UM

Browse/Search Results:  1-10 of 10 Help

Selected(0)Clear Items/Page:    Sort:
Accounting conservatism and common ownership by dedicated institutional blockholders Journal article
Cheng, C.S. Agnes, Li, Xiaohui, Xie, Jing, Zhong, Yuxiang. Accounting conservatism and common ownership by dedicated institutional blockholders[J]. Journal of Business Finance & Accounting, 2023, 50(9-10), 1943 - 1983.
Authors:  Cheng, C.S. Agnes;  Li, Xiaohui;  Xie, Jing;  Zhong, Yuxiang
Favorite | TC[WOS]:3 TC[Scopus]:2  IF:2.2/3.0 | Submit date:2023/08/29
Accounting Conservatism  Blockholders  Common Ownership  Dedicated Investors  Peer Effect  Proxy Voting  Shareholder Activism  
Individuals with high obsessive-compulsive tendencies or undermined confidence rely more on external proxies to access their internal states Journal article
Zhang, Zhongming, Wang, Mengyun, Miao, Xiaocui, Li, Yijuan, Hitchman, Glenn, Yuan, Zhen. Individuals with high obsessive-compulsive tendencies or undermined confidence rely more on external proxies to access their internal states[J]. JOURNAL OF BEHAVIOR THERAPY AND EXPERIMENTAL PSYCHIATRY, 2017, 54, 263-269.
Authors:  Zhang, Zhongming;  Wang, Mengyun;  Miao, Xiaocui;  Li, Yijuan;  Hitchman, Glenn; et al.
Favorite | TC[WOS]:11 TC[Scopus]:12  IF:1.7/2.0 | Submit date:2018/10/30
Obsessive-compulsive Tendencies  Undermined Confidence  Reliance  Proxy  Self-perception Effect  
Secure and efficient multi-proxy signature scheme in the standard model Journal article
Gu K., Jia W., Deng Y., Nie X.. Secure and efficient multi-proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2016, 25(1), 93-99.
Authors:  Gu K.;  Jia W.;  Deng Y.;  Nie X.
Favorite | TC[WOS]:4 TC[Scopus]:4 | Submit date:2019/02/11
Computational Diffie-hellman (Cdh) Assumption  Efficiency  Multi-proxy Signature  Provable Security  
Secure and efficient proxy signature scheme in the standard model Journal article
Gu K., Jia W., Chen R., Liu X.. Secure and efficient proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2013, 22(4), 666-670.
Authors:  Gu K.;  Jia W.;  Chen R.;  Liu X.
Favorite |  | Submit date:2019/02/11
Computational diffle-hellman (cdh) assumption  Efficiency  Provable security  Proxy signature  Security model  
Identity-based group proxy signature scheme in the standard model Journal article
Gu K., Jia W., Li C., Chen R.. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite |  | Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Proxy signature in the standard model: constructing security model and proving security Journal article
Gu K., Jia W.-J., Wang S.-C., Shi L.-W.. Proxy signature in the standard model: constructing security model and proving security[J]. Ruan Jian Xue Bao/Journal of Software, 2012, 23(9), 2416-2429.
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite | TC[Scopus]:2 | Submit date:2019/02/11
Cdhp  Identity  Provable Security  Proxy Signature  
A group proxy signature scheme based on sub-secret evolution Journal article
Gu K., Jia W., Jiang C.. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5), 962-973.
Authors:  Gu K.;  Jia W.;  Jiang C.
Favorite |  | Submit date:2019/02/11
CDHP  Cellular automata  Provable security  Proxy signature  Sub-secret evolution  
An anonymous wireless authentication protocol based on proxy signature Journal article
Jiang C., Jia W., Gu K.. An anonymous wireless authentication protocol based on proxy signature[J]. Journal of Computational Information Systems, 2012, 8(2), 541-548.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite |  | Submit date:2019/02/11
Anonymity  Authentication  Key exchange  Proxy signature  
A group proxy signature scheme based on key matrix Journal article
Gu K., Jia W.-J., Jiang C.-L.. A group proxy signature scheme based on key matrix[J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011, 43(4), 108-115.
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite |  | Submit date:2019/02/11
Bilinear transformation  CDHP  Key matrix  Proxy signature  
Accelerating ray-tracing using proxy polygons Journal article
Huang P.-J., Wang W.-C., Yang G., Wu E.-H.. Accelerating ray-tracing using proxy polygons[J]. Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30(2), 262-271.
Authors:  Huang P.-J.;  Wang W.-C.;  Yang G.;  Wu E.-H.
Favorite |  | Submit date:2019/02/13
Dynamic scene  Graphics Processing Units (GPU)  Pre-computation  Proxy  Ray tracing