Zobrazeno 1 - 10
of 508
pro vyhledávání: '"Liu Wen-jie"'
Publikováno v:
Rock and Soil Mechanics, Vol 43, Iss 7, Pp 1791-1802 (2022)
Based on the engineering background that rock masses of underground reservoirs in mines are frequently disturbed by cyclic loads such as mine earthquake and mining stress, uniaxial compression and cyclic loading tests for sandstones with different wa
Externí odkaz:
https://doaj.org/article/c4d00e5a2ca64991982a37ed646db357
Publikováno v:
Quantum Information Processing, 2023. 22(3): p. 137
Recently, Sato et al. proposed an public verifiable blind quantum computation (BQC) protocol by inserting a third-party arbiter. However, it is not true public verifiable in a sense, because the arbiter is determined in advance and participates in th
Externí odkaz:
http://arxiv.org/abs/2310.02922
Publikováno v:
International Journal of Theoretical Physics,2023.62(7):p.138
Privacy-preserving geometric intersection (PGI) is an important issue in Secure multiparty computation (SMC). The existing quantum PGI protocols are mainly based on grid coding, which requires a lot of computational complexity. The phase-encoded quer
Externí odkaz:
http://arxiv.org/abs/2309.17293
Publikováno v:
International Journal of Theoretical Physics,2019.58(10):p.3259-3270
Privacy-preserving price e-negotiation (3PEN) is an important topic of secure multi-party computation (SMC) in the electronic commerce field, and the key point of its security is to guarantee the privacy of seller's and buyer's prices. In this study,
Externí odkaz:
http://arxiv.org/abs/2309.13668
Autor:
Liu, Wen-Jie, Li, Zi-Xian
Publikováno v:
IEEE Transactions on Circuits and Systems I: Regular Papers, 2023. 70(11): p. 4456-4469
Secure two-party scalar product (S2SP) is a promising research area within secure multiparty computation (SMC), which can solve a range of SMC problems, such as intrusion detection, data analysis, and geometric computations. However, existing quantum
Externí odkaz:
http://arxiv.org/abs/2309.15856
Publikováno v:
International Journal of Theoretical Physics, 2018. 57(1): p. 195-207
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al.(Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an impr
Externí odkaz:
http://arxiv.org/abs/2309.12719
Publikováno v:
CMC: Computers, Materials & Continua, 2019. 60(3): p. 1237-1250
Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry. As an important field, the privacy-preserving geometric intersection (PGI) problem i
Externí odkaz:
http://arxiv.org/abs/2309.12605
Publikováno v:
E3S Web of Conferences, Vol 251, p 01061 (2021)
In recent years, with the rapid development of economy, China’s labor relations are constantly changing, and the demands of workers for interests are increasing. In addition, with the outbreak of COVID-19, enterprises are facing severe challenges u
Externí odkaz:
https://doaj.org/article/c2c629b338e044b692dfba20df9c333f
Publikováno v:
E3S Web of Conferences, Vol 290, p 02028 (2021)
Exploring labor rights on the cognition of relationship with labor dispute is not only from the direct role of workers and HR, but also from the fight for labor rights of college students. However, many labor disputes in labor process are mainly rela
Externí odkaz:
https://doaj.org/article/4145b2847858470db26dc946ccb7b095
Publikováno v:
In Food Bioscience October 2024 61