Improved user authentication scheme using smart card
Hui Min Qiu;义先 杨;正明 胡
2005-4 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
1
被引量Watermark constructing method based on host signal
Li He Zhang;Yuan Jun Dai;义先 杨;正明 胡
2004-6 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
1
被引量Strong multi-designated verifiers signature scheme
Bo Yang;Zi Bi Xiao;义先 杨;正明 胡;Xin Xin Niu
2007-10 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
1
被引量VoIP network perimeter defense system
Wei Huang;洪亮 梁;正明 胡;义先 杨
2009-12 Qinghua Daxue Xuebao/Journal of Tsinghua University
1
被引量Provably secure and efficient proxy signature with untrustworthy proxy signer
Zhi Wei Wang;Shi Hui Zheng;Li Cheng Wang;义先 杨;正明 胡
2008-12 Journal of Shanghai Jiaotong University (Science)
0
被引量Runtime protecting system for java applications with dynamic data flow analyzing
Bo Feng;Miao Zhang;Guoai Xu;Xinxin Niu;正明 胡
2010
0
被引量Anonymity control in electronic check systems
Chunguang Ma;义先 杨;正明 胡
2005-12 High Technology Letters
0
被引量Research on GSM03.48 synchronization counter mechanism and its improved schemes
Zuowei Li;Yixian Yang;正明 胡
2004-8-5 Jisuanji Gongcheng/Computer Engineering
0
被引量Trusted hosts authentication access and control model faced on user action
Miao Zhang;Guoai Xu;正明 胡;义先 杨
2006-11 Wuhan University Journal of Natural Sciences
0
被引量An integrative model and system for detecting NATted hosts
Hongliang Zhu;Rui Li;Yang Xin;义先 杨;正明 胡
2009
0
被引量