Showing 1 - 4 results of 4 for search 'Ji-hong HAN' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Up-to-Date Database
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • Ji-hong HAN
Showing 1 - 4 results of 4 for search 'Ji-hong HAN', query time: 0.01s Refine Results
  1. 1
    SSMCI:verification mechanism for security protocols centered on the attacker

    SSMCI:verification mechanism for security protocols centered on the attacker by Wen GU, Ji-hong HAN, Lin YUAN

    Published 2017-10-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Self-adaptive bare-bones differential evolution based on bi-mutation strategy

    Self-adaptive bare-bones differential evolution based on bi-mutation strategy by Hui-yu LIU, Ji-hong HAN, Lin YUAN, Bo YU

    Published 2017-08-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    Defense policies selection method based on attack-defense signaling game model

    Defense policies selection method based on attack-defense signaling game model by Heng-wei ZHANG, Ding-kun YU, Ji-hong HAN, Jin-dong WANG, Tao LI

    Published 2016-05-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Monitoring approach for online security of cryptographic protocol

    Monitoring approach for online security of cryptographic protocol by Yu-na ZHU, Ji-hong HAN, Lin YUAN, Yu-dan FAN, Han-tuo CHEN, Wen GU

    Published 2016-06-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs