An attack tolerant distributed intrusion detection system
Daifei Guo;义先 杨;正明 胡
2002
0
被引量A simple lattice-based PKE scheme
Limin Zhou;正明 胡;Fengju Lv
2016-12-1 SpringerPlus
0
被引量Efficient certificateless strong designated verifier signature scheme
Bo Yang;正明 胡;Zibi Xiao
2009
0
被引量Evolutionary design of Boolean functions
Ming Cao;Yin Feng Huang;正明 胡;义先 杨
2007-11 Tongxin Xuebao/Journal on Communications
0
被引量Trust model based on group recommendation in multi-hop wireless network
Ya Tao Yang;Xian Fang Wang;Yang Xin;正明 胡;义先 杨
2008-11 Jiangsu Daxue Xuebao (Ziran Kexue Ban) / Journal of Jiangsu University (Natural Science Edition)
0
被引量A secure ID-based strong designated verifier signature scheme
Bo Yang;Zibi Xiao;正明 胡
2009
0
被引量Identification of frequency-hopping spread spectrum signals using SVMs with Second Generation Wavelet kernels
Jiasheng Huang;Yajian Zhou;Na Sun;正明 胡
2010
0
被引量Code obfuscation algorithm to resist static disassembly
Yu Bo Yang;Wei Huang;Zhong Xian Li;正明 胡
2015-3-1 Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
0
被引量Trust model based on dynamic policy similarity for pervasive computing environments
Shuai Zeng;Fen Xu;Yang Xin;义先 杨;正明 胡
2010
0
被引量Dynamic data flow graph-based software watermarking
Bo Feng;Miao Zhang;Guoai Xu;Xinxin Niu;正明 胡
2009
0
被引量