Showing 1 - 20 results of 32 for search 'Jun-Wei Zhang', query time: 0.06s
Refine Results
-
1
-
2
-
3
Improved direct anonymous attestation scheme for mobile computing platforms by Li YANG, Jun-wei ZHANG, Jian-feng MA, Zhi-hong LIU
Published 2013-06-01
Article -
4
Improved direct anonymous attestation scheme for mobile computing platforms by Li YANG, Jun-wei ZHANG, Jian-feng MA, Zhi-hong LIU
Published 2013-06-01
Article -
5
Routing metric based on interference measurement for multi-radio multi-channel wireless mesh networks by Wen-jiang JI, Jian-feng MA, Jun-wei ZHANG, Zhuo MA
Published 2013-04-01
Article -
6
-
7
Routing metric based on interference measurement for multi-radio multi-channel wireless mesh networks by Wen-jiang JI, Jian-feng MA, Jun-wei ZHANG, Zhuo MA
Published 2013-04-01
Article -
8
Multi-authority attribute-based encryption with efficient revocation by Kai ZHANG, Jian-feng MA, Hui LI, Jun-wei ZHANG, Tao ZHANG
Published 2017-03-01
Article -
9
Multi-authority attribute-based encryption with efficient revocation by Kai ZHANG, Jian-feng MA, Hui LI, Jun-wei ZHANG, Tao ZHANG
Published 2017-03-01
Article -
10
-
11
-
12
-
13
-
14
Multi-owner accredited keyword search over encrypted data by Qi-ying WU, Jian-feng MA, Yin-bin MIAO, Jun-wei ZHANG, Li-min SHEN
Published 2017-11-01
Article -
15
Multi-owner accredited keyword search over encrypted data by Qi-ying WU, Jian-feng MA, Yin-bin MIAO, Jun-wei ZHANG, Li-min SHEN
Published 2017-11-01
Article -
16
Multi-keyword search over encrypted data with user revocation by Qi-ying WU, Jian-feng MA, Hui LI, Jun-wei ZHANG, Qi JIANG, Yin-bin MIAO
Published 2017-08-01
Article -
17
-
18
Multi-keyword search over encrypted data with user revocation by Qi-ying WU, Jian-feng MA, Hui LI, Jun-wei ZHANG, Qi JIANG, Yin-bin MIAO
Published 2017-08-01
Article -
19
-
20