Showing 1 - 14 results of 14 for search 'Si HAN', query time: 0.02s
Refine Results
-
1
Transcendence of $L(1,\chi _s)/\Pi $ in positive characteristic. A simple automata-style proof by Liu, Si-Han, Yao, Jia-Yan
Published 2023-07-01
Article -
2
Security sharing scheme for encrypted data in cloud storage by Wen-bin YAO, Si HAN, Xiao-yong LI
Published 2015-10-01
Article -
3
Drought Trends and Temperature Influence in Zhanghe River Basin, China by Bakhtawar Wagan, Zhanyu Zhang, Feng Baoping, Si Han, Amos T. Kabo-bah
Published 2015-01-01
Article -
4
Fermionic steering in multi-event horizon spacetime by Shu-Min Wu, Jin-Xuan Li, Yu-Xuan Wang, Si-Han Shang, Jianbo Lu
Published 2025-01-01
Article -
5
-
6
Securely redundant scheduling policy for MapReduce based on dynamic domains partition by Qing-ni SHEN, Si-han QING, Zhong-hai WU, Li-zhe ZHANG, Ya-hui YANG
Published 2014-01-01
Article -
7
Novel mobile agent dynamic data integrity protection protocol by LI Peng-fei1, QING Si-han2, MA Heng-tai1, DENG Yong1
Published 2007-01-01
Article -
8
Security architecture to support multiple security policies based on access control space by LI Li-ping1, QING Si-han1, HE Ye-ping1, SHEN Qing-ni1
Published 2006-01-01
Article -
9
Analysis and improvement of ZG off-line TTP non-repudiation protocol by LIU Dong-mei1, QING Si-han 2, LI Peng-fei4, LI Shang-jie1
Published 2009-01-01
Article -
10
Policy-adaptive capability inheritance algorithm consistent with POSIX standard by SHEN Qing-ni1, QING Si-han1, HE Ye-ping1, SHEN Jian-jun1
Published 2006-01-01
Article -
11
Research on formal security policy model specification and its formal analysis by LI Li-ping1, QING Si-han1, ZHOU Zhou-yi1, HE Jian-bo1, WEN Hong-zi3
Published 2006-01-01
Article -
12
-
13
Analysis and improvement of the CS-based fair exchange protocol by SUN Yan-bin1, GU Li-ze1, SUN Yan3, QING Si-han4, YANG Yi-xian1, CHEN Guang-hui1
Published 2010-01-01
Article -
14