Showing 1 - 6 results of 6 for search 'Chang-gen PENG', query time: 0.02s
Refine Results
-
1
Rational exchange protocol model based on mixed strategy by Hong DING, Chang-gen PENG, Qing-qing KUANG
Published 2016-03-01
Article -
2
Identity authentication scheme of Android client based on identifiers by Ya-wei WANG, Chang-gen PENG, Hong-fa DING, Kai ZHOU
Published 2017-04-01
Article -
3
Homomorphic encryption location privacy-preserving scheme based on Markov model by Kai ZHOU, Chang-gen PENG, Yi-jie ZHU, Jian-qiong HE
Published 2017-01-01
Article -
4
Edwards curves based security authentication protocol for mobile RFID systems by Yu-long YANG, Chang-gen PENG, Zhou ZHOU, Xiao-pei ZHANG
Published 2014-11-01
Article -
5
Risk access control model for Hadoop by Jia-shuai LI, Chang-gen PENG, Yi-jie ZHU, Hai-feng MA
Published 2016-01-01
Article -
6
Universally composable secure multiparty computation protocol with fairness by You-liang TIAN, Chang-gen PENG, Jian-feng MA, Hui LIN, Kai YANG
Published 2014-02-01
Article