Showing 1 - 14 results of 14 for search 'Feng-hua LI', query time: 0.02s
Refine Results
-
1
Representation model of structured document for multilevel security by Mang SU, Feng-hua LI, Guo-zhen SHI, Li LI
Published 2012-09-01Get full text
Article -
2
Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG
Published 2017-12-01Get full text
Article -
3
Research on scenario-based mechanism in privacy-aware mobile networks by Ben NIU, Feng-hua LI, Jia-feng HUA, Yuan-yuan HE
Published 2015-12-01Get full text
Article -
4
Network isolation communication scheme to resist against covert channel by Feng-hua LI, Miao-miao TAN, Kai FAN, Kui GENG, Fu ZHAO
Published 2014-11-01Get full text
Article -
5
Privacy computing:concept, connotation and its research trend by Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG
Published 2016-04-01Get full text
Article -
6
Provable data possession scheme with authentication by Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN
Published 2016-10-01Get full text
Article -
7
Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG
Published 2016-08-01Get full text
Article -
8
-
9
Novel cyberspace-oriented access control model by Feng-hua LI, Yan-chao WANG, Li-hua YIN, Rong-na XIE, Jin-bo XIONG
Published 2016-05-01Get full text
Article -
10
Stochastic job stream scheduling method for cipher chip with multi-cryptography by Li LI, Guo-zhen SHI, Kui GENG, Xiu-ze DONG, Xuan WANG, Feng-hua LI
Published 2016-12-01Get full text
Article -
11
Efficient scheme for user's trajectory privacy by Feng-hua LI, Cui ZHANG, Ben NIU, Hui LI, Jia-feng HUA, Guo-zhen SHI
Published 2015-12-01Get full text
Article -
12
Bloom filter-based lightweight private matching scheme by Sheng WAN, Yuan-yuan HE, Feng-hua LI, Ben NIU, Hui LI, Xin-yu WANG
Published 2015-12-01Get full text
Article -
13
Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO
Published 2016-08-01Get full text
Article -
14
Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO
Published 2016-08-01Get full text
Article