Showing 1 - 20 results of 27 for search 'Feng TIAN', query time: 0.02s
Refine Results
-
1
Trusted cloud platform management model based onTPMalliance by Jun-feng TIAN, Fang-shu CHANG
Published 2016-02-01
Article -
2
-
3
Related-key impossible boomerang cryptanalysis on TWINE by Min XIE, Feng TIAN, Jiaqi LI
Published 2019-09-01
Article -
4
Differential fault attack on FeW by Min XIE, Jiaqi LI, Feng TIAN
Published 2020-04-01
Article -
5
Checkpoint trust evaluation method based on Markov by Jun-feng TIAN, Ya-jiao ZHANG
Published 2015-01-01
Article -
6
Multinomial subjective logic based extended trust propagation model by Jun-feng TIAN, Li-juan WU
Published 2013-05-01
Article -
7
Research on Radio Resource Management for Hierarchical Heterogeneous Wireless Network by Feng Tian, Hantao Liu, Liang Zhou
Published 2013-06-01
Article -
8
Refinements of Generalized Aczél's Inequality and Bellman's Inequality and Their Applications by Jing-Feng Tian, Shu-Yan Wang
Published 2013-01-01
Article -
9
-
10
Cloud storage scheme based on closed-box encryption by Rui-zhong DU, Shao-xuan WANG, Jun-feng TIAN
Published 2017-07-01
Article -
11
-
12
Incidence and Risk Factors of Infection After Fracture Fixation: A Multicenter Cohort Study by Baisheng Wang, Jingdong Zhang, Wenfeng Han, Xin Tang, Feng Tian
Published 2025-01-01
Article -
13
Modeling and Kinematics Simulation of a Mecanum Wheel Platform in RecurDyn by Yunwang Li, Sumei Dai, Yuwei Zheng, Feng Tian, Xucong Yan
Published 2018-01-01
Article -
14
Distributed software monitoring and trustworthiness evaluation based on checkpoints by Zhen LI, Jun-feng TIAN, Zhuo CHANG, Xiao-xue MA
Published 2016-03-01
Article -
15
-
16
Model of grid resource selection based on the trust moment by Yu-ling LIU, Rui-zhong DU, Jun-feng TIAN, Peng YUAN
Published 2012-04-01
Article -
17
-
18
-
19
-
20
Auto Coloring with Enhanced Character Registration by Jie Qiu, Hock Soon Seah, Feng Tian, Quan Chen, Zhongke Wu, Konstantin Melikhov
Published 2008-01-01
Article