Showing 1 - 11 results of 11 for search 'Ru-chuan WANG', query time: 0.01s
Refine Results
-
1
Worm propagation modeling in cloud security by Wei ZHANG, Ru-chuan WANG, Peng LI
Published 2012-04-01
Article -
2
Location publishing technology based on differential privacy-preserving for big data services by Lin ZHANG, Yan LIU, Ru-chuan WANG
Published 2016-09-01
Article -
3
Dynamic trust evaluation model based on evaluation credibility in cloud computing by Lin ZHANG, Kai-li RAO, Ru-chuan WANG
Published 2013-08-01
Article -
4
Exploiting interests and behavior prediction for dynamic resource discovery in mobile social networking by Zhi-yuan LI, Ru-long CHEN, Ru-chuan WANG
Published 2016-04-01
Article -
5
Dynamic trust model based on recommendation chain classification in complex network environment by Lin ZHANG, Huan XING, Ru-chuan WANG, Chao-jie WU
Published 2015-09-01
Article -
6
Trust evaluation model based on improved D-S evidence theory by Lin ZHANG, Jing-wen LIU, Ru-chuan WANG, Hai-yan WANG
Published 2013-07-01
Article -
7
-
8
New construction of secure range query on encrypted data in cloud computing by Shao-hui WANG, Zhi-jie HAN, Dan-wei CHEN, Ru-chuan WANG
Published 2015-02-01
Article -
9
Optimal Joint Expected Delay Forwarding in Delay Tolerant Networks by Jia Xu, Xin Feng, Wen Jun Yang, Ru Chuan Wang, Bing Qing Han
Published 2013-11-01
Article -
10
Mobile sink-based data collection scheme for wireless sensor networks by Jian GUO, Li-juan SUN, Wen-jun XU, Ru-chuan WANG, Fu XIAO
Published 2012-09-01
Article -
11
Novel self-renewal hash chain scheme based on (t,n) threshold and division tree by Hai-ping HUANG, Ting DAI, Ru-chuan WANG, Xiao-lin QIN, Jiu-tian CHEN
Published 2013-04-01
Article