Showing 1 - 20 results of 23 for search 'Feng-hua LI', query time: 0.02s
Refine Results
-
1
Development trends of the information technology and cyberspace security by Feng-hua LI
Published 2015-12-01
Article -
2
Representation model of structured document for multilevel security by Mang SU, Feng-hua LI, Guo-zhen SHI, Li LI
Published 2012-09-01
Article -
3
Research progress of access control model and policy in online social networks by Tian-zhu CHEN, Yun-chuan GUO, Ben NIU, Feng-hua LI
Published 2016-08-01
Article -
4
Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG
Published 2017-12-01
Article -
5
Research progress on location privacy-preserving techniques by Sheng WAN, Feng-hua LI, Ben NIU, Zhe SUN, Hui LI
Published 2016-12-01
Article -
6
Research on scenario-based mechanism in privacy-aware mobile networks by Ben NIU, Feng-hua LI, Jia-feng HUA, Yuan-yuan HE
Published 2015-12-01
Article -
7
Network isolation communication scheme to resist against covert channel by Feng-hua LI, Miao-miao TAN, Kai FAN, Kui GENG, Fu ZHAO
Published 2014-11-01
Article -
8
Privacy computing:concept, connotation and its research trend by Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG
Published 2016-04-01
Article -
9
Provable data possession scheme with authentication by Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN
Published 2016-10-01
Article -
10
Review of semantic-based privacy-preserving approaches in LBS by Ming-jie MA, Yue-jin DU, Feng-hua LI, IUJia-wen L
Published 2016-12-01
Article -
11
Research on privacy protection in the process of information exchange by Jia-feng HUA, Feng-hua LI, Yun-chuan GUO, Kui GENG, Ben NIU
Published 2016-03-01
Article -
12
Achieving efficient location privacy protection based on cache by Lu-lu LI, Jia-feng HUA, Sheng WAN, Hui ZHU, Feng-hua LI
Published 2017-06-01
Article -
13
Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG
Published 2016-08-01
Article -
14
-
15
-
16
Novel cyberspace-oriented access control model by Feng-hua LI, Yan-chao WANG, Li-hua YIN, Rong-na XIE, Jin-bo XIONG
Published 2016-05-01
Article -
17
Stochastic job stream scheduling method for cipher chip with multi-cryptography by Li LI, Guo-zhen SHI, Kui GENG, Xiu-ze DONG, Xuan WANG, Feng-hua LI
Published 2016-12-01
Article -
18
Fine-grained description model and implementation of hypermedia document by Mang SU, Guo-zhen SHI, Feng-hua LI, Ying SHEN, Qiong HUANG, Miao-miao WANG
Published 2013-08-01
Article -
19
Efficient scheme for user's trajectory privacy by Feng-hua LI, Cui ZHANG, Ben NIU, Hui LI, Jia-feng HUA, Guo-zhen SHI
Published 2015-12-01
Article -
20
Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO
Published 2016-08-01
Article