Showing 1 - 13 results of 13 for search 'Zhen SHI', query time: 0.02s
Refine Results
-
1
Unveiling the Neutral Difference and Its Automated Search by Guangqiu Lv, Chenhui Jin, Zhen Shi, Ting Cui
Published 2024-01-01
Article -
2
Non-cooperative signal modulation recognition algorithm based on joint feature parameter extraction by Haifei SI, Xingliu HU, Zhen SHI, Shiyong LI
Published 2020-07-01
Article -
3
Implementation of shared file encrypted storage hierarchical access control scheme by Li LI, Guo-zhen SHI, Xuan WANG, Yun-fei CI
Published 2016-07-01
Article -
4
Representation model of structured document for multilevel security by Mang SU, Feng-hua LI, Guo-zhen SHI, Li LI
Published 2012-09-01
Article -
5
Study and optimization on system architectures of Larbin by Xuan WANG, Yi-xia HUO, Yun-fei CI, Guo-zhen SHI, Li LI
Published 2016-08-01
Article -
6
-
7
Stochastic job stream scheduling method for cipher chip with multi-cryptography by Li LI, Guo-zhen SHI, Kui GENG, Xiu-ze DONG, Xuan WANG, Feng-hua LI
Published 2016-12-01
Article -
8
Dynamic and adaptive access control model by Guo-zhen SHI, Hao-jie WANG, Yun-fei CI, Si-shui YE, Yun-chuan GUO
Published 2016-11-01
Article -
9
Fine-grained description model and implementation of hypermedia document by Mang SU, Guo-zhen SHI, Feng-hua LI, Ying SHEN, Qiong HUANG, Miao-miao WANG
Published 2013-08-01
Article -
10
Efficient scheme for user's trajectory privacy by Feng-hua LI, Cui ZHANG, Ben NIU, Hui LI, Jia-feng HUA, Guo-zhen SHI
Published 2015-12-01
Article -
11
Multilevel secure access control policy for distributed systems by Ming-xin MA, Guo-zhen SHI, Ya-qiong WANG, Hao-jie WANG, Wen-wen CHENG
Published 2017-08-01
Article -
12
Time based incremental backup scheme for mobile cloud computing by Yun-fei CI, Guo-zhen SHI, Rong-na XIE, Yao-ming PAN, Feng YANG, Si-shui YE
Published 2016-08-01
Article -
13