Showing 1 - 7 results of 7 for search 'Chun-fu JIA', query time: 0.01s
Refine Results
-
1
End hopping based on message tampering by Kai LIN, Chun-fu JIA
Published 2013-12-01
Article -
2
Improvement of distributed timestamp synchronization by Kai LIN, Chun-fu JIA, Le-yi SHI
Published 2012-10-01
Article -
3
Research on dynamic array honeypot for collaborative network defense strategy by Le-yi SHI, Jie LI, Xin LIU, Chun-fu JIA
Published 2012-11-01
Article -
4
Using coverage analysis to extract Botnet command-and-control protocol by Zhi WANG, Ya-yun CAI, Lu LIU, Chun-fu JIA
Published 2014-01-01
Article -
5
FPE scheme based on k-splits Feistel network by Jing-wei LI, Chun-fu JIA, Zhe-li LIU, Min LI
Published 2012-04-01
Article -
6
Collaborative defending scheme against malicious Web pages based on social trust by Xin LIU, Chun-fu JIA, Guo-you LIU, Zhi-chao HU, Dong WANG
Published 2012-12-01
Article -
7
Approach of location privacy protection based on order preserving encryption of the grid by Nan SHEN, Chun-fu JIA, Shuang LIANG, Rui-qi LI, Zhe-li LIU
Published 2017-07-01
Article