暂无分享,去创建一个
Wenjie Liu | Hanwu Chen | Zhihao Liu | Maojun Zhang | Peipei Gao | Wenjie Liu | Peipei Gao | Zhihao Liu | Hanwu Chen | Maojun Zhang
[1] Yu-Zhong Zhang,et al. On-Line Scheduling on Parallel Machines to Minimize the Makespan , 2016, J. Syst. Sci. Complex..
[2] Lukasz Olejnik,et al. Secure quantum private information retrieval using phase-encoded queries , 2011 .
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Xuyun Zhang,et al. Privacy-Aware Data Publishing and Integration for Collaborative Service Recommendation , 2018, IEEE Access.
[5] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[6] Jiguo Yu,et al. Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment , 2017, Complex..
[7] Chaman Singh,et al. Database Management System as a Cloud Service , 2017 .
[8] Alfons Kemper,et al. Database as a Service , 2011, Datenbank-Spektrum.
[9] Preskill,et al. Efficient networks for quantum factoring. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[10] Yong Xu,et al. Multiparty quantum sealed-bid auction using single photons as message carrier , 2016, Quantum Inf. Process..
[11] Xuyun Zhang,et al. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.
[12] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[13] Wenjie Liu,et al. Full-Blind Delegating Private Quantum Computation , 2020, ArXiv.
[14] Xuyun Zhang,et al. An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment , 2018, Sensors.
[15] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[16] Wenjie Liu,et al. A Unitary Weights Based One-Iteration Quantum Perceptron Algorithm for Non-Ideal Training Sets , 2019, IEEE Access.
[17] Chao Liu,et al. Improved Deterministic N-To-One Joint Remote Preparation of an Arbitrary Qubit via EPR Pairs , 2014, 1405.6453.
[18] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[19] Lov K. Grover. Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.
[20] Gene Tsudik,et al. Privacy-Preserving Cloud Database Querying , 2011, J. Internet Serv. Inf. Secur..
[21] S. Gudder. Review: A. S. Holevo, Probabilistic and statistical aspects of quantum theory , 1985 .
[22] Ching-Nung Yang,et al. Quantum Relief algorithm , 2018, Quantum Information Processing.
[23] Xu An Wang,et al. Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage , 2016, Comput. Electr. Eng..
[24] Sunguk Lee,et al. Database Management System as a Cloud Service , 2012 .
[25] R. Mousoli,et al. Controlled cyclic remote state preparation of arbitrary qubit states , 2018 .
[26] Jing Zhao,et al. Methods for Solving Generalized Nash Equilibrium , 2013, J. Appl. Math..
[27] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[28] Christoph Simon,et al. Practical private database queries based on a quantum-key-distribution protocol , 2010, 1002.4360.
[29] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[30] Seth Lloyd,et al. Quantum private queries. , 2007, Physical review letters.
[31] Ching-Nung Yang,et al. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States , 2018 .
[32] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[33] Wenjie Liu,et al. Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation , 2017 .
[34] Naihua Xiu,et al. Some projection-like methods for the generalized Nash equilibria , 2010, Comput. Optim. Appl..
[35] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[36] Gang Xu,et al. Rational Non-Hierarchical Quantum State Sharing Protocol , 2019 .
[37] Yiwei Thomas Hou,et al. Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[38] Juan Xu,et al. Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol , 2018 .
[39] Shujun Lian,et al. Smoothing of the lower-order exact penalty function for inequality constrained optimization , 2016 .
[40] Chen Hanwu,et al. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication , 2009 .
[41] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[42] Zhiguo Qu,et al. A Novel Quantum Stegonagraphy Based on Brown States , 2018 .
[43] Lianyong Qi,et al. Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..
[44] Cheng Ma,et al. A new class of exact penalty functions and penalty algorithms , 2014, J. Glob. Optim..
[45] Hui Chen,et al. Flexible quantum private queries based on quantum key distribution. , 2011, Optics express.
[46] M. V. Panduranga Rao,et al. Towards communication-efficient quantum oblivious key distribution , 2012, 1208.2501.
[47] Xu An Wang,et al. Reusable garbled gates for new fully homomorphic encryption service , 2017, Int. J. Web Grid Serv..
[48] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[49] Wang Xiaojun,et al. Attacks and Improvement of Quantum Sealed-Bid Auction with EPR Pairs , 2014 .
[50] Xiaoqing Tan,et al. Perfect Quantum Teleportation via Bell States , 2018 .
[51] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[52] Xu An Wang,et al. Cost-effective secure E-health cloud system using identity based cryptographic techniques , 2017, Future Gener. Comput. Syst..