Showing 1 - 5 results of 5 for search 'Xing-hua LI' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Up-to-Date Database
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • Xing-hua LI
Showing 1 - 5 results of 5 for search 'Xing-hua LI', query time: 0.01s Refine Results
  1. 1
    Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries

    Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries by Hai LIU, Xing-hua LI, Er-meng WANG, Jian-feng MA

    Published 2016-07-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Rational analysis of authentication protocols based on NGUYEN L H scheme

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    Multi-language oriented automatic realization method for cryptographic protocols

    Multi-language oriented automatic realization method for cryptographic protocols by Xing-hua LI, Shuai-tuan LI, Deng LI, Jian-feng MA

    Published 2012-09-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Anonymizing region construction scheme based on query range in location-based service privacy protection

    Anonymizing region construction scheme based on query range in location-based service privacy protection by Zhuo-xiong PEI, Xing-hua LI, Hai LIU, Kai-yue LEI, Jian-feng MA, Hui LI

    Published 2017-09-01
    Get full text
    Article
    Save to List
    Saved in:
  5. 5
    Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation

    Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation by Kai-yue LEI, Xing-hua LI, Hai LIU, Zhuo-xiong PEI, Jian-feng MA, Hui LI

    Published 2016-12-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs