27 results on '"Shan, Chun"'
Search Results
2. Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing
3. On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme
4. Homomorphic Authentication Based on Rank-Based Merkle Hash Tree
5. Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size
6. An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble
7. Predicting Vulnerable Software Components Using Software Network Graph
8. SulleyEX: A Fuzzer for Stateful Network Protocol
9. A Detecting Method of Array Bounds Defects Based on Symbolic Execution
10. The Quality Control and Management of Component-Oriented Software Development
11. Petri Net Applied in Document Flow Management System
12. Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing
13. On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme
14. A Self-calibration Algorithm with Chaos Particle Swarm Optimization for Autonomous Visual Guidance of Welding Robot
15. Online Object Tracking Based on Depth Image with Sparse Coding
16. Homomorphic Authentication Based on Rank-Based Merkle Hash Tree
17. Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size
18. An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble
19. Predicting Vulnerable Software Components Using Software Network Graph
20. A Detecting Method of Array Bounds Defects Based on Symbolic Execution
21. SulleyEX: A Fuzzer for Stateful Network Protocol
22. Petri Net Applied in Document Flow Management System
23. The Quality Control and Management of Component-Oriented Software Development
24. Online Object Tracking Based on Depth Image with Sparse Coding
25. A Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol
26. Design and implementation of Data Center Network Global Congestion Price Calculating method based on Software Defined Networking
27. Online Object Tracking Based on Depth Image with Sparse Coding
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.