Skip to main content

and
  1. No Access

    Article

    A Novel E-payment Protocol Implented by Blockchain and Quantum Signature

    Based on blockchain and quantum signature, a novel E-payment protocol is proposed in this paper. Our E-payment protocol could protect user’s anonymity as the traditional E-payment systems do, and also have unc...

    Jia-Lei Zhang, Ming-Sheng Hu, Zhi-Juan Jia in International Journal of Theoretical Physi… (2019)

  2. No Access

    Chapter and Conference Paper

    A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing

    The basic idea of quantum secret sharing is to share classical information through qu...

    Jia-lei Zhang, Ming-sheng Hu, Bei Gong in Security and Privacy in New Computing Envi… (2019)

  3. No Access

    Chapter and Conference Paper

    A New Signcryption Scheme Based on Elliptic Curves

    Based on the intractable problem of discrete logarithm in ECC and the intractability of reversing a one-way hash function, this paper presents a signcryption scheme with public verifiability and forward securi...

    Wen-jun Cui, Zhi-juan Jia, Ming-sheng Hu in Security and Privacy in New Computing Envi… (2019)

  4. No Access

    Chapter and Conference Paper

    Community Detection Method of Complex Network Based on ACO Pheromone of TSP

    Community detection method of complex network with a combination of TSP model and ant colony optimization is proposed in this paper. The topology relationship of network node is transformed into distance, thus...

    Si Liu, Cong Feng, Ming-Sheng Hu, Zhi-Juan Jia in Intelligent Computing Methodologies (2014)

  5. No Access

    Chapter and Conference Paper

    Cascading Failures in Power Grid under Three Node Attack Strategies

    This paper studies cascading failures of power grid under three node attack strategies based on the local preferential redistribution rule of the broken node’s load. The initial load of a node with degree k is k ...

    Sui-Min Jia, Yun-Ye Wang, Cong Feng, Zhi-Juan Jia in Intelligent Computing Methodologies (2014)

  6. No Access

    Chapter and Conference Paper

    Complex Network Construction Method of Disaster Regional Association Based on Optimized Compressive Sensing

    Iming at the disaster regional association issues, a complex network construction method of disaster regional association based on compressive sensing is proposed in this paper. The disaster system dynamic equ...

    Si Liu, Cong Feng, Zhi-Juan Jia, Ming-Sheng Hu in Intelligent Computing Methodologies (2014)

  7. No Access

    Chapter and Conference Paper

    Dynamical Distribution of Capacities Strategy for Suppressing Cascading Failure in Power Grid

    This paper studies the suppressing effect of Dynamical distribution of capacities (DDC) strategy in cascading failure of power grid. This strategy is proposed based on load characteristics and transmission met...

    Zhi-Juan Jia, Yu Zhang, Cong Feng, Ming-Sheng Hu in Intelligent Computing Methodologies (2014)

  8. No Access

    Article

    A Model for Liquid Slug Length Distribution in Vertical Gas-Liquid Slug Flow

    The slug length and the trailing Taylor bubble velocity in an upward vertical slug flow were measured by using the optical probes and the EKTAPRO 1000 high speed motion analyzer. The correlation between the tr...

    Guo-dong **a, Zhen-zhen Cui, Qing Liu, Fang-de Zhou in Journal of Hydrodynamics (2009)