Showing 1 - 8 results of 8 for search 'Jinxia Yu', query time: 0.03s
Refine Results
-
1
-
2
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden by Jinxia Yu, Guanghui He, Xixi Yan, Yongli Tang, Rongxia Qin
Published 2020-05-01Get full text
Article -
3
Password-based three-party authenticated key exchange protocol from lattices by Jinxia YU, Huanhuan LIAN, Yongli TANG, Mengyao SHI, Zongqu ZHAO
Published 2018-11-01Get full text
Article -
4
Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG
Published 2020-04-01Get full text
Article -
5
Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG
Published 2020-04-01Get full text
Article -
6
-
7
-
8
Semi-elemental versus polymeric formula for enteral nutrition in critically ill patients: a secondary analysis of a multicenter cluster-randomized controlled trial by Wei Wei, Wen Lu, Guofeng Chen, Jindan Gao, Jun Zhang, Defeng Zhang, Ruiqin He, Jingjing Huang, Rong Cai, Rongrong Yuan, Xun Wang, Jinxia Yu, Zilong Li, Lu Ke, Lin Gao, Zhengquan Wang
Published 2025-07-01Get full text
Article