Showing 1 - 20 results of 29 for search 'Hong ZHONG', query time: 0.03s
Refine Results
-
1
Role of Neutrophils in Psoriasis by Wen-Ming Wang, Hong-Zhong Jin
Published 2020-01-01
Article -
2
Identity-based incremental signature scheme from lattices by Miaomiao TIAN, Jing CHEN, Hong ZHONG
Published 2021-01-01
Article -
3
Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128 by Jie CUI, Hai-feng ZUO, Hong ZHONG
Published 2017-11-01
Article -
4
-
5
A Modified Newmark Methodology for Permanent Deformation Analysis of Rock-Fill Dams by Hongjun Li, Hong Zhong, Zuwen Yan, Jianming Zhao
Published 2018-01-01
Article -
6
-
7
-
8
RNA N6-Methyladenosine Modifications and the Immune Response by Ya-Nan Wang, Chen-Yang Yu, Hong-Zhong Jin
Published 2020-01-01
Article -
9
Efficient group signature scheme with revocation by Hong ZHONG, Cong-lin HUANG, Yan XU, Jie CUI
Published 2016-10-01
Article -
10
-
11
Privacy protection of warning message publishing protocol in VANET by Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG
Published 2021-08-01
Article -
12
-
13
Synthesis of Titanium Containing SBA-15 and Its Application for Photocatalytic Degradation of Phenol by Lili Yang, Zeyu Jiang, Sufeng Lai, Chongwen Jiang, Hong Zhong
Published 2014-01-01
Article -
14
Bus cache-based location privacy protection scheme in the Internet of vehicles by Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG
Published 2021-07-01
Article -
15
Novel and effective secret sharing scheme by Run-hua SHI, Liu-sheng HUANG, Wei YANG, Hong ZHONG
Published 2012-01-01
Article -
16
Removal of Ammonium from Aqueous Solutions Using Zeolite Synthesized from Electrolytic Manganese Residue by Changxin Li, Yuan Yu, Qingwu Zhang, Hong Zhong, Shuai Wang
Published 2020-01-01
Article -
17
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model by Yan XU, Liu-sheng HUANG, Miao-miao TIAN, Hong ZHONG
Published 2014-11-01
Article -
18
Interaction Prediction Optimization in Multidisciplinary Design Optimization Problems by Debiao Meng, Xiaoling Zhang, Hong-Zhong Huang, Zhonglai Wang, Huanwei Xu
Published 2014-01-01
Article -
19
-
20
Integrity checking protocol with identity-based proxy signature in mobile cloud computing by Li YAN, Run-hua SHI, Hong ZHONG, Jie CUI, Shun ZHANG, Yan XU
Published 2015-10-01
Article