Showing 1 - 7 results of 7 for search 'Chun-fu JIA' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Up-to-Date Database
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • Chun-fu JIA
Showing 1 - 7 results of 7 for search 'Chun-fu JIA', query time: 0.01s Refine Results
  1. 1
    End hopping based on message tampering

    End hopping based on message tampering by Kai LIN, Chun-fu JIA

    Published 2013-12-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Improvement of distributed timestamp synchronization

    Improvement of distributed timestamp synchronization by Kai LIN, Chun-fu JIA, Le-yi SHI

    Published 2012-10-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    Research on dynamic array honeypot for collaborative network defense strategy

    Research on dynamic array honeypot for collaborative network defense strategy by Le-yi SHI, Jie LI, Xin LIU, Chun-fu JIA

    Published 2012-11-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Using coverage analysis to extract Botnet command-and-control protocol

    Using coverage analysis to extract Botnet command-and-control protocol by Zhi WANG, Ya-yun CAI, Lu LIU, Chun-fu JIA

    Published 2014-01-01
    Get full text
    Article
    Save to List
    Saved in:
  5. 5
    FPE scheme based on k-splits Feistel network

    FPE scheme based on k-splits Feistel network by Jing-wei LI, Chun-fu JIA, Zhe-li LIU, Min LI

    Published 2012-04-01
    Get full text
    Article
    Save to List
    Saved in:
  6. 6
    Collaborative defending scheme against malicious Web pages based on social trust

    Collaborative defending scheme against malicious Web pages based on social trust by Xin LIU, Chun-fu JIA, Guo-you LIU, Zhi-chao HU, Dong WANG

    Published 2012-12-01
    Get full text
    Article
    Save to List
    Saved in:
  7. 7
    Approach of location privacy protection based on order preserving encryption of the grid

    Approach of location privacy protection based on order preserving encryption of the grid by Nan SHEN, Chun-fu JIA, Shuang LIANG, Rui-qi LI, Zhe-li LIU

    Published 2017-07-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs