Skip to main content

and
  1. No Access

    Article

    A Novel E-payment Protocol Implented by Blockchain and Quantum Signature

    Based on blockchain and quantum signature, a novel E-payment protocol is proposed in this paper. Our E-payment protocol could protect user’s anonymity as the traditional E-payment systems do, and also have unc...

    Jia-Lei Zhang, Ming-Sheng Hu, Zhi-Juan Jia in International Journal of Theoretical Physi… (2019)

  2. No Access

    Chapter and Conference Paper

    A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing

    The basic idea of quantum secret sharing is to share classical information through qu...

    Jia-lei Zhang, Ming-sheng Hu, Bei Gong in Security and Privacy in New Computing Envi… (2019)

  3. No Access

    Chapter and Conference Paper

    A New Signcryption Scheme Based on Elliptic Curves

    Based on the intractable problem of discrete logarithm in ECC and the intractability of reversing a one-way hash function, this paper presents a signcryption scheme with public verifiability and forward securi...

    Wen-jun Cui, Zhi-juan Jia, Ming-sheng Hu in Security and Privacy in New Computing Envi… (2019)

  4. No Access

    Chapter and Conference Paper

    Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem

    The traditional cryptosystem is based on the security of private key. While the private key is leaked, the signature information may be exposed. Based on this, a threshold signature scheme with strong forward...

    Ya-ge Cheng, Zhi-juan Jia, Bei Gong in Security and Privacy in New Computing Envi… (2019)

  5. No Access

    Chapter and Conference Paper

    An Epidemic Propagation Model with Saturated Infection Rate on a Small World Network

    An SIRS model with constant immigration of susceptible and saturated infection rate is established according to the propagation of the infectious viruses in a small world network. By using the mean-field theor...

    Qiao-ling Chen, Liang Chen, Zhi-Qiang Sun in Advanced Intelligent Computing Theories an… (2015)

  6. No Access

    Chapter and Conference Paper

    Community Detection Method of Complex Network Based on ACO Pheromone of TSP

    Community detection method of complex network with a combination of TSP model and ant colony optimization is proposed in this paper. The topology relationship of network node is transformed into distance, thus...

    Si Liu, Cong Feng, Ming-Sheng Hu, Zhi-Juan Jia in Intelligent Computing Methodologies (2014)

  7. No Access

    Chapter and Conference Paper

    Cascading Failures in Power Grid under Three Node Attack Strategies

    This paper studies cascading failures of power grid under three node attack strategies based on the local preferential redistribution rule of the broken node’s load. The initial load of a node with degree k is k ...

    Sui-Min Jia, Yun-Ye Wang, Cong Feng, Zhi-Juan Jia in Intelligent Computing Methodologies (2014)

  8. No Access

    Chapter and Conference Paper

    Complex Network Construction Method of Disaster Regional Association Based on Optimized Compressive Sensing

    Iming at the disaster regional association issues, a complex network construction method of disaster regional association based on compressive sensing is proposed in this paper. The disaster system dynamic equ...

    Si Liu, Cong Feng, Zhi-Juan Jia, Ming-Sheng Hu in Intelligent Computing Methodologies (2014)

  9. No Access

    Chapter and Conference Paper

    Dynamical Distribution of Capacities Strategy for Suppressing Cascading Failure in Power Grid

    This paper studies the suppressing effect of Dynamical distribution of capacities (DDC) strategy in cascading failure of power grid. This strategy is proposed based on load characteristics and transmission met...

    Zhi-Juan Jia, Yu Zhang, Cong Feng, Ming-Sheng Hu in Intelligent Computing Methodologies (2014)