Showing 1 - 15 results of 15 for search 'Kui GENG', query time: 0.02s
Refine Results
-
1
Scheduling algorithm for stochastic job stream cipher service based on load balancing by Li LI, Guozhen SHI, Kui GENG, Xiuze DONG, Fenghua LI
Published 2018-06-01
Article -
2
Location privacy preservation approach towards to content sharing on mobile online social network by Chao LI, Li-hua YIN, Kui GENG, Bin-xing FANG
Published 2016-11-01
Article -
3
Research on Space-Ground Network Security Guarantee Technology by Fenghua LI, Linjie ZHANG, Yueming LU, Kui GENG, Yunchuan GUO
Published 2020-09-01
Article -
4
High-performance and high-concurrency encryption scheme for Hadoop platform by Wei JIN, Mingjie YU, Fenghua LI, Zhengkun YANG, Kui GENG
Published 2019-12-01
Article -
5
Efficient and provably-secure certificateless sequential aggregate signature scheme by Zhu WANG, Siqi YANG, Fenghua LI, Kui GENG, Tingting PENG, Mengyao SHI
Published 2022-05-01
Article -
6
Network isolation communication scheme to resist against covert channel by Feng-hua LI, Miao-miao TAN, Kai FAN, Kui GENG, Fu ZHAO
Published 2014-11-01
Article -
7
Extended access control mechanism for cross-domain data exchange by Rongna XIE, Yunchuan GUO, Fenghua LI, Guozhen SHI, Yaqiong WANG, Kui GENG
Published 2019-07-01
Article -
8
Hierarchical scalable storage architecture for massive electronic bill by Fenghua LI, Dingyan LI, Wei JIN, Zhu WANG, Yunchuan GUO, Kui GENG
Published 2019-05-01
Article -
9
Differentiated and negotiable mechanism for data communication by Wenlong KOU, Fenghua LI, Xiuze DONG, Xiaogang CAO, Kui GENG, Qing LI
Published 2021-10-01
Article -
10
Collection policy refining method for threat monitoring in complex network environment by Fenghua LI, Zifu LI, Ling LI, Ming ZHANG, Kui GENG, Yunchuan GUO
Published 2019-04-01
Article -
11
Research on privacy protection in the process of information exchange by Jia-feng HUA, Feng-hua LI, Yun-chuan GUO, Kui GENG, Ben NIU
Published 2016-03-01
Article -
12
Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG
Published 2016-08-01
Article -
13
On-demand and efficient scheduling scheme for cryptographic service resource by Wenlong KOU, Yuyang ZHANG, Fenghua LI, Xiaogang CAO, Jiamin LI, Zhu WANG, Kui GENG
Published 2022-06-01
Article -
14
Stochastic job stream scheduling method for cipher chip with multi-cryptography by Li LI, Guo-zhen SHI, Kui GENG, Xiu-ze DONG, Xuan WANG, Feng-hua LI
Published 2016-12-01
Article -
15
Cloud outsourcing secret sharing scheme against covert adversaries by En ZHANG, Kui GENG, Wei JIN, Yong-jun LI, Yun-qing SUN, Feng-hua LI
Published 2017-05-01
Article