I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Jia, Huiwen
207
results:
Articles (Online) X
Search for persons
X
Sorted by: Relevance
Sorted by: Year
?
1
Online Learning and Pricing for Service Systems with Reusab..:
Jia, Huiwen
;
Shi, Cong
;
Shen, Siqian
Operations Research. 72 (2024) 3 - p. 1203-1241 , 2024
Link:
https://doi.org/10.1287/..
?
2
On Accuracy of Testing Decryption Failure Rate for Encrypti..:
Wang, Lin
;
Wang, Yang
;
Jia, Huiwen
.
IET Information Security. 2024 (2024) - p. 1-20 , 2024
Link:
https://doi.org/10.1049/..
?
3
Dual-Mode Encryption for UC-Secure String OT from Learning ..:
Liu, Momeng
;
Hu, Yupu
;
Lai, Qiqi
...
IET Information Security. 2024 (2024) - p. 1-16 , 2024
Link:
https://doi.org/10.1049/..
?
4
Microscopic features and untargeted metabolomics reveal spe..:
Li, Zhi
;
Yang, Rui
;
Yang, Xiaorui
..
Journal of Wood Chemistry and Technology. 43 (2023) 5 - p. 243-252 , 2023
Link:
https://doi.org/10.1080/..
?
5
All-natural bioinspired nanolignocellulose-derived bulk eng..:
Yang, Yushan
;
Li, Jun
;
Shan, Liang
...
Cellulose. 30 (2022) 2 - p. 871-884 , 2022
Link:
https://doi.org/10.1007/..
?
6
A shared-mobility-based framework for evacuation planning a..:
Moug, Kati
;
Jia, Huiwen
;
Shen, Siqian
IISE Transactions. 55 (2022) 10 - p. 971-984 , 2022
Link:
https://doi.org/10.1080/..
?
7
Verifier-local revocation group signatures with backward un..:
Zhang, Yanhua
;
Liu, Ximeng
;
Hu, Yupu
..
Frontiers of Information Technology & Electronic Engineering. 23 (2022) 6 - p. 876-892 , 2022
Link:
https://doi.org/10.1631/..
?
8
Toughening of high-strength scalable laminated nanocomposit..:
Yang, Yushan
;
Li, Jun
;
Shan, Liang
...
Industrial Crops and Products. 189 (2022) - p. 115780 , 2022
Link:
https://doi.org/10.1016/..
?
9
An Improved Group Signature Scheme with VLR over Lattices:
Zhang, Yanhua
;
Liu, Ximeng
;
Hu, Yupu
...
Security and Communication Networks. 2021 (2021) - p. 1-10 , 2021
Link:
https://doi.org/10.1155/..
?
10
Lattice-Based Logarithmic-Size Non-Interactive Deniable Rin..:
Jia, Huiwen
;
Tang, Chunming
;
Zhang, Yanhua
Entropy. 23 (2021) 8 - p. 980 , 2021
Link:
https://doi.org/10.3390/..
?
11
Integrated renal metabolomic and metallomic profiling revea..:
Jia, Huiwen
;
Yuan, Xuemei
;
Liu, Shuo
...
Journal of Pharmaceutical and Biomedical Analysis. 193 (2021) - p. 113705 , 2021
Link:
https://doi.org/10.1016/..
?
12
Lattice‐based hash‐and‐sign signatures using approximate tr..:
Jia, Huiwen
;
Hu, Yupu
;
Tang, Chunming
IET Information Security. 16 (2021) 1 - p. 41-50 , 2021
Link:
https://doi.org/10.1049/..
?
13
Multi-armed bandit with sub-exponential rewards:
Jia, Huiwen
;
Shi, Cong
;
Shen, Siqian
Operations Research Letters. 49 (2021) 5 - p. 728-733 , 2021
Link:
https://doi.org/10.1016/..
?
14
Scenario Grouping and Decomposition Algorithms for Chance-C..:
Deng, Yan
;
Jia, Huiwen
;
Ahmed, Shabbir
..
INFORMS Journal on Computing. , 2020
Link:
https://doi.org/10.1287/..
?
15
Cryptanalysis of a non-interactive deniable ring signature ..:
Jia, Huiwen
;
Tang, Chunming
International Journal of Information Security. 20 (2020) 1 - p. 103-112 , 2020
Link:
https://doi.org/10.1007/..
1-15