Showing 1 - 17 results of 17 for search 'Feng DENG', query time: 0.02s
Refine Results
-
1
Security flaws and improvement to a wireless authentication protocol with anonymity by PENG Hua-xi, FENG Deng-guo
Published 2006-01-01
Article -
2
Model checking of trusted cryptographic module by CHEN Xiao-feng, FENG Deng-guo
Published 2010-01-01
Article -
3
An IEC61850 communication model for network devices in smart substation by Feng DENG, Siyuan HE, Gaofeng ZHAO
Published 2015-12-01
Article -
4
Achieving efficient dynamic cryptographic access control in cloud storage by HONG Cheng, ZHANG Min, FENG Deng-guo
Published 2011-01-01
Article -
5
Hiss noise reduction method used for audio signals based on AAC bit-stream by Feng DENG, Chang-chun BAO, Feng BAO
Published 2013-05-01
Article -
6
Quality of service guarantee mechanism for enterprise video conference by Jian-feng DENG, Ling ZHANG, Jie ZHOU
Published 2013-09-01
Article -
7
Access control policy management based on extended-XACML by LI Xiao-feng, FENG Deng-guo, XU Zheng
Published 2007-01-01
Article -
8
Modified security model based on dynamic trusted degree by NIE Xiao-wei1, FENG Deng-guo1
Published 2008-01-01
Article -
9
-
10
On a clock-controlled keystream generator and its cryptographic properties by MA Wei-ju1, FENG Deng-guo1
Published 2007-01-01
Article -
11
Aerodynamic Load Reduction on a Supercritical Airfoil Using Tilted Microjets by Cheng Xue, Feng Deng, Haifeng Wang, Ning Qin
Published 2023-01-01
Article -
12
Colluding clique detector based on activity similarity in P2P trust model by MIAO Guang-sheng, FENG Deng-guo, SU Pu-rui
Published 2009-01-01
Article -
13
On the parameter selection of randomness test by FAN Li-min1, FENG Deng-guo1, CHEN Hua1
Published 2009-01-01
Article -
14
Parameter selection of autocorrelation test for block ciphers by FAN Li-min1, FENG Deng-guo1, ZHOU Yong-bin1
Published 2009-01-01
Article -
15
High-throughput multi-channel MAC protocol with multi-interface cooperation by Qing-yong DENG, Ting-rui PEI, Zhe-tao LI, An-feng LIU, Ya-feng DENG
Published 2017-08-01
Article -
16
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation by JIA Wei1, LIAN Yi-feng2, FENG Deng-guo2, CHEN Si-si3
Published 2008-01-01
Article -
17
Model for attribute based access control by LI Xiao-feng1~4, FENG Deng-guo1, CHEN Zhao-wu3, FANG Zi-he4
Published 2008-01-01
Article