Showing 1 - 20 results of 48 for search 'Xiao-Ping Wu', query time: 0.07s
Refine Results
-
1
Efficient certificateless sequential multi-signature scheme by Yan-lin QIN, Xiao-ping WU
Published 2013-07-01
Article -
2
Efficient certificateless sequential multi-signature scheme by Yan-lin QIN, Xiao-ping WU
Published 2013-07-01
Article -
3
Unknown attack detection model based on network behavior analysis by Yi-han YU, Yu FU, Xiao-ping WU
Published 2016-06-01
Article -
4
Efficient certificateless multi-receiver anonymous signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU
Published 2016-06-01
Article -
5
Power analysis-resistant based on NCL path balance by Fang LUO, Qing-yu OU, Xiao-ping WU
Published 2013-08-01
Article -
6
Unknown attack detection model based on network behavior analysis by Yi-han YU,Yu FU,Xiao-ping WU
Published 2016-06-01
Article -
7
Leakage-resilient certificateless signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU
Published 2017-11-01
Article -
8
Leakage-resilient certificateless signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU
Published 2017-11-01
Article -
9
Power analysis-resistant based on NCL path balance by Fang LUO, Qing-yu OU, Xiao-ping WU
Published 2013-08-01
Article -
10
k-means clustering method preserving differential privacy in MapReduce framework by Hong-cheng LI, Xiao-ping WU, Yan CHEN
Published 2016-02-01
Article -
11
Efficient certificateless multi-receiver anonymous signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU
Published 2016-06-01
Article -
12
k-means clustering method preserving differential privacy in MapReduce framework by Hong-cheng LI, Xiao-ping WU, Yan CHEN
Published 2016-02-01
Article -
13
-
14
Identity authentication scheme based on identity-based encryption by Ren-ji HUANG, Xiao-ping WU, Hong-cheng LI
Published 2016-06-01
Article -
15
Traffic anomaly detection method in networks based on improved clustering algorithm by Hong-cheng LI, Xiao-ping WU, Hong-hai JIANG
Published 2015-12-01
Article -
16
Research on selective trust-path search and aggregation in distributed environment by Yan-lin QIN, Xiao-ping WU, Jian-xin GAO
Published 2012-09-01
Article -
17
Research and implement of file safe deposit box based on authentication and authorization by Xiao-ning DONG, Xiao-ping WU, Hong-cheng LI
Published 2016-05-01
Article -
18
Identity authentication scheme based on identity-based encryption by Ren-ji HUANG,Xiao-ping WU,Hong-cheng LI
Published 2016-06-01
Article -
19
Research on selective trust-path search and aggregation in distributed environment by Yan-lin QIN, Xiao-ping WU, Jian-xin GAO
Published 2012-09-01
Article -
20
Traffic anomaly detection method in networks based on improved clustering algorithm by Hong-cheng LI,Xiao-ping WU, Hong-hai JIANG
Published 2015-12-01
Article