Showing 1 - 8 results of 8 for search 'Qing-qi PEI', query time: 0.01s
Refine Results
-
1
Mining and utilization of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI
Published 2017-10-01
Article -
2
Clustering perception mining of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI
Published 2017-06-01
Article -
3
A Trust Value-Based Spectrum Allocation Algorithm in CWSNs by Qing-Qi Pei, Zi Li, Li-Chuan Ma
Published 2013-05-01
Article -
4
Survey of block chain by Xin SHEN, Qing-qi PEI, Xue-feng LIU
Published 2016-11-01
Article -
5
Analysis of DRM game control by Guo-jun MA, Qing-qi PEI, Xiao-hong JIANG
Published 2012-09-01
Article -
6
-
7
Fair and anonymous ID-based multi-receiver signcryption by Liao-jun PANG, Lu GAO, Qing-qi PEI, Yu-min WANG
Published 2013-08-01
Article -
8
Security in cognitive radio networks by Qing-qi PEI, Hong-ning LI, Hong-yang ZHAO, Nan LI, Ying MIN
Published 2013-01-01
Article