
 
?
2

Emerging Applications for Cyber Transportation Systems:

Wagh, Aditya ; Hou, Yunfei ; Qiao, Chunming...
Journal of Computer Science and Technology.  29 (2014)  4 - p. 562-575 , 2014
 
?
3

Quantum state sharing against the controller's cheating:

Shi, Run-hua ; Zhong, Hong ; Huang, Liu-sheng
Quantum Information Processing.  12 (2013)  8 - p. 2889-2899 , 2013
 
?
 
?
5

A novel anonymous authentication scheme without cryptograph:

Shi, Run-hua ; Zhong, Hong ; Huang, Liu-sheng
Transactions on Emerging Telecommunications Technologies.  25 (2012)  9 - p. 875-880 , 2012
 
?
6

Efficient Symmetric Five-Party Quantum State Sharing of an ..:

Shi, Run-hua ; Huang, Liu-sheng ; Yang, Wei.
International Journal of Theoretical Physics.  50 (2011)  11 - p. 3329-3336 , 2011
 
?
7

Cryptanalysis and melioration of secure quantum sealed-bid ..:

He, Li-Bao ; Huang, Liu-Sheng ; Yang, Wei..
Quantum Information Processing.  11 (2011)  6 - p. 1359-1369 , 2011
 
?
 
?
 
?
 
?
11

Multi-party quantum state sharing of an arbitrary two-qubit..:

Shi, Run-hua ; Huang, Liu-sheng ; Yang, Wei.
Quantum Information Processing.  10 (2010)  2 - p. 231-239 , 2010
 
?
12

Leapfrog: Optimal Opportunistic Routing in Probabilisticall..:

Xiao, Ming-Jun ; Huang, Liu-Sheng ; Dong, Qun-Feng..
Journal of Computer Science and Technology.  24 (2009)  5 - p. 975-986 , 2009
 
?
13

Constraints-Aware Scheduling for Transactional Services Com..:

Liu, An ; Liu, Hai ; Li, Qing..
Journal of Computer Science and Technology.  24 (2009)  4 - p. 638-651 , 2009
 
?
14

Effective Linguistic Steganography Detection:

, In: 2008 IEEE 8th International Conference on Computer and Information Technology Workshops,
 
?
15

Secure Two-Party Point-Circle Inclusion Problem:

Luo, Yong-Long ; Huang, Liu-Sheng ; Zhong, Hong
Journal of Computer Science and Technology.  22 (2007)  1 - p. 88-91 , 2007
 
1-15