Skip navigation
Search
Researchers
Navigation
Faculties
Browse Items by:
Issue Date
Author
Title
Keyword
Guide
Sign on to
My DSpace
Receive email
updates
中文
|
English
Browsing by Author Chen, Zhong
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 1 to 20 of 241
next >
Issue Date
Title
Author(s)
2013
Accelerating AES in JavaScript with WebGL
Yang, Yang
;
Guan, Zhi
;
Zhu, Jiawei
;
Dong, Qiuxiang
;
Chen, Zhong
2015
Accelerating RSA with Fine-Grained Parallelism Using GPU
Yang, Yang
;
Guan, Zhi
;
Sun, Huiping
;
Chen, Zhong
2004
An access control model for Web services in business process
Liu, Peng
;
Chen, Zhong
2010
An Adjacency Matrixes-based Model for Network Security Analysis
Xie, Anming
;
Tang, Cong
;
Gui, Nike
;
Cai, Zhuhua
;
Hu, Jianbin
;
Chen, Zhong
Nov-2022
The adverse impact of ecotropic viral integration site-1 (EVI1) overexpression on the prognosis of acute myeloid leukemia with KMT2A gene rearrangement in different risk stratification subtypes
Liu, Xin-Xin
;
Pan, Xin-An
;
Gao, Meng-Ge
;
Kong, Jun
;
Jiang, Hao
;
Chang, Ying-Jun
;
Zhang, Xiao-Hui
;
Wang, Yu
;
Liu, Kai-Yan
;
Chen, Zhong
;
Zhao, Xiao-Su
;
Huang, Xiao-Jun
2013
Analysis and design of distance-bounding protocols for RFID
Xin, Wei
;
Sun, Huiping
;
Chen, Zhong
2008
Analysis and improvement in supermarket service model
Bao, Dihui
;
Chen, Yelu
;
Sun, Huiping
;
Chen, Zhong
2005
Analysis on combined security efficiency and vulnerability for information system security evaluation
Duan, Yunsuo
;
Liu, Xin
;
Chen, Zhong
2015
API Sequences based Malware Detection for Android
Zhu, Jiawei
;
Wu, Zhengang
;
Guan, Zhi
;
Chen, Zhong
2015
Appearance similarity evaluation for Android applications
Zhu, Jiawei
;
Wu, Zhengang
;
Guan, Zhi
;
Chen, Zhong
2009
Applying Attack Graphs to Network Security Metric
Xie, Anming
;
Wen, Weiping
;
Zhang, Li
;
Hu, Jianbin
;
Chen, Zhong
2010
An approach to semantic web services publication and discovery based on owl ontology inference
Si, Huayou
;
Ni, Yulin
;
Chen, Zhong
;
Yu, Lian
;
Zhao, Yun
2018
Approaching the upper bound of load capacity: Functional grading with interpenetrating polymer networks
Chen, Zhong
;
Li, Wenlong
;
Negahban, Mehrdad
;
Saiter, Jean-Marc
;
Delpouve, Nicolas
;
Tan, Li
;
Li, Zheng
2015
Attribute-based Keyword Search Efficiency Enhancement Via an Online/Offline Approach
Dong, Qiuxiang
;
Guan, Zhi
;
Chen, Zhong
2013
Authenticating Users of Recommender Systems Using Naive Bayes
Wu, Zhengang
;
Yu, Liangwen
;
Sun, Huiping
;
Guan, Zhi
;
Chen, Zhong
2010
Automatic construction and optimization of layered Network Attack Graph
Wang, Yonggang
;
Gui, Nike
;
Hu, Jianbin
;
Chen, Zhong
2012
Bidder-anonymous English auction protocol based on revocable ring signature
Xiong, Hu
;
Chen, Zhong
;
Li, Fagen
2007
Bounded model checking of CTL
Tao, Zhi-Hong
;
Zhou, Cong-Hua
;
Chen, Zhong
;
Wang, Li-Fu
2011
A business oriented risk assessment model
Li, Bin
;
Xie, Feng
;
Chen, Zhong
2006
C4W: An energy efficient Public Key Cryptosystem for large-scale wireless sensor networks
Jing, Qi
;
Hu, Jianbin
;
Chen, Zhong
map