Showing 1 - 20 results of 37 for search 'Feng Hua', query time: 0.02s
Refine Results
-
1
Development trends of the information technology and cyberspace security by Feng-hua LI
Published 2015-12-01
Article -
2
Research on scenario-based mechanism in privacy-aware mobile networks by Ben NIU, Feng-hua LI, Jia-feng HUA, Yuan-yuan HE
Published 2015-12-01
Article -
3
Research on privacy protection in the process of information exchange by Jia-feng HUA, Feng-hua LI, Yun-chuan GUO, Kui GENG, Ben NIU
Published 2016-03-01
Article -
4
Achieving efficient location privacy protection based on cache by Lu-lu LI, Jia-feng HUA, Sheng WAN, Hui ZHU, Feng-hua LI
Published 2017-06-01
Article -
5
Efficient scheme for user's trajectory privacy by Feng-hua LI, Cui ZHANG, Ben NIU, Hui LI, Jia-feng HUA, Guo-zhen SHI
Published 2015-12-01
Article -
6
Approach to dysmenorrhoea in primary care by Olivia Feng Hua Ho, Susan Logan, Ying Xian Chua
Published 2023-03-01
Article -
7
Analysis of Evolution Trend of Pearl River Estuary in the Past 30 Years by YU Feng-hua, YU Shun-chao, DING Xiao-ying
Published 2011-01-01
Article -
8
New Technologies in Pearl River Basin Flood Control Planning by SHEN Han-kun, CHEN Xiao-dong, YU Feng-hua
Published 2007-01-01
Article -
9
Representation model of structured document for multilevel security by Mang SU, Feng-hua LI, Guo-zhen SHI, Li LI
Published 2012-09-01
Article -
10
Research progress of access control model and policy in online social networks by Tian-zhu CHEN, Yun-chuan GUO, Ben NIU, Feng-hua LI
Published 2016-08-01
Article -
11
-
12
Universally composable oblivious transfer protocol based on VSPH by LI Feng-hua1, FENG Tao1, MA Jian-feng1
Published 2007-01-01
Article -
13
Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG
Published 2017-12-01
Article -
14
Research progress on location privacy-preserving techniques by Sheng WAN, Feng-hua LI, Ben NIU, Zhe SUN, Hui LI
Published 2016-12-01
Article -
15
Sufficient Conditions for Non-Bazilevič Functions by Qun-Fa Cui, Zhi-Gang Wang, Xiao-Hong Chen, Feng-Hua Wen
Published 2013-01-01
Article -
16
Network isolation communication scheme to resist against covert channel by Feng-hua LI, Miao-miao TAN, Kai FAN, Kui GENG, Fu ZHAO
Published 2014-11-01
Article -
17
Privacy computing:concept, connotation and its research trend by Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG
Published 2016-04-01
Article -
18
Provable data possession scheme with authentication by Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN
Published 2016-10-01
Article -
19
-
20
Review of semantic-based privacy-preserving approaches in LBS by Ming-jie MA, Yue-jin DU, Feng-hua LI, IUJia-wen L
Published 2016-12-01
Article