Showing 1 - 2 results of 2 for search 'ZHOU Liang1', query time: 0.01s
Refine Results
-
1
ID-based signature without trusted PKG by ZHOU Liang1, LI Da-peng2, YANG Yi-xian1
Published 2008-01-01
Article -
2
Research on quantitative assessment model on vulnerability risk for information system by ZHOU Liang1, LI Jun-e2, LU Tian-bo3, LIU Kai-pei1
Published 2009-01-01
Article