Showing 1 - 4 results of 4 for search 'Ji-hong HAN', query time: 0.01s
Refine Results
-
1
SSMCI:verification mechanism for security protocols centered on the attacker by Wen GU, Ji-hong HAN, Lin YUAN
Published 2017-10-01
Article -
2
Self-adaptive bare-bones differential evolution based on bi-mutation strategy by Hui-yu LIU, Ji-hong HAN, Lin YUAN, Bo YU
Published 2017-08-01
Article -
3
Defense policies selection method based on attack-defense signaling game model by Heng-wei ZHANG, Ding-kun YU, Ji-hong HAN, Jin-dong WANG, Tao LI
Published 2016-05-01
Article -
4
Monitoring approach for online security of cryptographic protocol by Yu-na ZHU, Ji-hong HAN, Lin YUAN, Yu-dan FAN, Han-tuo CHEN, Wen GU
Published 2016-06-01
Article