Searched for: %2520
(1 - 5 of 5)
document
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)
Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...
journal article 2023
document
Chang, Z. (author), Liang, M. (author), He, S. (author), Schlangen, E. (author), Šavija, B. (author)
We propose a new numerical method to analyze the early-age creep of 3D printed segments with the consideration of stress history. The integral creep strain evaluation formula is first expressed in a summation form using superposition principle. The experimentally derived creep compliance surface is then employed to calculate the creep strain...
journal article 2023
document
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...
conference paper 2022
document
Liang, F. (author), Brunelli, Matteo (author), Rezaei, J. (author)
This study aims to develop a Multi-Attribute Decision-Making (MADM) method, the Best-Worst Tradeoff method, which draws on the underlying principles of two popular MADM methods (the Best-Worst Method (BWM) and the Tradeoff). The traditional Tradeoff procedure, which is based on the axiomatic foundation of multi-attribute value theory, considers...
journal article 2022
document
Liang, C.-C. (author)
journal article 2003
Searched for: %2520
(1 - 5 of 5)