Showing 1 - 12 results of 12 for search 'Xiao-ping WU', query time: 0.02s
Refine Results
-
1
Efficient certificateless sequential multi-signature scheme by Yan-lin QIN, Xiao-ping WU
Published 2013-07-01
Article -
2
Unknown attack detection model based on network behavior analysis by Yi-han YU, Yu FU, Xiao-ping WU
Published 2016-06-01
Article -
3
Efficient certificateless multi-receiver anonymous signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU
Published 2016-06-01
Article -
4
Leakage-resilient certificateless signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU
Published 2017-11-01
Article -
5
Power analysis-resistant based on NCL path balance by Fang LUO, Qing-yu OU, Xiao-ping WU
Published 2013-08-01
Article -
6
k-means clustering method preserving differential privacy in MapReduce framework by Hong-cheng LI, Xiao-ping WU, Yan CHEN
Published 2016-02-01
Article -
7
Identity authentication scheme based on identity-based encryption by Ren-ji HUANG, Xiao-ping WU, Hong-cheng LI
Published 2016-06-01
Article -
8
Traffic anomaly detection method in networks based on improved clustering algorithm by Hong-cheng LI, Xiao-ping WU, Hong-hai JIANG
Published 2015-12-01
Article -
9
Research on selective trust-path search and aggregation in distributed environment by Yan-lin QIN, Xiao-ping WU, Jian-xin GAO
Published 2012-09-01
Article -
10
Research and implement of file safe deposit box based on authentication and authorization by Xiao-ning DONG, Xiao-ping WU, Hong-cheng LI
Published 2016-05-01
Article -
11
Survey of data possession provability proving on cloud storage by Wei FU, Qing YE, Ze-mao CHEN, Xiao-ping WU
Published 2012-11-01
Article -
12
Invulnerability of small-world network against cascading failure based on nonlinear load-capacity model by Xiao-ping WU, Jia-sheng WANG, Yan-lin QIN, Qing YE
Published 2014-06-01
Article