- document
-
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...journal article 2023
- document
-
Lattice modelling of early-age creep of 3D printed segments with the consideration of stress historyChang, Z. (author), Liang, M. (author), He, S. (author), Schlangen, E. (author), Šavija, B. (author)We propose a new numerical method to analyze the early-age creep of 3D printed segments with the consideration of stress history. The integral creep strain evaluation formula is first expressed in a summation form using superposition principle. The experimentally derived creep compliance surface is then employed to calculate the creep strain...journal article 2023
- document
-
Wang, Xingkai (author), Cao, Zhenfu (author), LIU, Z. (author), Liang, K. (author)Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over their private inputs to an untrusted server. They introduced the universally composable (UC) security of MVC and proposed a scheme...conference paper 2022
- document
-
Liang, F. (author), Brunelli, Matteo (author), Rezaei, J. (author)This study aims to develop a Multi-Attribute Decision-Making (MADM) method, the Best-Worst Tradeoff method, which draws on the underlying principles of two popular MADM methods (the Best-Worst Method (BWM) and the Tradeoff). The traditional Tradeoff procedure, which is based on the axiomatic foundation of multi-attribute value theory, considers...journal article 2022
- document
- Liang, C.-C. (author) journal article 2003