Showing 1 - 11 results of 11 for search 'LIAO Jun', query time: 0.01s
Refine Results
-
1
Provably secure secret sharing scheme based on bilinear maps by LI Hui-xian1, PANG Liao-jun2
Published 2008-01-01
Article -
2
Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG
Published 2017-02-01
Article -
3
Fair and anonymous ID-based multi-receiver signcryption by Liao-jun PANG, Lu GAO, Qing-qi PEI, Yu-min WANG
Published 2013-08-01
Article -
4
WLAN Mesh security association scheme in trusted computing environment by Yue-lei XIAO, Yu-min WANG, Liao-jun PANG, Shi-chong TAN
Published 2014-07-01
Article -
5
STRENGTH AND FATIGUE ANALYSIS OF AN ENGINE PISTON by LIAO JunXiong, CHEN ZhenLei, LI JianCheng, LU XiangLin
Published 2019-01-01
Article -
6
Efficient anonymous password-based authenticated key exchange scheme by TAN Shi-chong, PANG Liao-jun, SU Wan-li, WANG Yu-min
Published 2009-01-01
Article -
7
Keeping confidentiality of sensitive attributes in credential during trust negotiation by LIAO Jun-guo1, HONG Fan2, LI Jun2, YANG Mu-xiang2
Published 2008-01-01
Article -
8
Study on Bank Slope Stability of Fully-Strongly Weathered Phyllite Bridge Soaked in Reservoir Water by TANG Gang, LIAO Jun, DENG Tao, WANG Chenbin, XIE Ming, WANG Ruilin, LI Jing
Published 2023-01-01
Article -
9
-
10
Research on trust transitivity and aggregation in evidential trust model by JIANG Li-ming1, ZHANG Kun1, XU Jian1, LIAO Jun1, ZHANG Hong1
Published 2011-01-01
Article -
11
Key infection and its applications in sensor networks by LIU Zhi-hong1, MA Jian-feng1, PANG Liao-jun1, PEI Qing-qi1
Published 2009-01-01
Article